Sciweavers

1373 search results - page 32 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
Ordering Management Actions in Pervasive Systems using Specification-enhanced Policies
A pervasive system features a plethora of devices, services and applications organized as a large distributed system. One approach to managing such systems is by policies where ad...
Chetan Shiva Shankar, Roy H. Campbell
WMCSA
2003
IEEE
14 years 1 months ago
Pervasive Information Acquisition for Mobile AR-Navigation Systems
Today car-navigation systems are increasingly penetrating the automotive market. However, the need for location-based information systems is no longer limited to cars. Mobile outd...
Wolfgang Narzt, Gustav Pomberger, Alois Ferscha, D...
FTDCS
2003
IEEE
14 years 1 months ago
Dynamic Component Composition for Functionality Adaptation in Pervasive Environments
With the increasing prevalence of mobile devices, computing is being carried out on devices with varied resource constraints and is afflicted by constant changes in run-time conte...
Nalini Moti Belaramani, Cho-Li Wang, Francis C. M....
ATC
2009
Springer
13 years 12 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
CCS
1994
ACM
14 years 20 days ago
Support for the File System Security Requirements of Computational E-Mail Systems
Computational e-mail systems, which allow mail messages to containcommandscripts that automaticallyexecute upon receipt, can be used as a basis for building a variety of collabora...
Trent Jaeger, Atul Prakash