Sciweavers

6861 search results - page 103 / 1373
» Security for Ubiquitous Computing
Sort
View
JNW
2007
81views more  JNW 2007»
13 years 10 months ago
A Ubiquitous Care-Support Service based on Agent-oriented Multiple-Context Coordination
Abstract— This paper presents a gentle system for supervising care-support services that fulfill users’ actual requirements based on their physical locations and statuses of s...
Hideyuki Takahashi, Yoshikazu Tokairin, Kazuhiro Y...
GIS
2008
ACM
14 years 11 months ago
Using tomography for ubiquitous sensing
By embedding sensors in mobile devices, it is possible to exploit the ubiquitous presence of these devices to construct applications for large-scale sensing and monitoring of envi...
Stacy Patterson, Bassam Bamieh, Amr El Abbadi
EUC
2007
Springer
14 years 5 months ago
A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks
Abstract. Random key pre-distribution schemes are vulnerable to collusion attacks. In this paper, we propose a new key management scheme for ubiquitous heterogeneous sensor network...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
SIGCSE
2005
ACM
192views Education» more  SIGCSE 2005»
14 years 4 months ago
Ubiquitous presenter: increasing student access and control in a digital lecturing environment
The University of Washington’s Classroom Presenter lecturing system enables an active lecturing environment by combining a standard electronic slide presentation format with the...
Michelle Wilkerson, William G. Griswold, Beth Simo...
EUC
2005
Springer
14 years 4 months ago
Ubiquitous Learning on Pocket SCORM
With advanced technologies, computer devices have become smaller and powerful. As a result, many people enjoy ubiquitous learning using mobile devices such as Pocket PCs. Pocket PC...
Hsuan-Pu Chang, Wen-Chih Chang, Yun-Long Sie, Nige...