Sciweavers

2677 search results - page 504 / 536
» Animating pervasive computing
Sort
View
COMPSAC
2009
IEEE
15 years 6 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
SOUPS
2009
ACM
15 years 6 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
EDOC
2008
IEEE
15 years 6 months ago
Reliable Discovery and Selection of Composite Services in Mobile Environments
Service providers as we know them nowadays are the always-on “static” web service providers, that aim at Five9 availability (99.999%). Formal, or de-facto, standards, such as ...
Lucia Del Prete, Licia Capra
ISCA
2007
IEEE
111views Hardware» more  ISCA 2007»
15 years 6 months ago
Express virtual channels: towards the ideal interconnection fabric
Due to wire delay scalability and bandwidth limitations inherent in shared buses and dedicated links, packet-switched on-chip interconnection networks are fast emerging as the per...
Amit Kumar 0002, Li-Shiuan Peh, Partha Kundu, Nira...
SMC
2007
IEEE
102views Control Systems» more  SMC 2007»
15 years 6 months ago
TagFree: Identifying users without tags in smart home environments
— Since family members have their unique features when living in a smart home environment, user identifications are able to achieve without any tags. In this paper, we propose T...
Wen-Chih Peng, Wangling Huang, YiLing Chen, PeiChi...