Sciweavers

IJNSEC
2006
156views more  IJNSEC 2006»
13 years 5 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
DEBU
2006
121views more  DEBU 2006»
13 years 5 months ago
Probabilistic Data Management for Pervasive Computing: The Data Furnace Project
The wide deployment of wireless sensor and RFID (Radio Frequency IDentification) devices is one of the key enablers for next-generation pervasive computing applications, including...
Minos N. Garofalakis, Kurt P. Brown, Michael J. Fr...
CORR
2008
Springer
114views Education» more  CORR 2008»
13 years 5 months ago
Modeling Time in Computing: A Taxonomy and a Comparative Survey
The increasing relevance of areas such as real-time and embedded systems, pervasive computing, hybrid systems control, and biological and social systems modeling is bringing a gro...
Carlo A. Furia, Dino Mandrioli, Angelo Morzenti, M...
COMPUTER
2008
90views more  COMPUTER 2008»
13 years 5 months ago
Challenges and Lessons in Developing Middleware on Smart Phones
Near-ubiquitous smart phones are the most promising heralds of future pervasive computing. However, despite their increasing capabilities in computation, communication, and sensin...
Oriana Riva, Jaakko Kangasharju
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 6 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
WICSA
2007
13 years 6 months ago
Architecting Pervasive Computing Systems for Privacy: A Survey
In pervasive computing systems, a higher number of interactions will be mediated by computers, amplifying the menace to privacy. Privacy protection in pervasive environments is st...
Roberto Speicys Cardoso, Valérie Issarny
PDPTA
2003
13 years 6 months ago
Mobile Agents for Pervasive Computing Using a Novel Method of Message Passing
- Pervasive computing is an emerging technology that brings new dimensions to distributed computing; it uses a wide variety of smart, ubiquitous devices throughout an individual’...
David Levine, Renjith Thomas, Farhad Kamangar, Ger...
IADIS
2004
13 years 6 months ago
Developing pervasive services for future telecommunication networks
Pervasive computing promises a new and radically improved paradigm for user interaction with services and applications. Although mainstream research and development in this area i...
Babak A. Farshchian, Josip Zoric, Lars Mehrmann, A...
CSREAPSC
2006
13 years 6 months ago
An Access Control Framework for Pervasive Computing Environments
Abstract. The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven ...
Sarah Javanmardi, Hadi Hemmati, Rasool Jalili
AAAI
2004
13 years 6 months ago
SEM-Ether: Semantic Web Based Pervasive Computing Framework - Integrating Web, Devices and People
Pervasive computing aims to build an aggregated environment around a user by knitting diverse computing and communicating devices and software services into a single homogeneous u...
Sushil Puradkar, Sachin Singh, Chintan Patel, Kart...