Sciweavers

1579 search results - page 6 / 316
» Simulation Model for Self-Adaptive Applications in Pervasive...
Sort
View
ICPPW
2006
IEEE
14 years 1 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
MOBICOM
2000
ACM
14 years 2 days ago
Challenges: an application model for pervasive computing
Ì Û Ý ÑÓ Ð ÓÑÔÙØ Ò Ú × Ò ÔÔÐ Ø ÓÒ× Ö ¹ Ú ÐÓÔ ¸ ÔÐÓÝ Ò Ù× ØÓ Ý Ó × ÒÓØ Ñ Ø Ø Ü¹ Ô Ø Ø ÓÒ× Ó Ø Ù× Ö ÓÑÑÙÒ ØÝ Ò Ð...
Guruduth Banavar, James Beck, Eugene Gluzberg, Jon...
ECOOPWEXCEPTION
2006
Springer
13 years 11 months ago
Exception Handling in CSCW Applications in Pervasive Computing Environments
Abstract. In this paper we present conceptual foundations of an exception handling model for context-aware CSCW applications. Human participation in the recovery actions is an inte...
Anand R. Tripathi, Devdatta Kulkarni, Tanvir Ahmed
COMPSAC
2006
IEEE
14 years 1 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
PERCOM
2006
ACM
14 years 7 months ago
Sentient Processes - Process-based Applications in Pervasive Computing
Users' tasks are typically a sequence of steps. Today, the goal of Pervasive Computing applications ? to support users in their tasks by using context information ? is only p...
Stephan Urbanski, Christian Becker, Kurt Rothermel