Sciweavers

1579 search results - page 5 / 316
» Simulation Model for Self-Adaptive Applications in Pervasive...
Sort
View
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 9 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
IJACTAICIT
2010
146views more  IJACTAICIT 2010»
13 years 5 months ago
Modeling and Simulation of a Pervasive Multimodal Multimedia Computing System for Visually-Impaired Users
Using multimodality in a computing system is advantageous in the sense that it makes computing more accessible to a wide range of users including those with impairments. Our work ...
Ali Awde, Moeiz Miraoui, Chakib Tadj, Yacine Belli...
IWCMC
2010
ACM
13 years 9 months ago
Decentralized service composition in pervasive computing environments
In a pervasive computing environment, the devices are embedded in the physical world, providing services and interconnected by a communication network. Composition of these servic...
Joanna Izabela Siebert, Jiannong Cao, Long Cheng, ...
KER
2007
90views more  KER 2007»
13 years 7 months ago
Ontology-based models in pervasive computing systems
Pervasive computing is by its nature open and extensible, and must integrate the information from a diverse range of sources. This leads to a problem of information exchange, so s...
Juan Ye, Lorcan Coyle, Simon Dobson, Paddy Nixon
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 8 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...