Sciweavers

1373 search results - page 33 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
Towards seamless mobility on pervasive hardware
Preserving one's uniquely customized computing environment as one moves to different locations is an enduring challenge in mobile computing. We examine why this capability is...
Mahadev Satyanarayanan, Michael Kozuch, Casey Helf...
DEON
2008
Springer
13 years 10 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
PERVASIVE
2008
Springer
13 years 8 months ago
Rapid Prototyping of Activity Recognition Applications
The Context Recognition Network (CRN) Toolbox permits fast implementation of activity and context recognition systems. It utilizes parameterizable and reusable software components...
David Bannach, Oliver Amft, Paul Lukowicz
WOA
2003
13 years 10 months ago
Filling the Gap Between Users and Objects: a Multichannel Interactive Environment
— The design and the implementation of software for mobile computers and for pervasive computing environments entail several issues and lead to new requirements. Applications mus...
Davide Carboni, Andrea Piras, Stefano Sanna, Gavin...
ICDCS
2006
IEEE
14 years 2 months ago
Application-Tailored Cache Consistency for Wide-Area File Systems
The inability to perform optimizations based on application-specific information presents a hurdle to the deployment of pervasive LAN file systems across WAN environments. This pa...
Ming Zhao 0002, Renato J. O. Figueiredo