Sciweavers

266 search results - page 9 / 54
» Design of a Security Management Middleware in Ubiquitous Com...
Sort
View
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 9 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
IJISEC
2007
119views more  IJISEC 2007»
13 years 7 months ago
An incentive compatible reputation mechanism for ubiquitous computing environments
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user ...
Jinshan Liu, Valérie Issarny
ICPPW
1999
IEEE
13 years 11 months ago
Design of MOBILE MOM: Message Oriented Middleware Service for Mobile Computing
Message oriented middleware (MOM) is a specific class of middleware that operates on the principles of message passing or message queuing. Existing MOM syste doesn't support ...
Do-Guen Jung, Kwang-Jin Paek, Tai-Yun Kim
JIPS
2010
138views more  JIPS 2010»
13 years 2 months ago
A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking Sy
In order to provide a tailored education for learners within the ubiquitous environment, it is critical to undertake an analysis of the learning activities of learners. For this pu...
Hyung-Min Lim, Kun-Won Jang, Byung-Gi Kim
SAC
2005
ACM
14 years 1 months ago
Intelligent file management in ubiquitous environments
The paradigm of Ubiquitous computing seeks to build a computing environment that responds to user context. An ideal file system for the Ubiquitous environment is one that can succ...
Kartik Vishwanath, Arvind Gautam, Yugyung Lee