Sciweavers

6861 search results - page 64 / 1373
» Security for Ubiquitous Computing
Sort
View
HUC
2003
Springer
14 years 26 days ago
Social Network Computing
Abstract. A ubiquitous wearable computing infrastructure is now firmly entrenched within organizations across the globe, yet much of its potential remains untapped. This paper desc...
Nathan Eagle, Alex Pentland
ICDCSW
2008
IEEE
14 years 2 months ago
A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks
Reputation and Trust-based Monitoring Systems (RTMSs) have provided a ubiquitous framework for secure Wireless Sensor Network (WSN) computing. Employing sensors for neighborhood m...
Avinash Srinivasan, Feng Li, Jie Wu
CHI
2003
ACM
14 years 8 months ago
The toilet entertainment system
A toilet is not only a place where people answer calls of nature. It is also a place for contemplation and reflection ? and a place where people read information. But bringing thi...
Johan Thoresson, Pär Stenberg
EUROPAR
2004
Springer
14 years 1 months ago
UVOD: A Jini-Based Ubiquitous VOD Service Architecture
In this paper, we present a ubiquitous VOD service architecture (UVOD) that provides mobile users with a seamless VOD service.
Tae-uk Choi, Ki-Dong Chung
ENTCS
2007
110views more  ENTCS 2007»
13 years 7 months ago
A Bayesian Model for Event-based Trust
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...
Mogens Nielsen, Karl Krukow, Vladimiro Sassone