Sciweavers

6861 search results - page 104 / 1373
» Security for Ubiquitous Computing
Sort
View
MHCI
2004
Springer
14 years 4 months ago
The Personal Audio Loop: Designing a Ubiquitous Audio-Based Memory Aid
Sound is an important medium in our lives, but its ephemeral nature can be problematic when people cannot recall something they heard in the past. Motivated by everyday conversatio...
Gillian R. Hayes, Shwetak N. Patel, Khai N. Truong...
UIST
1997
ACM
14 years 2 months ago
CyberDesk: A Framework for Providing Self-Integrating Ubiquitous Software Services
Current software suites suffer from problems due to poor integration of their individual tools. They require the designer to think of all possible integrating behaviours and leave...
Anind K. Dey, Gregory D. Abowd, Mike Pinkerton, An...
APNOMS
2006
Springer
14 years 2 months ago
The Soft Bound Admission Control Algorithm for Vertical Handover in Ubiquitous Environment
Abstract. In this paper, we present SBAC (Soft Bound Admission Control) algorithm considering critical bandwidth ratio to reduce handover blocking probability over WLAN and WAAN (W...
Ok Sik Yang, Jong Min Lee, Jun Kyun Choi, Seong Go...
EUC
2008
Springer
14 years 16 days ago
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation
The first challenge that we tackle in this paper is how to conduct access control in ubiquitous environments where sites have to handle access requests from their own users as wel...
Omar Hasan, Jean-Marc Pierson, Lionel Brunie
RTCSA
2006
IEEE
14 years 4 months ago
objSampler: A Ubiquitous Logging Tool for Recording Encounters with Real World Objects
We propose a novel tool, called objSampler, with which users can record and recall “encounters” with objects in ubiquitous computing environments. We encounter various things,...
Jun'ichi Yura, Hideaki Ogawa, Taizo Zushi, Jin Nak...