We propose a software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or...
Many adaptative context-aware middleware exist and most of them rely on so-called vertical architectures that offer a functional decomposition for contextawareness. This architectu...
Nicolas Ferry, Stephane Lavirotte, Jean-Yves Tigli...
A Body Area Network (BAN) is a body worn system which provides the user with a set of mobile services. A BAN incorporates a set of devices (eg. mp3 player, video camera, speakers, ...
V. M. Jones, Hailiang Mei, Tom Broens, Ing Widya, ...
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
- Nowadays computing becomes increasingly mobile and pervasive. One of the important steps in pervasive computing is context-awareness. Context-aware pervasive systems rely on info...
Tam Van Nguyen, Wontaek Lim, Huy Anh Nguyen, Deokj...