A new context management framework, which supports the interaction between different domain context managers, is proposed. Two different context producerconsumer patterns are defin...
Ubiquitous environments facilitate the collection of information pieces from sensors, databases, or mobile devices in order to compose the context of entities like users, places, o...
A user's profile, for the purpose of location management in a personal communication service (PCS) network, is formalized as a subgraph of the network graph. This subgraph, t...
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
—This paper details a novel architecture, MobiSplit [17], for managing mobility in future IP based networks. The architecture separates mobility management in two levels, local a...