Sciweavers

3016 search results - page 498 / 604
» Disappearing mobile devices
Sort
View
ACSW
2003
13 years 10 months ago
Location Management in Pervasive Systems
Pervasive systems require context awareness in order to be able to provide “anywhere, anytime” computing to mobile users. One type of context information is location informati...
Jadwiga Indulska, Peter Sutton
DARE
2000
182views more  DARE 2000»
13 years 10 months ago
CyberCode: designing augmented reality environments with visual tags
The CyberCode is a visual tagging system based on a 2Dbarcode technology and provides several features not provided by other tagging systems. CyberCode tags can be recognized by t...
Jun Rekimoto, Yuji Ayatsuka
WOA
2003
13 years 10 months ago
Spray Computers: Frontiers of Self-organization for Pervasive Computing
We envision a future in which clouds of microcomputers can be sprayed in an environment to provide, by spontaneously networking with each other, an endlessly range of futuristic a...
Marco Mamei, Franco Zambonelli
ESORICS
2010
Springer
13 years 10 months ago
Kamouflage: Loss-Resistant Password Management
We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or cell phone with a Kamouflage-based password manager i...
Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan ...
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 10 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...