Sciweavers

418 search results - page 48 / 84
» Trust Model for Mobile Devices in Ubiquitous Environment
Sort
View
FTDCS
2004
IEEE
14 years 13 days ago
An Architectural View of the Entities Required for Execution of Task in Pervasive Space
Aimed to provide computation ubiquitously, pervasive computing is perceived as a means to provide an user the transparency of anywhere, anyplace, anytime computing. Pervasive comp...
K. Kalapriya, S. K. Nandy, V. Satish, R. Uma Mahes...
SUTC
2008
IEEE
14 years 3 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
CIMAGING
2010
163views Hardware» more  CIMAGING 2010»
13 years 10 months ago
Automatic portion estimation and visual refinement in mobile dietary assessment
As concern for obesity grows, the need for automated and accurate methods to monitor nutrient intake becomes essential as dietary intake provides a valuable basis for managing die...
Insoo Woo, Karl Ostmo, SungYe Kim, David S. Ebert,...
SECON
2010
IEEE
13 years 6 months ago
Coexistence-Aware Scheduling for Wireless System-on-a-Chip Devices
Abstract--Today's mobile devices support many wireless technologies to achieve ubiquitous connectivity. Economic and energy constraints, however, drive the industry to impleme...
Lei Yang, Vinod Kone, Xue Yang, York Liu, Ben Y. Z...
ESAS
2007
Springer
14 years 18 days ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer