Sciweavers

1081 search results - page 2 / 217
» Challenges: an application model for pervasive computing
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 6 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
PERCOM
2005
ACM
14 years 4 months ago
Extending Context Models for Privacy in Pervasive Computing Environments
Privacy is widely recognised as a significant obstacle inhibiting the adoption of context-aware applications. In order to remove this obstacle, advances are required in many areas...
Karen Henricksen, Ryan Wishart, Ted McFadden, Jadw...
GI
2001
Springer
13 years 9 months ago
Infrastructure for Pervasive Computing: Challenges
: As mobile and embedded computing devices become more pervasive, it is becoming obvious that the nature of interactions between users and computers must evolve. Applications need ...
Karen Henricksen, Jadwiga Indulska, Andry Rakotoni...
COMPUTER
2008
90views more  COMPUTER 2008»
13 years 5 months ago
Challenges and Lessons in Developing Middleware on Smart Phones
Near-ubiquitous smart phones are the most promising heralds of future pervasive computing. However, despite their increasing capabilities in computation, communication, and sensin...
Oriana Riva, Jaakko Kangasharju
DSL
2009
13 years 3 months ago
A Taxonomy-Driven Approach to Visually Prototyping Pervasive Computing Applications
Abstract. Various forms of pervasive computing environments are being deployed in an increasing number of areas including healthcare, home automation, and military. This evolution ...
Zoé Drey, Julien Mercadal, Charles Consel