Sciweavers

3937 search results - page 153 / 788
» Questioning Ubiquitous Computing
Sort
View
97
Voted
ICPR
2006
IEEE
16 years 3 months ago
A probabilistic model with parsinomious representation for sensor fusion in recognizing activity in pervasive environment
To tackle the problem of increasing numbers of state transition parameters when the number of sensors increases, we present a probabilistic model together with several parsinomiou...
Dinh Q. Phung, Dung T. Tran
105
Voted
CHI
2008
ACM
16 years 3 months ago
Facet folders: flexible filter hierarchies with faceted metadata
Facet Folders are a visualization and interaction concept for filtering collections of personal data. Although visually derived from the ubiquitous folder hierarchies of file mana...
Markus Weiland, Raimund Dachselt
104
Voted
DATE
2007
IEEE
73views Hardware» more  DATE 2007»
15 years 9 months ago
Design methods for security and trust
The design of ubiquitous and embedded computers focuses on cost factors such as area, power-consumption, and performance. Security and trust properties, on the other hand, are oft...
Ingrid Verbauwhede, Patrick Schaumont
146
Voted
SASO
2007
IEEE
15 years 9 months ago
Adaptive Self-optimization in Distributed Dynamic Environments
Grid and ubiquitous computing systems generally consist of a large number of networked nodes with applications implemented as distributed services or processes, respectively. A cr...
Wolfgang Trumler, Andreas Pietzowski, Benjamin Sat...
138
Voted
ECUMN
2007
Springer
15 years 8 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...