Sciweavers

6662 search results - page 99 / 1333
» Mobile and Ubiquitous Computing
Sort
View
PERCOM
2006
ACM
16 years 3 months ago
Plan B: An Operating System for Ubiquitous Computing Environments
The conventional approach for building pervasive environments relies on middleware to integrate different systems. Instead, we have built a system that can deal with these environ...
Francisco J. Ballesteros, Enrique Soriano, Katia L...
EUROPKI
2006
Springer
15 years 7 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
146
Voted
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
A SIP-based Architecture model for Contextual Coalition Access Control for Ubiquitous Computing
A significant deterrent to the ability to connect in a spontaneous manner in cross-enterprise collaborative applications is the difficulty in users from different domains being ab...
Ramiro Liscano, Kaining Wang
97
Voted
STEP
2005
IEEE
15 years 9 months ago
Open Challenges in Ubiquitous and Net-Centric Computing Middleware
Thierry Bodhuin, Gerardo Canfora, Rosa Preziosi, M...
MUM
2004
ACM
87views Multimedia» more  MUM 2004»
15 years 9 months ago
Middleware design issues for ubiquitous computing
Tatsuo Nakajima, Kaori Fujinami, Eiji Tokunaga, Hi...