Sciweavers

ICEBE
2005
IEEE
139views Business» more  ICEBE 2005»
14 years 5 months ago
Modeling and Reasoning about Uncertainty in Context-Aware Systems
Uncertainty always exists as an unavoidable factor when developing context-aware applications for pervasive computing environments [1][2][3][4]. In this paper, we propose a unifie...
Binh An Truong, Young-Koo Lee, Sungyoung Lee
EEE
2005
IEEE
14 years 5 months ago
Flexible Application Rights Management in a Pervasive Environment
The development and wider use of wireless networks and mobile devices has led to novel pervasive computing environments which pose new problems for software rights management and ...
Ivana Dusparic, Dominik Dahlem, Jim Dowling
MOBIQUITOUS
2008
IEEE
14 years 6 months ago
A multi-dimensional model enabling autonomic reasoning for context-aware pervasive applications
A fundamental requirement for autonomic computing is to be able to automatically infer how human users react in similar contextual conditions. This paper examines the problem of a...
Nearchos Paspallis, Konstantinos Kakousis, George ...
PERCOM
2009
ACM
14 years 6 months ago
Concurrent Event Detection for Asynchronous Consistency Checking of Pervasive Context
—Contexts, the pieces of information that capture the characteristics of computing environments, are often inconsistent in the dynamic and uncertain pervasive computing environme...
Yu Huang 0002, Xiaoxing Ma, Jiannong Cao, XianPing...
MOBISYS
2007
ACM
14 years 11 months ago
Context-aware access to public shared devices
To allow for an efficient usage of a device in pervasive computing environments, reliable and yet convenient user access is an important requirement. The problem becomes more comp...
David Jea, Ian Yap, Mani B. Srivastava
PERCOM
2003
ACM
14 years 11 months ago
Location-Detection Strategies in Pervasive Computing Environments
Pervasive computing environments accommodate interconnected and communicating mobile devices. Mobility is a vital aspect of everyday life and technology must offer support for mov...
Sebastian Fischmeister, Guido Menkhaus, Alexander ...
PERCOM
2004
ACM
14 years 11 months ago
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions
We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be succ...
Roshan K. Thomas, Ravi S. Sandhu
PERCOM
2004
ACM
14 years 11 months ago
Agile Middleware of Pervasive Computing Environments
In this paper, we survey the models and approaches applied to the middleware services of pervasive computing environments. Architectural styles and patterns introduced in the doma...
Eila Niemelä, Teemu Vaskivuo
PERCOM
2004
ACM
14 years 11 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva
PERCOM
2005
ACM
14 years 11 months ago
Towards a Pervasive Computing Benchmark
Pervasive computing allows the coupling of the physical world to the information world, and provides a wealth of ubiquitous services and applications that allow users, machines, d...
Anand Ranganathan, Jalal Al-Muhtadi, Jacob T. Bieh...