In this paper, we propose a security management middleware in ubiquitous computing environments. This security management should be applicationoriented security and provides user-...
Zhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Ba...
Today mobile computing is pervasively taking over the traditional desktop computing. Mobile devices are characterized by abrupt and unannounced changes in execution context. The ap...
Uzair Ahmad, S. Y. Lee, Mahrin Iqbal, Uzma Nasir, ...
Abstract: Most of ambient intelligence studies have tried to employ inductive methods (e.g., data mining) to discover useful information and patterns from data streams on sensor ne...
Wireless communications and device miniaturization are enabling pervasive scenarios where the limited resource availability and the wide heterogeneity of access terminals make cruc...
Abstract. In the context of ubiquitous and pervasive computing, publish/subscribe middleware is gaining momentum due to its loosely coupled communication scheme. In this paper we p...