Sciweavers

6861 search results - page 14 / 1373
» Security for Ubiquitous Computing
Sort
View
PERCOM
2011
ACM
12 years 10 months ago
Ubiquitous cloud: Managing service resources for adaptive ubiquitous computing
Abstract—The adaptive ubiquitous services, which dynamically adapt behaviors to requirements and contexts, are one of the major challenges in the ubiquitous computing. To facilit...
Koichi Egami, Shinsuke Matsumoto, Masahide Nakamur...
PERVASIVE
2004
Springer
14 years 25 days ago
Ubiquitous Chip: A Rule-Based I/O Control Device for Ubiquitous Computing
In this paper, we propose a new framework for ubiquitous computing by rule-based, event-driven I/O (input/output) control devices. Our approach is flexible and autonomous because ...
Tsutomu Terada, Masahiko Tsukamoto, Keisuke Hayaka...
EUC
2007
Springer
13 years 9 months ago
U-Interactive: A Middleware for Ubiquitous Fashionable Computer to Interact with the Ubiquitous Environment by Gestures
In this paper we present a system, called U-interactive, that provides spontaneous interactions between human and surrounding objects in heterogenous ubiquitous computing environme...
Gyudong Shim, SangKwon Moon, Yong Song, JaeSub Kim...
SAINT
2007
IEEE
14 years 1 months ago
Privacy Management for Context Transponders
While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to...
Michael Fahrmair, Wassiou Sitou, Bernd Spanfelner