Sciweavers

6861 search results - page 13 / 1373
» Security for Ubiquitous Computing
Sort
View
ATC
2006
Springer
13 years 11 months ago
Ubisafe Computing: Vision and Challenges (I)
In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people some...
Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, Jingde ...
PERCOM
2010
ACM
13 years 5 months ago
A visual, open-ended approach to prototyping ubiquitous computing applications
By nature, ubiquitous computing applications are intimately intertwined with users' everyday life. This situation is challenging because it requires to make the development of...
Zoé Drey, Charles Consel
HPCC
2005
Springer
14 years 1 months ago
A SMS Based Ubiquitous Home Care System
In this study, we defined requirements of ubiquitous environment, which users can monitor and control situations of home anytime, anywhere. In addition we developed and built a mod...
Tae-Seok Lee, Yuan Yang, Myong-Soon Park
MIDDLEWARE
2007
Springer
14 years 1 months ago
A service-oriented virtual community overlay network for secure external service orchestration
The Service Oriented Architecture (SOA) is used extensively in ubiquitous computing environments. Using external service orchestration, services can be composed into applications....
Shudong Chen, Johan J. Lukkien
GI
2007
Springer
13 years 11 months ago
What is Ubiquitous about Ubiquitous Computing? - Space, Technology, Surveillance, and Behaviour
: Discussing ubiquitous computing, the role of space is not quite clear. To get an understanding of the thinking on space, the main concepts of absolute, relational, and social spa...
Martin Klamt