Sciweavers

1354 search results - page 71 / 271
» Discovery Systems in Ubiquitous Computing
Sort
View
PERCOM
2007
ACM
14 years 9 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
CHI
2007
ACM
14 years 10 months ago
Exploring affective design for physical controls
Physical controls such as knobs, sliders, and buttons are experiencing a revival as many computing systems progress from personal computing architectures towards ubiquitous comput...
Colin Swindells, Karon E. MacLean, Kellogg S. Boot...
PVLDB
2008
157views more  PVLDB 2008»
13 years 8 months ago
SEDA: a system for search, exploration, discovery, and analysis of XML Data
Keyword search in XML repositories is a powerful tool for interactive data exploration. Much work has recently been done on making XML search aware of relationship information emb...
Andrey Balmin, Latha S. Colby, Emiran Curtmola, Qu...
EEMMAS
2007
Springer
14 years 4 months ago
Environment Support to the Management of Context Awareness Information
Abstract. Collaborative Ubiquitous Environments (CUEs) are environments supporting collaboration among persons in a ubiquitous computing setting. This paper shows how results of th...
Marco P. Locatelli, Giuseppe Vizzari
NETWORK
2008
96views more  NETWORK 2008»
13 years 10 months ago
Enabling rapid wireless system composition through layer-2 discovery
Although small mobile computers have processors whose capabilities are increasing, often they still are resource constrained in terms of performing many common computing tasks. Co...
Shivani Sud, Roy Want, Trevor Pering, Barbara Rosa...