Sciweavers

391 search results - page 60 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
PERCOM
2010
ACM
13 years 7 months ago
Service-based development of mobile real-time collaboration applications for Social Networks
—Social Networks will unfold their full potential when connected people are enabled to collaborate - any time, appropriate to the current location, activity and computing environ...
Daniel Schuster, Thomas Springer, Alexander Schill
HCW
1998
IEEE
14 years 27 days ago
The Globus Project: A Status Report
The Globus project is a multi-institutional research e ort that seeks to enable the construction of computational grids providing pervasive, dependable, and consistent access to h...
Ian T. Foster, Carl Kesselman
ICC
2007
IEEE
151views Communications» more  ICC 2007»
14 years 2 months ago
Sensing-Throughput Tradeoff for Cognitive Radio Networks
— In cognitive radio networks, the secondary network (users) are allowed to utilize the frequency bands of primary network (users) when they are not currently being used. To supp...
Ying-Chang Liang, Yonghong Zeng, Edward Chu Yeow P...
HOTOS
2003
IEEE
14 years 1 months ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris
FDG
2009
ACM
14 years 3 months ago
Games for passengers: accounting for motion in location-based applications
Passengers pay attention to the landscape as they move through the environment. We suggest a new type of applications, which adds to that experience. It consider their motion and ...
Liselott Brunnberg, Oskar Juhlin, Anton Gustafsson