Sciweavers

608 search results - page 4 / 122
» Self-healing for Pervasive Computing Systems
Sort
View
WICSA
2007
13 years 8 months ago
Architecting Pervasive Computing Systems for Privacy: A Survey
In pervasive computing systems, a higher number of interactions will be mediated by computers, amplifying the menace to privacy. Privacy protection in pervasive environments is st...
Roberto Speicys Cardoso, Valérie Issarny
PERCOM
2004
ACM
14 years 7 months ago
Super Spaces: A Middleware for Large-Scale Pervasive Computing Environments
In previous work [1], we introduced a distributed middleware infrastructure for managing physicallybounded, standalone pervasive computing environments, which we refer to as Activ...
Jalal Al-Muhtadi, Shiva Chetan, Anand Ranganathan,...
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 8 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
AC
2003
Springer
14 years 17 days ago
System Support for Pervasive Applications
To make pervasive computing a reality, we need better system support for building, deploying, and using pervasive applications. In this paper, we identify the unique requirements ...
Robert Grimm, Brian N. Bershad
FEDCSIS
2011
90views more  FEDCSIS 2011»
12 years 7 months ago
Services Composition Model for Home-Automation peer-to-peer Pervasive Computing
—Collaborative mechanisms between services are a crucial aspect in the recent development of pervasive computing systems based on the paradigm of service-oriented architecture. C...
Juan A. Holgado-Terriza, Sandra Rodríguez-V...