Sciweavers

127 search results - page 4 / 26
» Ubiquitous Service Regulation Based on Dynamic Rules
Sort
View
HUC
2007
Springer
13 years 11 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
POLICY
2005
Springer
13 years 11 months ago
Relationship-Driven Policy Engineering for Autonomic Organisations
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications access and the ubiquitous computing services it offers to humans. Policy based go...
Kevin Feeney, Karl Quinn, David Lewis, Declan O'Su...
SIGOPSE
2004
ACM
13 years 11 months ago
Energy-efficient cluster-based service discovery for Ubiquitous Computing
: Service discovery in Ubiquitous Computing is a task which has to be done frequently due to dynamically changing environments. The limited battery power of mobile devices requires...
Gregor Schiele, Christian Becker, Kurt Rothermel
CAISE
2006
Springer
13 years 9 months ago
Compliant and Flexible Business Processes with Business Rules
When modeling business processes, we often implicity think of internal business policies and external regulations. Yet to date, little attention is paid to avoid hard-coding polici...
Stijn Goedertier, Jan Vanthienen
IJWET
2007
152views more  IJWET 2007»
13 years 5 months ago
Semantic web technologies for ubiquitous computing resource management in smart spaces
: Context-aware ubiquitous computing environments tend to be highly distributed and heterogeneous, while also featuring increased dynamism as elements, devices and middleware compo...
John Soldatos, Kostas Stamatis, Siamak Azodolmolky...