Sciweavers

73 search results - page 7 / 15
» Efficient Authentication for Mobile and Pervasive Computing
Sort
View
IPPS
2005
IEEE
14 years 9 days ago
A Lightweight Scheme for Auto-configuration in Mobile Ad Hoc Networks
An efficient addressing scheme is necessary for auto-configuration and seamless communication in pervasive computing environments. In this paper, we propose an efficient and simple...
Mijeom Kim, Mohan Kumar, Behrooz Shirazi
SAC
2003
ACM
13 years 12 months ago
Systems Architecture for Pervasive Retail
Recent developments in mobile technologies and associated economies of scale via mature manufacturing processes have made possible the construction of pervasive systems in specifi...
George Roussos, Panos Kourouthanasis, Eugene A. Gr...
TMC
2010
124views more  TMC 2010»
13 years 5 months ago
A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks
—The key feature of many emerging pervasive computing applications is to proactively provide services to mobile individuals. One major challenge in providing users with proactive...
Seungwoo Kang, Jinwon Lee, Hyukjae Jang, Youngki L...
MOBICOM
1996
ACM
13 years 11 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
AISS
2010
155views more  AISS 2010»
13 years 1 months ago
A Next Generation Smart Energy Technology
This paper has focused on the integration of Hybrid Renewable Energy, specifically the solar energy resources into conventional electric grid and deployment of smart architecture ...
Aurobi Das, V. Balakrishnan