Sciweavers

6861 search results - page 115 / 1373
» Security for Ubiquitous Computing
Sort
View
USS
2010
13 years 8 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
IAT
2005
IEEE
14 years 4 months ago
Trust Model for Open Ubiquitous Agent Systems
Trust management model that we present is adapted for ubiquitous devices cooperation, rather than for classic client-supplier relationship. We use fuzzy numbers to represent trust...
Martin Rehák, Lukás Foltýn, M...
HUC
2005
Springer
14 years 4 months ago
Fast and Robust Interface Generation for Ubiquitous Applications
Abstract. We present Supple, a novel toolkit which automatically generates interfaces for ubiquitous applications. Designers need only specify declarative models of the interface a...
Krzysztof Gajos, David B. Christianson, Raphael Ho...
CLEIEJ
2010
13 years 8 months ago
A Query Language for Data Access in Ubiquitous Environments
Recent progress in ubiquitous computing technology is allowing development of new and sophisticated applications that are now able to store very large data on the mobile device it...
Cristiano Silveira, Leonardo Eloy, Jose Maria Mont...
OTM
2005
Springer
14 years 4 months ago
Sharing Context Information in Semantic Spaces
In a highly mobile and active society, ubiquitous access to information and services is a general desire. The context of users is of high importance for an application to adapt aut...
Reto Krummenacher, Jacek Kopecký, Thomas St...