Sciweavers

304 search results - page 30 / 61
» Trusted Computing in Mobile Action
Sort
View
MIDDLEWARE
2004
Springer
14 years 1 months ago
Mobile adaptive tasks guided by resource contracts
This paper proposes a way to realize the idea of calm computing by adding a dynamic task model into the pervasive computing environment. This task model contains information about...
Peter Rigole, Yolande Berbers, Tom Holvoet
USENIX
2000
13 years 9 months ago
Location-Aware Scheduling with Minimal Infrastructure
Mobile computers often benefit from software which adapts to their location. For example, a computer might be backed up when at the office, or the default printer might always be ...
John S. Heidemann, Dhaval Shah
SOFSEM
2000
Springer
13 years 11 months ago
Hierarchies of Sensing and Control in Visually Guided Agents
The capability of perceiving the environment is crucial for advancing the level of autonomy and sophistication of (semi)autonomous robotic systems and determines the complexity of ...
Jana Kosecka
LISA
2008
13 years 10 months ago
Concord: A Secure Mobile Data Authorization Framework for Regulatory Compliance
With the increasing adoption of mobile computing devices that carry confidential data, organizations need to secure data in an ever-changing environment. Critical organizational d...
Gautam Singaraju, Brent Hoon Kang
CHI
2004
ACM
14 years 8 months ago
Understanding the micronote lifecycle: improving mobile support for informal note taking
People frequently write messages to themselves. These informal, hurried personal jottings serve as temporary storage for notable information as well as reminders for future action...
Min Lin, Wayne G. Lutters, Tina S. Kim