This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
Context-awareness is an important capability needed in devices in a ubiquitous computing environment. Ubiquitous computing devices use different types of sensors along with the us...
Multimedia contents are becoming the major information going through the Internet. Pervasive network infrastructure expedites data delivery with improved network throughput and re...
Ubiquitous applications are characterised by variations of their execution context. Their correct operation requires some continual adaptations based on the observation of their e...
Abstract: Engineering personalized ubiquitous Web applications requires to develop adaptable Web content as well as to automatically adjust it to varying client devices and dynamic...