Sciweavers

PERCOM
2003
ACM
14 years 7 months ago
Context-Sensitive Resource Discovery
This paper presents the "Solar" system framework that allows resources to advertise context-sensitive names and for applications to make context-sensitive name queries. ...
Guanling Chen, David Kotz
PERCOM
2003
ACM
14 years 7 months ago
Cerberus: A Context-Aware Security Scheme for Smart Spaces
Ubiquitous computing has fueled the idea of constructing sentient, information-rich "smart spaces" that extend the boundaries of traditional computing to encompass physi...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
PERCOM
2003
ACM
14 years 7 months ago
WLAN Location Determination via Clustering and Probability Distributions
We present a WLAN location determination technique, the Joint Clustering technique, that uses (1) signal strength probability distributions to address the noisy wireless channel, ...
Ashok K. Agrawala, A. Udaya Shankar
PERCOM
2003
ACM
14 years 7 months ago
MACA-P: A MAC for Concurrent Transmissions in Multi-Hop Wireless Networks
: This paper presents the initial design and performance study of MACA-P, a RTS/CTS based MAC protocol that enables simultaneous transmissions in multihop ad-hoc wireless networks....
Arup Acharya, Archan Misra, Sorav Bansal
PERCOM
2004
ACM
14 years 7 months ago
Towards a Better Understanding of Context Attributes
The use of context as an input is one of the major characteristics of Ubiquitous Computing systems. This paper looks into the structural and the systematic features of context in ...
Tobias Zimmer
PERCOM
2004
ACM
14 years 7 months ago
An Adaptive Approach to Content-Based Subscription in Mobile Ad Hoc Networks
We describe a novel approach for content-based publish/subscribe system in mobile ad-hoc networks and show preliminary experiment results. We extended ODMRP (OnDemand Multicast Rou...
Eiko Yoneki, Jean Bacon
PERCOM
2004
ACM
14 years 7 months ago
Towards Context-aware Security: An Authorization Architecture for Intranet Environments
This paper introduces a context-aware authorization architecture that is designed to augment existing network security protocols in an Intranet environment. It describes the archi...
Chris Wullems, Mark Looi, Andrew Clark
PERCOM
2004
ACM
14 years 7 months ago
Ontology Based Context Modeling and Reasoning using OWL
In this paper we propose an OWL encoded context ontology (CONON) for modeling context in pervasive computing environments, and for supporting logicbased context reasoning. CONON p...
Xiaohang Wang, Daqing Zhang, Tao Gu, Hung Keng Pun...
PERCOM
2004
ACM
14 years 7 months ago
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions
We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be succ...
Roshan K. Thomas, Ravi S. Sandhu
PERCOM
2004
ACM
14 years 7 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles