Sciweavers

289 search results - page 48 / 58
» Social Networking for Pervasive Adaptation
Sort
View
SAC
2006
ACM
14 years 1 months ago
Bootstrapping multi-party ad-hoc security
Increasingly pervasive computing throws up scenarios where users may wish to achieve some degree of security in their interaction with other people or equipment, in contexts where...
Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming...
LOCA
2005
Springer
14 years 1 months ago
Context Obfuscation for Privacy via Ontological Descriptions
Context information is used by pervasive networking and context-aware programs to adapt intelligently to different environments and user tasks. As the context information is poten...
Ryan Wishart, Karen Henricksen, Jadwiga Indulska
BDA
2003
13 years 9 months ago
Memory Requirements for Query Execution in Highly Constrained Devices
Pervasive computing introduces data management requirements that must be tackled in a growingvariety of lightweight computing devices. Personal folders on chip, networks of sensor...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
TMC
2012
11 years 10 months ago
MAC in Motion: Impact of Mobility on the MAC of Drive-Thru Internet
—The pervasive adoption of IEEE 802.11 radios in the past decade has made possible for the easy Internet access from a vehicle, notably drive-thru Internet. Originally designed f...
Tom H. Luan, Xinhua Ling, Xuemin Shen
ATAL
2005
Springer
14 years 1 months ago
Agent-organized networks for dynamic team formation
Many multi-agent systems consist of a complex network of autonomous yet interdependent agents. Examples of such networked multi-agent systems include supply chains and sensor netw...
Matthew E. Gaston, Marie desJardins