Sciweavers

39 search results - page 1 / 8
» Small Worlds and the Security of Ubiquitous Computing
Sort
View
WOWMOM
2005
ACM
99views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
Small Worlds and the Security of Ubiquitous Computing
This paper considers the small-world phenomenon in two contexts: ubiquitous computing and security. We argue that small-world properties emerge in ubicomp systems due to their nat...
Harald Vogt
UCS
2007
Springer
13 years 11 months ago
Instant Learning Sound Sensor: Flexible Real-World Event Recognition System for Ubiquitous Computing
We propose a smart sound sensor for building context-aware systems that instantly learn and detect events from various kinds of everyday sounds and environmental noise by using sma...
Yuya Negishi, Nobuo Kawaguchi
SOCA
2007
IEEE
13 years 11 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
AINA
2007
IEEE
13 years 8 months ago
Verifying Identifier-Authenticity in Ubiquitous Computing Environment
In ubiquitous computing environment, identification of objects and places in the real world is important, and 2-D printing code is useful to store identifiers of them. However, si...
Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Nobo...
ACISP
2006
Springer
13 years 10 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros