Sciweavers

4998 search results - page 760 / 1000
» The case for intentional networking
Sort
View
PERCOM
2008
ACM
14 years 8 months ago
HARMONI: Context-aware Filtering of Sensor Data for Continuous Remote Health Monitoring
A promising architecture for remote healthcare monitoring involves the use of a pervasive device (such as a cellular phone), which aggregates data from multiple body-worn medical ...
Iqbal Mohomed, Archan Misra, Maria Ebling, William...
PERCOM
2008
ACM
14 years 8 months ago
Provably Correct Pervasive Computing Environments
The field of pervasive computing has seen a lot of exciting innovations in the past few years. However, there are currently no mechanisms for describing the properties and capabil...
Anand Ranganathan, Roy H. Campbell
PERCOM
2006
ACM
14 years 8 months ago
Enabling Energy-Efficient and Quality Localization Services
Recent localization research has focused on improving the accuracy of pinpointing the physical location of a target. We think that the energy efficiency and the quality of the loc...
Tsung-Han Lin, Polly Huang, Hao-Hua Chu, Hsing-Hau...
PERCOM
2005
ACM
14 years 8 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
PERCOM
2004
ACM
14 years 8 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles