Sciweavers

545 search results - page 13 / 109
» On the design of a pervasive debugger
Sort
View
ISPAN
2009
IEEE
14 years 2 months ago
SoCQ: A Framework for Pervasive Environments
Abstract—Querying non-conventional data sources is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is...
Yann Gripay, Frédérique Laforest, Je...
KER
2007
90views more  KER 2007»
13 years 7 months ago
Ontology-based models in pervasive computing systems
Pervasive computing is by its nature open and extensible, and must integrate the information from a diverse range of sources. This leads to a problem of information exchange, so s...
Juan Ye, Lorcan Coyle, Simon Dobson, Paddy Nixon
JUCS
2006
85views more  JUCS 2006»
13 years 7 months ago
A Pervasive Multimodal Tele-Home Healthcare System
: This paper proposes a Human-centered Pervasive Computing System Model (HPC), a Layered Architectural Analysis and Design Method (LAAD) and a Waterfall Prototyping Process Model (...
Zhenjiang Miao, Baozong Yuan, Mengsun Yu
PERVASIVE
2006
Springer
13 years 7 months ago
Declarative Support for Sensor Data Cleaning
Pervasive applications rely on data captured from the physical world through sensor devices. Data provided by these devices, however, tend to be unreliable. The data must, therefor...
Shawn R. Jeffery, Gustavo Alonso, Michael J. Frank...
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis