Sciweavers

90 search results - page 7 / 18
» Using Adaptative Encryption for Ubiquitous Environments
Sort
View
JUCS
2010
135views more  JUCS 2010»
13 years 7 months ago
A Service-Oriented Platform for Ubiquitous Personalized Multimedia Provisioning
: As multimedia contents are becoming widely used in ubiquitous computing environments among many application fields, e.g., education, entertainment, and live surveillance, the dem...
Zhiwen Yu, Changde Li, Xingshe Zhou, Haipeng Wang
OTM
2005
Springer
14 years 2 months ago
OWL-Based User Preference and Behavior Routine Ontology for Ubiquitous System
In ubiquitous computing, behavior routine learning is the process of mining the context-aware data to find interesting rules on the user’s behavior, while preference learning tri...
Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee
ECUMN
2007
Springer
14 years 2 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
INFORMATIKTAGE
2008
13 years 10 months ago
Context-Dependent and Self-Responsible Migration of Software Agents in Heterogeneous Environments
: Software agents are often employed in distributed environments to cope with the various dynamical dimensions of such systems. Furthermore, the paradigm of agent-oriented software...
Dirk Bade
MIDDLEWARE
2005
Springer
14 years 2 months ago
Adaptive query processing in mobile environment
These last years, the evolution of nomadic terminals and mobile networks has yield to the development of the ubiquitous computing. In this context, actual query evaluation and opt...
Hocine Grine, Thierry Delot, Sylvain Lecomte