Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
COOPIS
2004
IEEE
11 years 5 months ago
A Prototype of a Context-Based Architecture for Intelligent Home Environments
This paper presents a proposal of a context-based architecture to achieve the required synergy among the ubiquitous computing devices of an intelligent environment. These devices p...
Pablo A. Haya, Germán Montoro, Xavier Alam&...
PERVASIVE
2004
Springer
11 years 7 months ago
"Are You with Me?" - Using Accelerometers to Determine If Two Devices Are Carried by the Same Person
As the proliferation of pervasive and ubiquitous computing devices continues, users will carry more devices. Without the ability for these devices to unobtrusively interact with on...
Jonathan Lester, Blake Hannaford, Gaetano Borriell...
MIDDLEWARE
2004
Springer
11 years 7 months ago
Adaptive resource discovery for ubiquitous computing
The terms pervasive and ubiquitous computing are used to describe a smart space populated by hundreds of intelligent devices that are embedded in their surroundings. Characteristi...
Rae Harbird, Stephen Hailes, Cecilia Mascolo
ICCSA
2004
Springer
11 years 7 months ago
Task Modeling in Computer Supported Collaborative Learning Environments to Adapt to Mobile Computing
Using the new wireless technologies, mobile devices with small displays (handhelds, PDAs, mobile phones) are present in many environments. We are interested in the effective use of...
Ana I. Molina, Miguel A. Redondo, Manuel Ortega
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
11 years 7 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
PERCOM
2005
ACM
11 years 7 months ago
A Learning Model for Trustworthiness of Context-Awareness Services
When ubiquitous computing devices access a contextawareness service, such as a location service, they need some assurance that the quality of the information received is trustwort...
Markus C. Huebscher, Julie A. McCann
ADHOCNOW
2007
Springer
11 years 7 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...
books