Sciweavers

64 search results - page 3 / 13
» Criticality Aware Access Control Model for Pervasive Applica...
Sort
View
TLT
2008
92views more  TLT 2008»
13 years 3 months ago
Lifelong Learner Modeling for Lifelong Personalized Pervasive Learning
Pervasive and ubiquitous computing has the potential to make huge changes in the ways that we will learn throughout our lives. This paper presents a vision for the lifelong user mo...
Judy Kay
AINA
2009
IEEE
13 years 10 months ago
Location-Aware Authentication and Access Control
—The paper first discusses motivations why taking into account location information in authentication and access control is important. The paper then surveys current approaches t...
Elisa Bertino, Michael S. Kirkpatrick
FGCN
2008
IEEE
152views Communications» more  FGCN 2008»
13 years 7 months ago
Extending the UbiMDR Supporting Situation-Aware Access Control
Ubiquitous computing environment requirement needs information sharing of sensors based on sensor network technology, situation-aware and determination functions and other related...
Jeong-Dong Kim, Dongwon Jeong, Doo-Kwon Baik
SAC
2009
ACM
13 years 10 months ago
Self-organized control of knowledge generation in pervasive computing systems
Pervasive computing devices (e.g., sensor networks, localization devices, cameras, etc.) are increasingly present in every aspect of our lives. These devices are able to generate ...
Gabriella Castelli, Ronaldo Menezes, Franco Zambon...
METRICS
2005
IEEE
13 years 11 months ago
Software, Performance and Resource Utilisation Metrics for Context-Aware Mobile Applications
As mobile applications become more pervasive, the need for assessing their quality, particularly in terms of efficiency (i.e. performance and resource utilisation), increases. Alt...
Caspar Ryan, Pablo Rossi