Sciweavers

608 search results - page 46 / 122
» Self-healing for Pervasive Computing Systems
Sort
View
PERVASIVE
2006
Springer
13 years 8 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
PERVASIVE
2011
Springer
12 years 11 months ago
Planning, Apps, and the High-End Smartphone: Exploring the Landscape of Modern Cross-Device Reaccess
The rapid growth of mobile devices has made it challenging for users to maintain a consistent digital history among all their personal devices. Even with a variety of cloud computi...
Elizabeth Bales, Timothy Sohn, Vidya Setlur
JDCTA
2010
182views more  JDCTA 2010»
13 years 3 months ago
Fusion Techniques for Reliable Information: A Survey
Information fused by multi-sensors is an important factor for obtaining reliable contextual information in smart spaces which use the pervasive and ubiquitous computing techniques...
Hyun Lee, Byoungyong Lee, Kyungseo Park, Ramez Elm...
PERCOM
2008
ACM
14 years 8 months ago
Towards Robust Low Cost Authentication for Pervasive Devices
Low cost devices such as RFIDs, sensor network nodes, and smartcards are crucial for building the next generation pervasive and ubiquitous networks. The inherent power and footpri...
Erdinç Öztürk, Ghaith Hammouri, B...
TPHOL
2005
IEEE
14 years 2 months ago
On the Correctness of Operating System Kernels
The Verisoft project aims at the pervasive formal verification of entire computer systems. In particular, the seamless verification of the academic system is attempted. This syst...
Mauro Gargano, Mark A. Hillebrand, Dirk Leinenbach...