Sciweavers

391 search results - page 31 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
PERVASIVE
2009
Springer
14 years 2 months ago
Enabling Pervasive Collaboration with Platform Composition
Abstract. Emerging pervasive computing technologies present many opportunities to aid ad-hoc collocated group collaboration. To better understand ad-hoc collaboration using pervasi...
Trevor Pering, Roy Want, Barbara Rosario, Shivani ...
PERVASIVE
2007
Springer
13 years 7 months ago
Securing Pocket Hard Drives
Inexpensive portable storage devices that are available in the market today have made it easier for users to carry data and programs with them and borrow computing platforms when ...
Nishkam Ravi, Chandra Narayanaswami, Mandayam T. R...
PERVASIVE
2005
Springer
14 years 1 months ago
A Formal Model of Obfuscation and Negotiation for Location Privacy
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. ...
Matt Duckham, Lars Kulik
AINA
2007
IEEE
13 years 11 months ago
Fuzzy Recommendation towards QoS-Aware Pervasive Learning
Pervasive learning promises an exciting learning environment such that users can access content and study them at anytime, anywhere, through any devices. Besides delivering the ri...
Zhiwen Yu, Norman Lin, Yuichi Nakamura, Shoji Kaji...
PERVASIVE
2006
Springer
13 years 7 months ago
iCam: Precise at-a-Distance Interaction in the Physical Environment
Abstract. Precise indoor localization is quickly becoming a reality, but application demonstrations to date have been limited to use of only a single piece of location information ...
Shwetak N. Patel, Jun Rekimoto, Gregory D. Abowd