Sciweavers

6861 search results - page 40 / 1373
» Security for Ubiquitous Computing
Sort
View
SAC
2006
ACM
14 years 1 months ago
Methods and guidelines for the design and development of domestic ubiquitous computing applications
Bringing ubiquitous computing applications to home environments is a great challenge. In our research we investigate how applications can be conceived, designed, and implemented t...
Albrecht Schmidt, Lucia Terrenghi
APNOMS
2006
Springer
13 years 11 months ago
A Profile Based Vertical Handoff Scheme for Ubiquitous Computing Environment
Specifically ubiquitous computing paradigm is based on seamless connectivity. And also to guarantee the seamless connectivity, an intelligent network management between heterogeneo...
Chung-Pyo Hong, Tae-Hoon Kang, Shin-Dug Kim
ICWE
2004
Springer
14 years 29 days ago
Using Web Services to Build Context-Aware Applications in Ubiquitous Computing
Ubiquitous and mobile web applications are typically very autonomous in nature, because they rely on additional information about the user’s context. In this paper we present a g...
Gerhard Austaller, Jussi Kangasharju, Max Müh...
IAT
2010
IEEE
13 years 5 months ago
Location-Based Semantic Matchmaking in Ubiquitous Computing
Ever increasing efforts are spent in developing techniques and tools for a full exploitation of semantics in mobile environments, able to overcome volatility and resource limitati...
Michele Ruta, Floriano Scioscia, Eugenio Di Sciasc...
PERCOM
2003
ACM
14 years 7 months ago
Smart Identification Frameworks for Ubiquitous Computing Applications
Abstract. We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe su...
Friedemann Mattern, Kay Römer, Thomas Dü...