Sciweavers

189 search results - page 3 / 38
» Learning Automation Policies for Pervasive Computing Environ...
Sort
View
BCSHCI
2007
13 years 9 months ago
Figuring configuration: "everyday" users and end-user configuration of pervasive computing environments
The research outlined investigates strategies that nonprogramming or “everyday” users may take in interaction with a Pervasive Computing Environment within relevant domains sp...
Thom Heslop
IASTEDSE
2004
13 years 9 months ago
An authorization and access control scheme for pervasive computing
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Linda Staffans, Titos Saridakis
FASE
2003
Springer
14 years 28 days ago
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment
Abstract. A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobil...
David Scott, Alastair R. Beresford, Alan Mycroft
HOTOS
2003
IEEE
14 years 1 months ago
Access Control to Information in Pervasive Computing Environments
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Urs Hengartner, Peter Steenkiste
PERCOM
2005
ACM
14 years 7 months ago
Re-Conceptualizing Learning Environments: A Framework for Pervasive eLearning
Pervasive eLearning requires a novel media perspective on learning objects. Instead of viewing handhelds or smart phones as minimized PCs we would like to propose a perspective on...
Reinhard Keil-Slawik, Thorsten Hampel, Bernd E&szl...