This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
Pervasive computing applications are increasingly leveraging contextual information from several sources to provide users with behavior appropriate to the environment in which the...
Abstract— Throughout the world, GSM cellular mobile networks are being upgraded to support the “always-on” General Packet Radio Service (GPRS). Despite the apparent availabil...
Rajiv Chakravorty, Sachin Katti, Ian Pratt, Jon Cr...
Social networking applications have become very important web services that provide Internet-based platforms for their users to interact with their friends. With the advances in t...
The acceleration of rhythm of everyday life requires efficiency and flexibility in daily routines. The real expectations and needs of people concerning intelligent home devices sh...