Sciweavers

67 search results - page 6 / 14
» Security Parallels between People and Pervasive Devices
Sort
View
PERVASIVE
2010
Springer
14 years 3 months ago
Virtual Compass: Relative Positioning to Sense Mobile Social Interactions
Abstract. There are endless possibilities for the next generation of mobile social applications that automatically determine your social context. A key element of such applications...
Nilanjan Banerjee, Sharad Agarwal, Paramvir Bahl, ...
ICIW
2007
IEEE
14 years 2 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
FGCS
2008
159views more  FGCS 2008»
13 years 8 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
JCM
2007
164views more  JCM 2007»
13 years 8 months ago
Body Sensor Network based on Soft Polymer Sensors and Wireless Communications
— Wireless communications is now completely pervasive, and already is used in many guises by people in everyday life. However until now, the information exchanged has been mainly...
Sarah Brady, Brian Carson, Donal O'Gorman, Niall M...
EDOC
2008
IEEE
14 years 3 months ago
Reliable Discovery and Selection of Composite Services in Mobile Environments
Service providers as we know them nowadays are the always-on “static” web service providers, that aim at Five9 availability (99.999%). Formal, or de-facto, standards, such as ...
Lucia Del Prete, Licia Capra