Sciweavers

6861 search results - page 27 / 1373
» Security for Ubiquitous Computing
Sort
View
DBSEC
2011
245views Database» more  DBSEC 2011»
12 years 11 months ago
Multilevel Secure Data Stream Processing
Abstract. With sensors and mobile devices becoming ubiquitous, situation monitoring applications are becoming a reality. Data Stream Management Systems (DSMSs) have been proposed t...
Raman Adaikkalavan, Indrakshi Ray, Xing Xie
ITRUST
2004
Springer
14 years 27 days ago
Towards Dynamic Security Perimeters for Virtual Collaborative Networks
Abstract The Internet provides a ubiquitous, standards-based substrate for global communications of all kinds. Rapid advances are now being made in agreeing protocols and machine-p...
Ivan Djordjevic, Theodosis Dimitrakos
MDM
2005
Springer
147views Communications» more  MDM 2005»
14 years 1 months ago
Demo: mobile database administrator-MDBA
Increasingly advances in mobile computing are allowing development of the applications for ubiquitous computing environment. Ubiquitous computing represents the concepts of comput...
Fernando Siqueira, Angelo Brayner
INTERACT
2007
13 years 9 months ago
Ubiquitous Substitution
Abstract. Ubiquitous interaction places the user in the centre of dynamic configurations of technology, where work not necessarily is performed through a single personal computer, ...
Christina Brodersen, Susanne Bødker, Clemen...
PERCOM
2005
ACM
14 years 1 months ago
Design and Implementation of "kubit" for Sensing and Control Ubiquitous Applications
Towards the wide acceptance of ubiquitous networking, practical and deployable ubiquitous applications must be provided in a concrete and easily understandable form to end-users. ...
Kiyohito Yoshihara, Shinji Motegi, Hiroki Horiuchi