Sciweavers

1373 search results - page 24 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
DEBS
2010
ACM
14 years 14 days ago
Reliable complex event detection for pervasive computing
Complex event processing for pervasive computing must deal with various sources of error. In this paper, we focus on improving complex event detector handling of several types of ...
Dan O'Keeffe, Jean Bacon
PERCOM
2003
ACM
14 years 1 months ago
Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile
Passive RFID technology and unobtrusive Bluetoothenabled active tags are means to augment products and everyday objects with information technology invisible to human users. This ...
Frank Siegemund, Christian Floerkemeier
WETICE
2006
IEEE
14 years 2 months ago
Co-Presence Communities: Using Pervasive Computing to Support Weak Social Networks
Although the strongest social relationships feature most prominently in our lives, we also maintain a multitude of much weaker connections: the distant colleagues that we share a ...
Jamie Lawrence, Terry R. Payne, David De Roure
SIGSOFT
2010
ACM
13 years 6 months ago
Multiplicity computing: a vision of software engineering for next-generation computing platform applications
New technologies have recently emerged to challenge the very nature of computing: multicore processors, virtualized operating systems and networks, and data-center clouds. One can...
Cristian Cadar, Peter Pietzuch, Alexander L. Wolf
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
14 years 14 days ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...