Sciweavers

1373 search results - page 19 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
EUROPAR
2008
Springer
13 years 10 months ago
Building Secure Resources to Ensure Safe Computations in Distributed and Potentially Corrupted Environments
Abstract. Security and fault-tolerance is a big issue for intensive parallel computing in pervasive environments with hardware errors or malicious acts that may alter the result. I...
Sébastien Varrette, Jean-Louis Roch, Guilla...
PERCOM
2005
ACM
14 years 8 months ago
A Location Model for Pervasive Computing Environments
This paper presents a world model for location-aware and user-aware services in ubiquitous computing environments. It can be dynamically organized like a tree based on geographica...
Ichiro Satoh
PERVASIVE
2005
Springer
14 years 2 months ago
Embedded Assessment: Overcoming Barriers to Early Detection with Pervasive Computing
Abstract. Embedded assessment leverages the capabilities of pervasive computing to advance early detection of health conditions. In this approach, technologies embedded in the home...
Margaret E. Morris, Stephen S. Intille, Jennifer B...
MIDDLEWARE
2005
Springer
14 years 2 months ago
Managing the follow-me semantics to build large-scale pervasive applications
In this paper, we present the concept of follow-me semantics of the large-scale pervasive application and discuss the features and services to its implementation based on the inte...
Iara Augustin, Adenauer C. Yamin, Cláudio F...
EDBT
2010
ACM
147views Database» more  EDBT 2010»
14 years 3 months ago
A simple (yet powerful) algebra for pervasive environments
Querying non-conventional data is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is the ability to qu...
Yann Gripay, Frédérique Laforest, Je...