Sciweavers

1027 search results - page 13 / 206
» Developing context-aware pervasive computing applications: M...
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Criticality Aware Access Control Model for Pervasive Applications
In this paper we present a new framework for specifying access control policies in smart spaces called Criticality-Aware Access Control (CAAC). The main idea is to automatically r...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
DSL
2009
13 years 5 months ago
A Taxonomy-Driven Approach to Visually Prototyping Pervasive Computing Applications
Abstract. Various forms of pervasive computing environments are being deployed in an increasing number of areas including healthcare, home automation, and military. This evolution ...
Zoé Drey, Julien Mercadal, Charles Consel
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 8 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
PERVASIVE
2008
Springer
13 years 7 months ago
Context-aware routing in wireless mesh networks
Wireless mesh networks promise to deliver resilient connectivity among network nodes, allowing data to be relayed seamlessly between mobile clients and infrastructure. Routing is ...
Peizhao Hu, Marius Portmann, Ricky Robinson, Jadwi...
EEMMAS
2007
Springer
14 years 1 months ago
Engineering Contextual Information for Pervasive Multiagent Systems
Multiagent systems for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises th...
Gabriella Castelli, Marco Mamei, Franco Zambonelli