Sciweavers

6861 search results - page 116 / 1373
» Security for Ubiquitous Computing
Sort
View
ACSAC
1999
IEEE
14 years 3 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
13 years 10 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess
PERCOM
2005
ACM
14 years 10 months ago
Accessing Ubiquitous Services Using Smart Phones
The integration of Bluetooth service discovery protocol (SDP), and GPRS internet connectivity into phones provides a simple yet powerful infrastructure for accessing services in n...
Nishkam Ravi, Peter Stern, Niket Desai, Liviu Ifto...
SSDBM
2008
IEEE
101views Database» more  SSDBM 2008»
14 years 5 months ago
Scalable Ubiquitous Data Access in Clustered Sensor Networks
Wireless sensor networks have drawn much attention due to their ability to monitor ecosystems and wildlife habitats. In such systems, the data should be intelligently collected to ...
Yueh-Hua Lee, Alex Thomo, Kui Wu, Valerie King
SUTC
2010
IEEE
14 years 2 months ago
Towards the Development of an Ubiquitous Networked Robot Systems for Ambient Assisted Living
—Robotic middlewares increasingly allow the seamless integration of multiple heterogeneous robots into one distributed system. With the inclusion of ambient intelligence and perv...
Jayedur Rashid