er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
The components of a context-aware system can often become disconnected because of the dynamic environments within which they are deployed. Hoarding context information on the clie...
Pervasive computing calls for suitable middleware and programming models to deal with large software systems dived in dynamic mobile network environments. Here we present the prog...
In dynamic heterogeneous environments, such as Pervasive Computing, context-aware adaptation is a key concept to meet the varying requirements of different clients. To enable such...
This paper introduces a new class of interactive interfaces that can be moved around to appear on ordinary objects and surfaces anywhere in a space. By dynamically adapting the fo...
Gopal Pingali, Claudio S. Pinhanez, Anthony Levas,...