Sciweavers

391 search results - page 29 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
PERVASIVE
2004
Springer
14 years 27 days ago
Microbiology Tray and Pipette Tracking as a Proactive Tangible User Interface
Abstract. Many work environments can benefit from integrated computing devices to provide information to users, record users’ actions, and prompt users about the next steps to t...
Harlan Hile, Jiwon Kim, Gaetano Borriello
EUC
2008
Springer
13 years 9 months ago
A Probabilistic Approach to Consistency Checking for Pervasive Context
Context-awareness is a key issue in pervasive computing. Context-aware applications are prone to the context consistency problem, where applications are confronted with conflictin...
Yu Huang 0002, Xiang Ma, XianPing Tao, Jiannong Ca...
PERCOM
2006
ACM
14 years 7 months ago
Developing a Model for Trust Management in Pervasive Devices
Pervasive devices interacting in open and dynamic spaces with each others require a mechanism that allows them acting autonomously in a secure way and protecting their resources. ...
Andrés Marín López, Daniel Di...
SASO
2008
IEEE
14 years 1 months ago
Pervasive Self-Learning with Multi-modal Distributed Sensors
Truly ubiquitous computing poses new and significant challenges. A huge number of heterogeneous devices will interact to perform complex distributed tasks. One of the key aspects...
Nicola Bicocchi, Marco Mamei, Andrea Prati, Rita C...
CSREASAM
2008
13 years 9 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao