Sciweavers

13007 search results - page 2264 / 2602
» Wireless and Mobile Networking
Sort
View
PERCOM
2006
ACM
16 years 3 months ago
Plan B: An Operating System for Ubiquitous Computing Environments
The conventional approach for building pervasive environments relies on middleware to integrate different systems. Instead, we have built a system that can deal with these environ...
Francisco J. Ballesteros, Enrique Soriano, Katia L...
PERCOM
2006
ACM
16 years 3 months ago
Customizable Pervasive Applications
Human behavior and housing resist every standardization effort. Many aspects such as different technical equipment, furniture, and usage patterns make our surroundings as individu...
Torben Weis, Marcus Handte, Mirko Knoll, Christian...
PERCOM
2006
ACM
16 years 3 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
PERCOM
2006
ACM
16 years 3 months ago
Transmission control scheme for fast RFID object identification
There are a variety of approaches to improve the speed at which large RFID tag populations are being identified. In this paper, we present a transmission control strategy for a co...
Christian Floerkemeier
PERCOM
2006
ACM
16 years 3 months ago
Proximity Based Access Control in Smart-Emergency Departments
In this paper, we propose a Proximity Based automated Access Control (PBAC) model for smart-ED environments which improves the existing ED work-flow by automating mundane administ...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
« Prev « First page 2264 / 2602 Last » Next »