Sciweavers

545 search results - page 14 / 109
» On the design of a pervasive debugger
Sort
View
PERCOM
2010
ACM
13 years 5 months ago
A tool suite to prototype pervasive computing applications
Abstract--Despite much progress, developing a pervasive computing application remains a challenge because of a lack of conceptual frameworks and supporting tools. This challenge in...
Damien Cassou, Julien Bruneau, Charles Consel
ASAP
2008
IEEE
182views Hardware» more  ASAP 2008»
14 years 2 months ago
Low-cost implementations of NTRU for pervasive security
NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design ...
Ali Can Atici, Lejla Batina, Junfeng Fan, Ingrid V...
FC
2007
Springer
104views Cryptology» more  FC 2007»
14 years 1 months ago
A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed?
In this paper, we investigate how existing theoretical contributions on usable security can serve to guide the design of a specific system. We illustrate how going through this the...
Jakob Illeborg Pagter, Marianne Graves Petersen
PERVASIVE
2006
Springer
13 years 7 months ago
The Design of a Portable Kit of Wireless Sensors for Naturalistic Data Collection
In this paper, we introduce MITes, a flexible kit of wireless sensing devices for pervasive computing research in natural settings. The sensors have been optimized for ease of use,...
Emmanuel Munguia Tapia, Stephen S. Intille, Louis ...
PERCOM
2009
ACM
14 years 8 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...