Sciweavers

6317 search results - page 287 / 1264
» System Support for Pervasive Applications
Sort
View
142
Voted
PERCOM
2005
ACM
16 years 4 months ago
Reducing the Calibration Effort for Location Estimation Using Unlabeled Samples
WLAN location estimation based on 802.11 signal strength is becoming increasingly prevalent in today's pervasive computing applications. As alternative to the wellestablished...
Xiaoyong Chai, Qiang Yang
175
Voted
MOBISYS
2003
ACM
16 years 4 months ago
Service-Oriented Network Sockets
3], in that it integrates a service-oriented abstraction with the operating system socket interface and provides adaptive service access at the end-host session layer. However, our...
Umar Saif, Justin Mazzola Paluska
153
Voted
HUC
2011
Springer
14 years 4 months ago
The social fMRI: measuring, understanding, and designing social mechanisms in the real world
A key challenge of data-driven social science is the gathering of high quality multi-dimensional datasets. A second challenge relates to design and execution of structured experim...
Nadav Aharony, Wei Pan, Cory Ip, Inas Khayal, Alex...
134
Voted
CCS
2008
ACM
15 years 6 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
142
Voted
IESA
2007
15 years 6 months ago
A Security Framework for Smart Ubiquitous Industrial Resources
Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distribut...
Anton Naumenko, Artem Katasonov, Vagan Y. Terziyan