Sciweavers

140 search results - page 20 / 28
» Extending Context Models for Privacy in Pervasive Computing ...
Sort
View
ESORICS
2004
Springer
14 years 1 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
IJMSO
2007
201views more  IJMSO 2007»
13 years 7 months ago
A context-aware meeting alert using semantic web and rule technology
This paper describes work in progress developing a context-aware meeting alert. This application integrates semantic web technology in RDF (for representing calendars), semantic we...
Grigoris Antoniou, Antonis Bikakis, Anna Karamoleg...
AOSE
2004
Springer
14 years 1 months ago
An Agent Construction Model for Ubiquitous Computing Devices
Abstract. One of the main challenges for the successful application of agentbased systems in mobile and embedded devices is enabling application developers to reconcile the needs o...
Ronald Ashri, Michael Luck
PERVASIVE
2009
Springer
14 years 2 months ago
RF-Based Initialisation for Inertial Pedestrian Tracking
Location information is an important source of context for ubiquitous computing systems. We have previously developed a wearable location system that combines a foot-mounted inerti...
Oliver Woodman, Robert Harle
GG
2008
Springer
13 years 8 months ago
Parallel and Sequential Independence for Borrowed Contexts
Parallel and sequential independence are central concepts in the concurrency theory of the double pushout (dpo) approach to graph rewriting. However, so far those same notions were...
Filippo Bonchi, Fabio Gadducci, Tobias Heindel