Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
The vision of ubiquitous computing is one in which resource constrained mobile devices form ad-hoc networks to enable the delivery of services that are sensitive and responsive to...
Conor Muldoon, Gregory M. P. O'Hare, John F. Bradl...
Many studies have been conducted on supporting communication in home and office spaces, but relatively few studies have explored supporting communication in large-scale public spa...
Augmented video streams display information within the context of the physical environment. In contrast to Augmented Reality, they do not require special equipment, they can suppo...
Irma Lindt, Jan Herling, Jan Ohlenburg, Michael Wi...
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...