Sciweavers

1373 search results - page 15 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
SAC
2009
ACM
14 years 1 months ago
Self-organized control of knowledge generation in pervasive computing systems
Pervasive computing devices (e.g., sensor networks, localization devices, cameras, etc.) are increasingly present in every aspect of our lives. These devices are able to generate ...
Gabriella Castelli, Ronaldo Menezes, Franco Zambon...
PERCOM
2007
ACM
14 years 8 months ago
Good Manners for Pervasive Computing--An Approach Based on the Ambient Calculus
When people interact, they follow distinct rules that coordinate the order of speech, who opens doors, whom and how to greet, and many things more. Such a social codex depends on ...
Gregor Schiele, Marcus Handte, Christian Becker
IFM
2010
Springer
132views Formal Methods» more  IFM 2010»
13 years 6 months ago
From Operating-System Correctness to Pervasively Verified Applications
Though program verification is known and has been used for decades, the verification of a complete computer system still remains a grand challenge. Part of this challenge is the in...
Matthias Daum, Norbert Schirmer, Mareike Schmidt
ICDCS
2002
IEEE
14 years 1 months ago
Balancing Performance, Energy, and Quality in Pervasive Computing
We describe Spectra, a remote execution system for batterypowered clients used in pervasive computing. Spectra enables applications to combine the mobility of small devices with t...
Jason Flinn, SoYoung Park, Mahadev Satyanarayanan
ASAP
2008
IEEE
182views Hardware» more  ASAP 2008»
14 years 3 months ago
Low-cost implementations of NTRU for pervasive security
NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design ...
Ali Can Atici, Lejla Batina, Junfeng Fan, Ingrid V...