This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
The advent of mobile phones and the Internet opened the doors for an emerging class of applications that connect mobile users to online resources and information services availabl...
In recent years, several trust and reputation models have been proposed to enhance the security of mobile ad hoc networks. However, they either fail to capture evidence of trustwo...
— This paper presents a computing model for resource-limited mobile devices that might be ubiquitously deployed in private and business environments. The model integrates a stron...
One of the main challenges for privacy-aware locationbased systems is to strike a balance between privacy preferences set by users and location accuracy needed by Location-Based S...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
This position paper proposes a device-blending architecture for aggregating device functionality via inter-device peer-topeer relationships, effectively forming a multi-device “...
Location awareness and mobility are main factors in pervasive computing. There is a lot of work focusing on develop location aware applications. Generalizing from location awarene...
In this paper, we introduce novel probabilistic transmission protocols for data intensive wireless sensor networks. The protocols combine a randomized transmission scheme with sch...
Chih-Kuang Lin, Vladimir Zadorozhny, Prashant Kris...
Abstract—Smart Home, this term comprises various approaches, engaged in living and working now and in the future. The objectives of the various approaches range from enhancing co...
Sebastian Dengler, Abdalkarim Awad, Falko Dressler
Recently, several MAC protocols using directional antennas have been proposed for ad hoc networks, which are mainly evaluated by computer simulations. This paper develops a MAC pr...