Sciweavers

181 search results - page 24 / 37
» Semantically-Enhanced Ubiquitous User Modeling
Sort
View
FC
2010
Springer
260views Cryptology» more  FC 2010»
13 years 8 months ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
PUC
2002
82views more  PUC 2002»
13 years 7 months ago
A Location Model for Communicating and Processing of Context
Location is one of the most important elements of context in ubiquitous computing. In this paper we describe a location model, a spatial-aware communication model and an implement...
Michael Beigl, Tobias Zimmer, Christian Decker
JUCS
2008
145views more  JUCS 2008»
13 years 7 months ago
Development of Ambient Intelligence Systems Based on Collaborative Task Models
: So far, the Ambient Intelligence (AmI) paradigm has been applied to the development of a great variety of real systems. They use advanced technologies such as ubiquitous computin...
Roberto F. Arroyo, Miguel Gea, José Luis Ga...
RE
2010
Springer
13 years 2 months ago
A goal-based framework for contextual requirements modeling and analysis
Abstract Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerg...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini
WISE
2006
Springer
14 years 1 months ago
Finding Reliable Recommendations for Trust Model
This paper presents a novel context-based approach to find reliable recommendations for trust model in ubiquitous environments. Context is used in our approach to analyze the userâ...
Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Ko...