Sciweavers

274 search results - page 49 / 55
» Developing a Model for Trust Management in Pervasive Devices
Sort
View
EICS
2009
ACM
14 years 4 days ago
Adapting ubicomp software and its evaluation
We describe work in progress on tools and infrastructure to support adaptive component-based software for mobile devices— in our case, Apple iPhones. Our high level aim is ‘de...
Malcolm Hall, Marek Bell, Alistair Morrison, Stuar...
EDCC
1994
Springer
13 years 11 months ago
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach
Security and reliability issues in distributed systems have been investigated for several years at LAAS using a technique called Fragmentation-Redundancy-Scattering (FRS). The aim ...
Jean-Charles Fabre, Yves Deswarte, Brian Randell
TMC
2008
159views more  TMC 2008»
13 years 5 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
HICSS
2003
IEEE
117views Biometrics» more  HICSS 2003»
14 years 22 days ago
Performance of Integrated Supply Chains - An International Case Study in High Tech Manufacturing
The aim of this study is to identify factors that improve the performance of integrated supply chains (SCs). We developed the ‘extended strategic alignment model’ based on the ...
David C. L. Kuo, Martin Smits
IEEECIT
2010
IEEE
13 years 6 months ago
Introducing Hardware-in-Loop Concept to the Hardware/Software Co-design of Real-time Embedded Systems
—As the need for embedded systems to interact with other systems is growing fast, we see great opportunities in introducing the hardware-in-the-loop technique to the field of ha...
Dogan Fennibay, Arda Yurdakul, Alper Sen