Sciweavers

202 search results - page 27 / 41
» Managing Pervasive Environment Privacy Using the
Sort
View
IUI
2003
ACM
14 years 28 days ago
Sticky notes for the semantic web
Computer-based annotation is increasing in popularity as a mechanism for revising documents and sharing comments over the Internet. One reason behind this surge is that viewpoints...
David R. Karger, Boris Katz, Jimmy J. Lin, Dennis ...
CCS
2007
ACM
14 years 1 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
DOA
2000
116views more  DOA 2000»
13 years 9 months ago
Jini Technology Applied to Railway Systems
In the world of pervasive computing where large management systems, as well as small devices, all become interconnected, the problem of the configuration and management of network...
Txomin Nieva, Andreas Fabri, Abdenbi Benammour
ISI
2006
Springer
13 years 7 months ago
DrillSim: A Simulation Framework for Emergency Response Drills
Responding to natural or man-made disasters in a timely and effective manner can reduce deaths and injuries, contain or prevent secondary disasters, and reduce the resulting econom...
Vidhya Balasubramanian, Daniel Massaguer, Sharad M...
EUC
2005
Springer
14 years 1 months ago
A Unified Context Model: Bringing Probabilistic Models to Context Ontology
Abstract. Ontology is a promising tool to model and reason about context information in pervasive computing environment. However, ontology does not support representation and reaso...
Binh An Truong, Young-Koo Lee, Sungyoung Lee