Sciweavers

199 search results - page 24 / 40
» pervasive 2005
Sort
View
WOWMOM
2005
ACM
130views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
Context-Aware Service Discovery in Heterogeneous Networks
Pervasive environments bring new challenges for service management, as clients have to handle large collections of services offered by concurrent networks at their location, as we...
Pierre-Guillaume Raverdy, Valérie Issarny
SPC
2005
Springer
14 years 3 months ago
Exploiting Empirical Engagement in Authentication Protocol Design
We develop the theme of an earlier paper [3], namely that security protocols for pervasive computing frequently need to exploit empirical channels and that the latter can be classi...
Sadie Creese, Michael Goldsmith, Richard Harrison,...
ICAC
2005
IEEE
14 years 3 months ago
Distributed Stream Management using Utility-Driven Self-Adaptive Middleware
We consider pervasive computing applications that process and aggregate data-streams emanating from highly distributed data sources to produce a stream of updates that have an imp...
Vibhore Kumar, Brian F. Cooper, Karsten Schwan
OTM
2005
Springer
14 years 3 months ago
Modelling Context Information with ORM
Context-aware applications rely on implicit forms of input, such as sensor-derived data, in order to reduce the need for explicit input from users. They are especially relevant for...
Karen Henricksen, Jadwiga Indulska, Ted McFadden
VEE
2005
ACM
130views Virtualization» more  VEE 2005»
14 years 3 months ago
The entropia virtual machine for desktop grids
Desktop distributed computing allows companies to exploit the idle cycles on pervasive desktop PC systems to increase the available computing power by orders of magnitude (10x - 1...
Brad Calder, Andrew A. Chien, Ju Wang, Don Yang