Sciweavers

418 search results - page 27 / 84
» Trust Model for Mobile Devices in Ubiquitous Environment
Sort
View
ENTCS
2006
180views more  ENTCS 2006»
13 years 8 months ago
Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
Fernando Rosa Velardo, Olga Marroquín Alons...
ECEH
2007
98views Healthcare» more  ECEH 2007»
13 years 10 months ago
Integrating Context Information in a Mobile Environment using the eSana Framework
: Mobile devices are becoming ubiquitous in everyday’s life, their popularity and place independence are reasons for using these devices in different areas. One such area is elec...
Marco Savini, Henrik Stormer, Andreas Meier
CAISE
2008
Springer
13 years 10 months ago
Modelling, Simulation, and Performance Analysis of Business Processes Involving Ubiquitous Systems
A recent trend in Ubiquitous Computing is that embedded software (e.g. in production machines, wired or wireless networked sensors and actuators, or RFID readers) directly offers W...
Patrik Spieß, Dinh Khoa Nguyen, Ingo Weber, ...
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 8 months ago
A security framework for SOA applications in mobile environment
A Rapid evolution of mobile technologies has led to the development of more sophisticated mobile devices with better storage, processing and transmission power. These factors enab...
Johnneth de Sene Fonseca, Zair Abdelouahab, Deniva...
FGCS
2008
159views more  FGCS 2008»
13 years 8 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao