Sciweavers

1373 search results - page 65 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
SIGMOD
2008
ACM
147views Database» more  SIGMOD 2008»
14 years 8 months ago
A demonstration of Cascadia through a digital diary application
The Cascadia system provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw RFID ...
Christopher Ré, Dan Suciu, Evan Welbourne, ...
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 10 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
GCC
2006
Springer
14 years 9 days ago
Redar: A Remote Desktop Architecture for the Distributed Virtual Personal Computing
Some popular computing technologies, such as ubiquitous computing, grid computing and thin-client computing, bring people to a much more distributed and pervasive computing enviro...
Yuedong Zhang, Zhenhua Song, Dingju Zhu, Zhuan Che...
CCECE
2006
IEEE
14 years 2 months ago
Security Issues in VOIP Applications
Recent Voice over Internet Protocol (VoIP) technology is attracting more and more attention and interest in the industry. VoIP applications such as IP telephony systems involve se...
Patrick C. K. Hung, Miguel Vargas Martin
PERVASIVE
2007
Springer
14 years 2 months ago
Objects Calling Home: Locating Objects Using Mobile Phones
Locating physical items is a highly relevant application addressed by numerous systems. Many of these systems share the drawback that costly infrastructure must be installed before...
Christian Frank, Philipp Bolliger, Christof Rodune...