Sciweavers

2275 search results - page 93 / 455
» A Deployment System for Pervasive Computing
Sort
View
PERVASIVE
2009
Springer
16 years 7 days ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
PERVASIVE
2010
Springer
16 years 9 days ago
Recruitment Framework for Participatory Sensing Data Collections
Mobile phones have evolved from devices that are just used for voice and text communication to platforms that are able to capture and transmit a range of data types (image, audio, ...
Sasank Reddy, Deborah Estrin, Mani B. Srivastava
ICMI
2000
Springer
171views Biometrics» more  ICMI 2000»
15 years 9 months ago
Gaze and Speech in Attentive User Interfaces
The trend toward pervasive computing necessitates finding and implementing appropriate ways for users to interact with devices. We believe the future of interaction with pervasive ...
Paul P. Maglio, Teenie Matlock, Christopher S. Cam...
169
Voted
PERVASIVE
2008
Springer
15 years 5 months ago
Providing an Integrated User Experience of Networked Media, Devices, and Services through End-User Composition
Networked devices for the storage and rendering of digital media are rapidly becoming ubiquitous in homes throughout the industrialized world. Existing approaches to home media con...
Mark W. Newman, Ame Elliott, Trevor F. Smith
CN
2004
127views more  CN 2004»
15 years 5 months ago
Intermediary infrastructures for the World Wide Web
Intermediaries are software entities, deployed on hosts of the wireline and wireless network, that mediate the interaction between clients and servers of the World Wide Web. In th...
Marios D. Dikaiakos