Sciweavers

391 search results - page 16 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
PERCOM
2003
ACM
14 years 23 days ago
Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile
Passive RFID technology and unobtrusive Bluetoothenabled active tags are means to augment products and everyday objects with information technology invisible to human users. This ...
Frank Siegemund, Christian Floerkemeier
DIGRA
2005
Springer
14 years 1 months ago
Tangible Interfaces for Pervasive Gaming
With pervasive gaming, novel types of games have recently emerged. The idea is to apply pervasive computing technology - which embeds computers in real-world, everyday environment...
Andreas Schrader, Bernhard Jung, Darren Carlson
GI
2001
Springer
13 years 12 months ago
Infrastructure for Pervasive Computing: Challenges
: As mobile and embedded computing devices become more pervasive, it is becoming obvious that the nature of interactions between users and computers must evolve. Applications need ...
Karen Henricksen, Jadwiga Indulska, Andry Rakotoni...
PERCOM
2005
ACM
14 years 7 months ago
Middleware for User Controlled Environments
In this paper, we describe the middleware that has evolved from our attempt to capture user descriptions of policies controlling devices and services from natural language. Descri...
Bill Keller, Tim Owen, Ian Wakeman, Julie Weeds, D...
TDSC
2011
13 years 2 months ago
SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...