Sciweavers

6861 search results - page 99 / 1373
» Security for Ubiquitous Computing
Sort
View
MHCI
2009
Springer
14 years 5 months ago
Examining human values in adopting ubiquitous technology in school
This paper summarizes value analysis of adopting technologysupported attendance control service in a primary school. The results are based on a case study that explored a 14-week ...
Minna Isomursu, Mari Ervasti, Marianne Kinnula, Pe...
CAISE
2003
Springer
14 years 4 months ago
Towards a Component based Privacy Protector Architecture
The development of mobile communication technology and ubiquitous computing paradigm and the emergence of m-healthcare, m-business and m-education services have raised the urgency ...
Amr Ali Eldin, René W. Wagenaar
AINA
2006
IEEE
14 years 22 days ago
HoNeY: a MHP-based Platform for HOme NEtwork interoperability
Home networks enable, potentially, an increased level of integration among appliances present in the house, enabling an ubiquitous control of devices and simplifying man/machine i...
Fabio Forno, Giovanni Malnati, Giuseppe Portelli
BCSHCI
2007
14 years 6 days ago
Habitats: a simple way to bridge artifacts, professions, and theories in ubiquitous design
This paper briefly shows how product designers as well as information system designers may use the habitat framework as a tool to inform their understanding of the pervasive compu...
Martin Brynskov, Gunnar Kramp
IEEEARES
2007
IEEE
14 years 5 months ago
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES)
The formidable difficulty in securing systems stems in large part from the increasing complexity of the systems we build but also the degree to which we now depend on information ...
David Arsenault, Arun Sood, Yih Huang