Sciweavers

90 search results - page 5 / 18
» Using Adaptative Encryption for Ubiquitous Environments
Sort
View
CSREASAM
2007
13 years 10 months ago
Contextual Risk-Based Access Control
- Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are in...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
HCI
2007
13 years 10 months ago
Sensor-Driven Adaptation of Web Document Presentation
The increasing variety of user device technologies has raised the necessity for ubiquitous content provision, which is characterized by “intelligent” content delivery to end us...
Spyros Nathanail, Vassileios Tsetsos, Stathes Hadj...
ICC
2007
IEEE
101views Communications» more  ICC 2007»
14 years 2 months ago
Multi-Device Seamless Service by User-Oriented Session in All-IP Network
—Evolutionary development towards all-IP networks will have various kinds of devices connected to the Internet. In such the ubiquitous networking environment with the features of...
Naoki Imai, Manabu Isomura, Hiroki Horiuchi
HASE
1996
IEEE
14 years 22 days ago
Adaptive recovery for mobile environments
Mobile computing allows ubiquitous and continuousaccess to computing resources while the users travel or work at a client's site. The flexibility introduced by mobile computi...
Nuno Neves, W. Kent Fuchs
WOWMOM
2005
ACM
126views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Personalized Service Composition for Ubiquitous Multimedia Delivery
Digital multimedia has gained popularity due to the huge success of the Internet. Users acquire and disseminate multimedia information using different types of devices and communi...
Swaroop Kalasapur, Mohan Kumar, Behrooz Shirazi