Sciweavers

6861 search results - page 80 / 1373
» Security for Ubiquitous Computing
Sort
View
COMPSAC
2007
IEEE
14 years 4 months ago
Towards Requirements Engineering for Context Adaptive Systems
Building realistic end user scenarios for ubiquitous computing applications entails large up-front investments. Many context adaptive applications so far fail to live up to their ...
Wassiou Sitou, Bernd Spanfelner
BSN
2009
IEEE
158views Sensor Networks» more  BSN 2009»
14 years 5 months ago
Wearable Sensing for Dynamic Management of Dense Ubiquitous Media
— Most visions of ubiquitous computing anticipate a world permeated by a dense sampling of sensors, many of which will be capable of capturing, analyzing, and transmitting person...
Mathew Laibowitz, Nan-Wei Gong, Joseph A. Paradiso
PDP
2008
IEEE
14 years 4 months ago
CoDaMine: Communication Data Mining for Feedback and Control in Ubiquitous Environments
In ubiquitous environments an increasing number of sensors capture information on users and an increasing number of actuators present information to users. In this paper we presen...
Tom Gross, Mirko Fetter
ISPEC
2009
Springer
14 years 5 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...
IEEEARES
2007
IEEE
14 years 4 months ago
Self-Stabilization as a Foundation for Autonomic Computing
Olga Brukman, Shlomi Dolev, Yinnon A. Haviv, Reuve...