Sciweavers

6861 search results - page 30 / 1373
» Security for Ubiquitous Computing
Sort
View
ENTCS
2008
110views more  ENTCS 2008»
13 years 7 months ago
Exploring an Option Space to Engineer a Ubiquitous Computing System
Engineering natural and appropriate interactive behaviour in ubiquitous computing systems presents new challenges to their developers. This paper explores formal models of interac...
Michael D. Harrison, Christian Kray, José C...
APCHI
2008
IEEE
14 years 2 months ago
Development of a WS-ECA Rule Management System for a Healthcare Robot
Providing healthcare services to patients and elderly people has been an emerging application domain in ubiquitous computing technologies. The current trend toward long-term health...
Jaeil Park, Haining Lee, Peom Park, Dongmin Shin
ICDE
2008
IEEE
134views Database» more  ICDE 2008»
14 years 2 months ago
Managing primary context through web services
— The emergence of wireless sensor networks (WSN) and RFID technology are starting to make the ubiquitous computing vision a reality, as they provide the means to obtain informat...
Edgardo Avilés-López, J. Antonio Gar...
ACSAC
2010
IEEE
13 years 5 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
CHI
2003
ACM
14 years 8 months ago
Ubiquitous computing: by the people, for the people
Ali Ndiwalana, Christa M. Chewar, Jacob P. Somerve...