In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Trust management model that we present is adapted for ubiquitous devices cooperation, rather than for classic client-supplier relationship. We use fuzzy numbers to represent trust...
Abstract. We present Supple, a novel toolkit which automatically generates interfaces for ubiquitous applications. Designers need only specify declarative models of the interface a...
Krzysztof Gajos, David B. Christianson, Raphael Ho...
Recent progress in ubiquitous computing technology is allowing development of new and sophisticated applications that are now able to store very large data on the mobile device it...
Cristiano Silveira, Leonardo Eloy, Jose Maria Mont...
In a highly mobile and active society, ubiquitous access to information and services is a general desire. The context of users is of high importance for an application to adapt aut...