Sciweavers

391 search results - page 52 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
MOBISYS
2008
ACM
14 years 8 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
EUPROJECTS
2006
Springer
14 years 9 days ago
Human Computer Confluence
Pervasive Computing has postulated to invisibly integrate technology into everyday objects in such a way, that these objects turn into smart things. Not only a single object of thi...
Alois Ferscha, Stefan Resmerita, Clemens Holzmann
ATC
2009
Springer
13 years 12 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
AAAI
2007
13 years 11 months ago
Adaptive Localization in a Dynamic WiFi Environment through Multi-view Learning
Accurately locating users in a wireless environment is an important task for many pervasive computing and AI applications, such as activity recognition. In a WiFi environment, a m...
Sinno Jialin Pan, James T. Kwok, Qiang Yang, Jeffr...
EDOC
2008
IEEE
14 years 3 months ago
Reliable Discovery and Selection of Composite Services in Mobile Environments
Service providers as we know them nowadays are the always-on “static” web service providers, that aim at Five9 availability (99.999%). Formal, or de-facto, standards, such as ...
Lucia Del Prete, Licia Capra