Sciweavers

391 search results - page 44 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
MSWIM
2006
ACM
14 years 2 months ago
Ticket-based mobile commerce system and its implementation
Security is a critical issue in mobile commerce, especially in mobile database systems since mobile environments are dynamic and traditional protection mechanisms do not work very...
Hua Wang, Xiaodi Huang, Goutham Reddy Dodda
MIDDLEWARE
2004
Springer
14 years 2 months ago
Adaptive resource discovery for ubiquitous computing
The terms pervasive and ubiquitous computing are used to describe a smart space populated by hundreds of intelligent devices that are embedded in their surroundings. Characteristi...
Rae Harbird, Stephen Hailes, Cecilia Mascolo
ICWN
2003
13 years 10 months ago
Adapting Content for Mobile Devices in Heterogeneous Collaboration Environments
The portability of new miniaturized devices, together with their ability to connect conveniently to networks in different places, makes mobile computing possible. Recent advances ...
Sangmi Lee, Sung Hoon Ko, Geoffrey Fox
DNIS
2010
Springer
194views Database» more  DNIS 2010»
14 years 3 months ago
Interface Tailoring by Exploiting Temporality of Attributes for Small Screens
In the pervasive computing era, mobile phones and personal digital assistants are widely used for data collection. The traditional user interfaces which are employed for data colle...
Mittapally Kumara Swamy, P. Krishna Reddy, R. Uday...
PERCOM
2010
ACM
14 years 17 days ago
Orchestrator: An active resource orchestration framework for mobile context monitoring in sensor-rich mobile environments
— In this paper, we present Orchestrator, an active resource orchestration framework for mobile context monitoring. Emerging pervasive environments will introduce a PAN-scale sen...
Seungwoo Kang, Youngki Lee, Chulhong Min, Younghyu...