Sciweavers

FC
2010
Springer
260views Cryptology» more  FC 2010»
13 years 5 months ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
MOBIDE
1999
ACM
13 years 8 months ago
Pervasive Computing: What is it Good for?
The first mass-produced pervasive computing devices are starting to appear—the AutoPC, the Internet-connected ScreenFridge, and the combination Microwave Oven/Home Banking term...
Andrew C. Huang, Benjamin C. Ling, Shankar Ponneka...
SAC
2009
ACM
13 years 9 months ago
Self-organized control of knowledge generation in pervasive computing systems
Pervasive computing devices (e.g., sensor networks, localization devices, cameras, etc.) are increasingly present in every aspect of our lives. These devices are able to generate ...
Gabriella Castelli, Ronaldo Menezes, Franco Zambon...
IEEECIT
2006
IEEE
13 years 10 months ago
Extending Pervasive Devices with the Semantic Grid: A Service Infrastructure Approach
Pervasive computing devices are gradually becoming increasingly prevalent in our everyday life, enabling the users in the physical world to interact with the digital world. Grid c...
Tao Guan, Ed Zaluska, David De Roure
PERCOM
2007
ACM
14 years 4 months ago
MaLM: Machine Learning Middleware to Tackle Ontology Heterogeneity
We envisage pervasive computing applications to be predominantly engaged in knowledge-based interactions, where services and information will be found and exchanged based on some ...
Licia Capra