Sciweavers

446 search results - page 38 / 90
» A Context Query Language for Pervasive Computing Environment...
Sort
View
PERCOM
2007
ACM
16 years 3 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
PERVASIVE
2004
Springer
15 years 8 months ago
Recognizing Workshop Activity Using Body Worn Microphones and Accelerometers
Most gesture recognition systems analyze gestures intended for communication (e.g. sign language) or for command (e.g. navigation in a virtual world). We attempt instead to recogn...
Paul Lukowicz, Jamie A. Ward, Holger Junker, Mathi...
123
Voted
ACSC
2006
IEEE
15 years 9 months ago
Programming with heterogeneous structures: manipulating XML data using bondi
Manipulating semistructured data, such as XML, does not t well within conventional programming languages. A typical manipulation requires nding all occurrences of a structure matc...
F. Y. Huang, C. B. Jay, David B. Skillicorn
CCS
2009
ACM
16 years 4 months ago
Confidentiality-preserving distributed proofs of conjunctive queries
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
Adam J. Lee, Kazuhiro Minami, Nikita Borisov
CORR
2010
Springer
157views Education» more  CORR 2010»
15 years 3 months ago
Context Ontology Implementation for Smart Home
Context awareness is one of the important fields in ubiquitous computing. Smart Home, a specific instance of ubiquitous computing, provides every family with opportunities to enjo...
Tam Van Nguyen, Wontaek Lim, Huy Anh Nguyen, Deokj...