Sciweavers

112 search results - page 10 / 23
» Pervasive Information Acquisition for Mobile AR-Navigation S...
Sort
View
PERVASIVE
2008
Springer
13 years 7 months ago
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Opportunistic sensing allows applications to "task" mobile devices to measure context in a target region. For example, one could leverage sensorequipped vehicles to measu...
Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, ...
ATAL
2007
Springer
13 years 11 months ago
Towards reflective mobile agents for resource-constrained mobile devices
The vision of ubiquitous computing is one in which resource constrained mobile devices form ad-hoc networks to enable the delivery of services that are sensitive and responsive to...
Conor Muldoon, Gregory M. P. O'Hare, John F. Bradl...
PERCOM
2010
ACM
13 years 2 months ago
The architecture design of a cross-domain context management system
A new context management framework, which supports the interaction between different domain context managers, is proposed. Two different context producerconsumer patterns are defin...
Bin Guo, Lin Sun, Daqing Zhang
FI
2010
175views more  FI 2010»
13 years 4 months ago
Applications and Security of Next-Generation, User-Centric Wireless Systems
: Pervasive wireless systems have significantly improved end-users' quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual inform...
Jerry Rick Ramstetter, Yaling Yang, Danfeng Yao
PERVASIVE
2005
Springer
14 years 1 months ago
A Formal Model of Obfuscation and Negotiation for Location Privacy
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. ...
Matt Duckham, Lars Kulik