Sciweavers

512 search results - page 2 / 103
» Pervasive data access in wireless and mobile computing envir...
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 6 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
PERCOM
2004
ACM
14 years 5 months ago
Agile Middleware of Pervasive Computing Environments
In this paper, we survey the models and approaches applied to the middleware services of pervasive computing environments. Architectural styles and patterns introduced in the doma...
Eila Niemelä, Teemu Vaskivuo
PERCOM
2008
ACM
14 years 5 months ago
A Context Query Language for Pervasive Computing Environments
This paper identifies requirements for querying and accessing context information in mobile and pervasive computing environments. Furthermore it studies existing query languages s...
Roland Reichle, Michael Wagner, Mohammad Ullah Kha...
PERCOM
2007
ACM
14 years 5 months ago
Achieving Flexible Cache Consistency for Pervasive Internet Access
Caching is an important technique to support pervasive Internet access. Cache consistency measures the deviation between the cached data and the source data. In mobile computing e...
Yu Huang 0002, Jiannong Cao, Zhijun Wang, Beihong ...
PERCOM
2004
ACM
14 years 5 months ago
A Middleware for Supporting Disconnections and Multi-Network Access in Mobile Environments
The middleware infrastructure to support applications is becoming critically important to the new horizons of mobile and pervasive computing. In this context, the goal of our work...
Mejdi Kaddour, Laurent Pautet