Sciweavers

418 search results - page 23 / 84
» Trust Model for Mobile Devices in Ubiquitous Environment
Sort
View
JDIM
2010
157views more  JDIM 2010»
13 years 3 months ago
Case studies on context-aware mobile multimedia services
: This paper explores the design, implementation and evaluation of context-aware mobile multimedia services by presenting six case studies on different application domains. The cas...
Timo Ojala
ITIIS
2010
265views more  ITIIS 2010»
13 years 7 months ago
A Recommender System for Device Sharing Based on Context-Aware and Personalization
In ubiquitous computing, invisible devices and software are connected to one another to provide convenient services to users [1][2]. Users hope to obtain a personalized service wh...
Jong-Hyun Park
DFMA
2005
IEEE
132views Multimedia» more  DFMA 2005»
14 years 2 months ago
Conditional Access in Mobile Systems: Securing the Application
This paper describes two protocols for the secure download of content protection software to mobile devices. The protocols apply concepts from trusted computing to demonstrate tha...
Eimear Gallery, Allan Tomlinson
GIS
2008
ACM
14 years 9 months ago
Using tomography for ubiquitous sensing
By embedding sensors in mobile devices, it is possible to exploit the ubiquitous presence of these devices to construct applications for large-scale sensing and monitoring of envi...
Stacy Patterson, Bassam Bamieh, Amr El Abbadi
ICDS
2009
IEEE
14 years 3 months ago
PaTac: Urban, Ubiquitous, Personalized Services for Citizens and Tourists
This paper presents the general design of an architecture, based on software agents and oriented to the semantic Web, for the development and deployment of urban, ubiquitous servi...
Luigi Ceccaroni, Victor Codina, Manel Palau, Marc ...