Sciweavers

6861 search results - page 82 / 1373
» Security for Ubiquitous Computing
Sort
View
SIGCSE
2004
ACM
95views Education» more  SIGCSE 2004»
14 years 3 months ago
Cryptography and computer security for undergraduates
The panel discusses solutions to the problem of computer security education. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: security and protection. E...
Paul De Palma, Charles Frank, Suzanne E. Gladfelte...
EDOC
2002
IEEE
14 years 3 months ago
Constraint Based Network Adaptation for Ubiquitous Applications
In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perfo...
Krish T. Krishnakumar, Morris Sloman
JUCS
2010
111views more  JUCS 2010»
13 years 8 months ago
Towards a Ubiquitous End-User Programming System for Smart Spaces
: This article presents a rule–based agent mechanism as the kernel of a ubiquitous end–user, UI–independent programming system. The underlying goal of our work is to allow en...
Manuel García-Herranz, Pablo A. Haya, Xavie...
PERCOM
2007
ACM
14 years 10 months ago
Pervasive Fabrication: Making Construction Ubiquitous in Education
The notion of "pervasive computing" has traditionally been identified with a focus on what might be called "pervasive processing". This paper, in contrast, argu...
Michael Eisenberg
PERCOM
2003
ACM
14 years 10 months ago
Trust for Ubiquitous, Transparent Collaboration
Brian Shand, Nathan Dimmock, Jean Bacon