Sciweavers

154 search results - page 30 / 31
» Context and Location-Aware Encryption for Pervasive Computin...
Sort
View
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
13 years 11 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
ATAL
2007
Springer
13 years 9 months ago
Towards reflective mobile agents for resource-constrained mobile devices
The vision of ubiquitous computing is one in which resource constrained mobile devices form ad-hoc networks to enable the delivery of services that are sensitive and responsive to...
Conor Muldoon, Gregory M. P. O'Hare, John F. Bradl...
CHI
2004
ACM
14 years 5 months ago
Transcendent communication: location-based guidance for large-scale public spaces
Many studies have been conducted on supporting communication in home and office spaces, but relatively few studies have explored supporting communication in large-scale public spa...
Hideyuki Nakanishi, Satoshi Koizumi, Toru Ishida, ...
CHI
2007
ACM
14 years 5 months ago
Exploring augmented live video streams for remote participation
Augmented video streams display information within the context of the physical environment. In contrast to Augmented Reality, they do not require special equipment, they can suppo...
Irma Lindt, Jan Herling, Jan Ohlenburg, Michael Wi...
IJWIN
2006
119views more  IJWIN 2006»
13 years 5 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...