Sciweavers

57 search results - page 4 / 12
» Pervasive Messaging
Sort
View
ACNS
2010
Springer
159views Cryptology» more  ACNS 2010»
14 years 11 days ago
A Message Recognition Protocol Based on Standard Assumptions
We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the ran...
Atefeh Mashatan, Serge Vaudenay
EUROPAR
2003
Springer
14 years 23 days ago
Short Message Service in a Grid-Enabled Computing Environment
Pervasive computing provides an attractive vision for the future of computing. Mobile computing devices such as mobile phones together with a land-based and wireless communication ...
Fenglian Xu, M. Hakki Eres, Simon J. Cox
PERCOM
2004
ACM
14 years 7 months ago
Pervasive Enablement of Business Processes
People are an important part of many business processes. Current workflow-based implementations of business processes constrain users to the desktop environment; require them to p...
Dipanjan Chakraborty, Hui Lei
CHI
2004
ACM
14 years 8 months ago
Connecting with the absent presence: pervasive technology use and effects on community
This research investigates how the pervasive use of technology by an individual in the physical presence of group members affects community level. When technology use occurs, the ...
Lisa Kleinman
ATAL
2004
Springer
13 years 11 months ago
Distributed Path Planning for Robots in Dynamic Environments Using a Pervasive Embedded Network
We investigate the application of a low-cost, pervasively distributed network to plan paths for mobile robots in environments with dynamic obstacles. We consider a heterogeneous s...
Keith J. O'Hara, Tucker R. Balch