Sciweavers

639 search results - page 20 / 128
» Ubiquitous Application Development using a Mobile Agent-base...
Sort
View
ACMDIS
2004
ACM
14 years 23 days ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
PDCAT
2004
Springer
14 years 21 days ago
UbiqStor: A Remote Storage Service for Mobile Devices
In Ubiquitous computing environment the mobile devices such as PDAs necessarily connect to remote storage servers. We present an iSCSI caching system that localizes iSCSI target to...
MinHwan Ok, Daegeun Kim, Myong-Soon Park
CHI
2011
ACM
12 years 11 months ago
Publics in practice: ubiquitous computing at a shelter for homeless mothers
Today, commodity technologies like mobile phones—once symbols of status and wealth—have become deeply woven into social and economic participation in Western society. Despite ...
Christopher A. Le Dantec, Robert G. Farrell, Jim C...
PERCOM
2004
ACM
14 years 7 months ago
Supporting Persistent Social Groups in Ubiquitous Computing Environments Using Context-Aware Ephemeral Group Service
In this paper, we analyze the role of the social group in a Ubiquitous Computing (Ubicomp) environment as a source of contextual information. A model is presented to address the s...
Bin Wang, John Bodily, Sandeep K. S. Gupta
CCS
2000
ACM
13 years 11 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan