Sciweavers

391 search results - page 38 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
PERCOM
2009
ACM
14 years 3 months ago
A High-Performance Remote Computing Platform
— The pervasive computing environment and the wide network bandwidth provide users more opportunities to utilize remote computing resources. In this paper, we introduce a highper...
Huifeng Shen, Yan Lu, Feng Wu, Shipeng Li
MM
2005
ACM
150views Multimedia» more  MM 2005»
14 years 2 months ago
Reading SCORM compliant multimedia courses using heterogeneous pervasive devices
The Sharable Content Object Reference Model (SCORM) provides some important representation for distance learning content and the learning behavior. In general, SCORM-Compliant lea...
Te-Hua Wang, Hsuan-Pu Chang, Yun-Long Sie, Kun-Han...
WINET
2002
169views more  WINET 2002»
13 years 8 months ago
Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments
In the near future, we will see dramatic changes in computing and networking hardware. A large number of devices (e.g., phones, PDAs, even small household appliances) will become c...
Lalana Kagal, Vlad Korolev, Sasikanth Avancha, Anu...
PDP
2008
IEEE
14 years 3 months ago
Privacy Protection in Context Transfer Protocol
In the future 4G wireless networks will span across different administrative domains. In order to provide secure seamless handovers in such an environment the Context Transfer Pro...
Giorgos Karopoulos, Georgios Kambourakis, Stefanos...
PERCOM
2007
ACM
14 years 8 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...