Sciweavers

1036 search results - page 157 / 208
» Ubiquitous Verification of Ubiquitous Systems
Sort
View
PERCOM
2008
ACM
14 years 7 months ago
Towards Robust Low Cost Authentication for Pervasive Devices
Low cost devices such as RFIDs, sensor network nodes, and smartcards are crucial for building the next generation pervasive and ubiquitous networks. The inherent power and footpri...
Erdinç Öztürk, Ghaith Hammouri, B...
PERCOM
2008
ACM
14 years 7 months ago
On-demand Video Streaming in Mobile Opportunistic Networks
Providing on-demand video streaming services to large numbers of nodes in mobile wireless networks is a challenging task. We propose MOVi (Mobile Opportunistic Video-on-demand), a...
Hayoung Yoon, JongWon Kim, Feiselia Tan, Robert Hs...
PERCOM
2008
ACM
14 years 7 months ago
MyNet: A Platform for Secure P2P Personal and Social Networking Services
Recent advances in peer-to-peer (P2P) technologies will enable users to establish ubiquitous connectivity among their personal networked devices and those of others. Building on t...
Dimitris N. Kalofonos, Zoe Antoniou, Franklin Reyn...
IUI
2009
ACM
14 years 4 months ago
Designing user interface adaptation rules with T: XML
The specification of model adaptation and generation rules is a topic of great interest for the user interface development community, since there are more and more approaches supp...
Víctor López-Jaquero, Francisco Mont...
HICSS
2010
IEEE
187views Biometrics» more  HICSS 2010»
14 years 2 months ago
Engaging the Periphery for Visual Communication on Mobile Phones
While mobile phones have become ubiquitous instruments of communication and social interaction, they still require explicit interaction, placing high demands on attention. Engagin...
Lisa Cowan, William G. Griswold, Louise Barkhuus, ...