Sciweavers

245 search results - page 4 / 49
» pervasive 2008
Sort
View
IADIS
2004
13 years 6 months ago
Developing pervasive services for future telecommunication networks
Pervasive computing promises a new and radically improved paradigm for user interaction with services and applications. Although mainstream research and development in this area i...
Babak A. Farshchian, Josip Zoric, Lars Mehrmann, A...
WICSA
2007
13 years 6 months ago
Architecting Pervasive Computing Systems for Privacy: A Survey
In pervasive computing systems, a higher number of interactions will be mediated by computers, amplifying the menace to privacy. Privacy protection in pervasive environments is st...
Roberto Speicys Cardoso, Valérie Issarny
PERVASIVE
2008
Springer
13 years 5 months ago
Healthy Aims: Developing New Medical Implants and Diagnostic Equipment
Diana Hodgins, Arnaud Bertsch, Nils Post, Manfred ...
PERVASIVE
2008
Springer
13 years 5 months ago
Urban Social Tapestries
Alice Angus, Dikaios Papadogkonas, George Papamark...
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 6 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri