Sciweavers

391 search results - page 39 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
EICS
2009
ACM
14 years 3 months ago
Toward user interface virtualization: legacy applications and innovative interaction systems
Single-user, desktop-based computer applications are pervasive in our daily lives and work. The prospect of using these applications with innovative interaction systems, like mult...
Guillaume Besacier, Frédéric Vernier
PERVASIVE
2005
Springer
14 years 2 months ago
Service Discovery in TinyObj: Strategies and Approaches
In this paper, we describe TinyObj service discovery model, which uses short wireless packet broadcasts for service discovery within a user’s vicinity. We present a prototype im...
Pavel Poupyrev, Takahiro Sasao, Shunsuke Saruwatar...
CCS
2010
ACM
14 years 3 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
PETRA
2009
ACM
14 years 3 months ago
Ambient kitchen: designing situated services using a high fidelity prototyping environment
The Ambient Kitchen is a high fidelity prototype for exploring the design of pervasive computing algorithms and applications for everyday environments. The environment integrates ...
Patrick Olivier, Guangyou Xu, Andrew Monk, Jesse H...
PERVASIVE
2011
Springer
12 years 11 months ago
n-Gram Geo-trace Modeling
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. ...
Senaka Buthpitiya, Ying Zhang, Anind K. Dey, Marti...