Sciweavers

13007 search results - page 2446 / 2602
» Wireless and Mobile Networking
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
Ordering Management Actions in Pervasive Systems using Specification-enhanced Policies
A pervasive system features a plethora of devices, services and applications organized as a large distributed system. One approach to managing such systems is by policies where ad...
Chetan Shiva Shankar, Roy H. Campbell
PERCOM
2006
ACM
14 years 8 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
PERCOM
2006
ACM
14 years 8 months ago
A Blueprint for Pervasive Self-Care Infrastructures
Self Care is a recent initiative by the Department of Health in the UK that aims to treat patients with longterm conditions sooner, nearer to home and earlier in the course of the...
George Roussos, Andy Marsh
PERCOM
2005
ACM
14 years 8 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
PERCOM
2005
ACM
14 years 8 months ago
Unleashing the Power of Wearable Devices in a SIP Infrastructure
The Session Initiation Protocol (SIP) has been widely adopted for Instant Messaging (IM) and VoIP telephony both by the enterprise and in service provider systems. Till now, SIP f...
Arup Acharya, Stefan Berger, Chandrasekhar Narayan...
« Prev « First page 2446 / 2602 Last » Next »