Sciweavers

400 search results - page 42 / 80
» Enabling Personal Privacy for Pervasive Computing Environmen...
Sort
View
CISIS
2009
IEEE
14 years 3 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
EUC
2004
Springer
14 years 2 months ago
Context-Aware State Management for Ubiquitous Applications
In a ubiquitous computing environment, users continuously access computing services and interact with smart spaces, while moving from one place to another. Application migration, t...
Pauline P. L. Siu, Nalini Moti Belaramani, Cho-Li ...
ICC
2007
IEEE
154views Communications» more  ICC 2007»
14 years 3 months ago
A Policy-Based Approach for Managing Ubiquitous Networks in Urban Spaces
— Modern cities are becoming increasingly networked Network Operator and the Service Providers can introduce environments and a plethora of computing equipment interacts their ow...
Antonis M. Hadjiantonis, Marinos Charalambides, Ge...
PERVASIVE
2006
Springer
13 years 8 months ago
iCAP: Interactive Prototyping of Context-Aware Applications
Although numerous context-aware applications have been developed and there have been technological advances for acquiring contextual information, it is still difficult to develop a...
Anind K. Dey, Timothy Sohn, Sara Streng, Justin Ko...
SIGCSE
2008
ACM
104views Education» more  SIGCSE 2008»
13 years 8 months ago
Inspiring blind high school students to pursue computer science with instant messaging chatbots
Blind students are an underrepresented group in computer science. In this paper, we describe our experience preparing and leading the computer science track at the National Federa...
Jeffrey P. Bigham, Maxwell B. Aller, Jeremy T. Bru...