Sciweavers

1036 search results - page 29 / 208
» Ubiquitous Verification of Ubiquitous Systems
Sort
View
EDOC
2002
IEEE
14 years 15 days ago
Constraint Based Network Adaptation for Ubiquitous Applications
In this paper, we present a constraint-based approach for selecting and deploying active network components, called proxylets, which execute on servers within the network to perfo...
Krish T. Krishnakumar, Morris Sloman
IEEEMM
2006
97views more  IEEEMM 2006»
13 years 7 months ago
Ubiquitous Experience Media
A ubiquitous computing environment will become a solid social infrastructure for recording human experiences in the real world and facilitating human activities. The captured acti...
Kenji Mase, Yasuyuki Sumi, Tomoji Toriyama, Megumu...
ACISP
2006
Springer
14 years 1 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
SAC
2005
ACM
14 years 1 months ago
Intelligent file management in ubiquitous environments
The paradigm of Ubiquitous computing seeks to build a computing environment that responds to user context. An ideal file system for the Ubiquitous environment is one that can succ...
Kartik Vishwanath, Arvind Gautam, Yugyung Lee
JNW
2007
81views more  JNW 2007»
13 years 7 months ago
A Ubiquitous Care-Support Service based on Agent-oriented Multiple-Context Coordination
Abstract— This paper presents a gentle system for supervising care-support services that fulfill users’ actual requirements based on their physical locations and statuses of s...
Hideyuki Takahashi, Yoshikazu Tokairin, Kazuhiro Y...