Sciweavers

202 search results - page 7 / 41
» Managing Pervasive Environment Privacy Using the
Sort
View
EUROSSC
2008
Springer
13 years 9 months ago
On the Evaluation of Quality of Context
Abstract. High quality context information plays a vital role in adapting a system to the rapidly changing situations. However, the diversity of the sources of context information ...
Atif Manzoor, Hong Linh Truong, Schahram Dustdar
CSREAPSC
2006
13 years 9 months ago
A Policy-Based Location Identification Architecture for Pervasive Systems
In this paper, we present a policy-based architecture to be used in identifying the location of users within a pervasive system environment. Mobile users can define their own poli...
Sherif G. Aly
IJWIN
2006
119views more  IJWIN 2006»
13 years 7 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...
ACSW
2003
13 years 9 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
PERCOM
2006
ACM
14 years 7 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...