Sciweavers

1036 search results - page 168 / 208
» Ubiquitous Verification of Ubiquitous Systems
Sort
View
CHI
2009
ACM
14 years 9 days ago
Stress outsourced: a haptic social network via crowdsourcing
Stress OutSourced (SOS) is a peer-to-peer network that allows anonymous users to send each other therapeutic massages to relieve stress. By applying the emerging concept of crowds...
Keywon Chung, Carnaven Chiu, Xiao Xiao, Pei-Yu (Pe...
MOBILITY
2009
ACM
14 years 8 days ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
HUC
2009
Springer
14 years 6 days ago
A spotlight on security and privacy risks with future household robots: attacks and lessons
Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household r...
Tamara Denning, Cynthia Matuszek, Karl Koscher, Jo...
IDMS
2001
Springer
133views Multimedia» more  IDMS 2001»
14 years 1 days ago
An Access Control Architecture for Metropolitan Area Wireless Networks
This paper introduces a novel access control architecture for publicly accessible, wireless networks. The architecture was designed to address the requirements obtained from a case...
Stefan Schmid, Joe Finney, Maomao Wu, Adrian Frida...
ISCC
2000
IEEE
100views Communications» more  ISCC 2000»
14 years 3 hour ago
FATIMA: A Firewall-Aware Transparent Internet Mobility Architecture
Ubiquitous communication will be one of the paradigms for the next decades. The use of the Internet in such applications demands for a highly reliable and secure system, especiall...
Stefan Mink, Frank Pählke, Günter Sch&au...