Sciweavers

154 search results - page 16 / 31
» Context and Location-Aware Encryption for Pervasive Computin...
Sort
View
SPC
2005
Springer
15 years 3 months ago
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems
In pervasive computing environments, changes in context may trigger changes in an individual’s access permissions. We contend that existing access control frameworks do not provi...
Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Pras...
CONTEXT
2011
Springer
13 years 9 months ago
An Experiment in Hierarchical Recognition of Group Activities Using Wearable Sensors
Pervasive computing envisions implicit interaction between people and their intelligent environments instead of individual devices, inevitably leading to groups of individuals inte...
Dawud Gordon, Jan-Hendrik Hanne, Martin Berchtold,...
PERCOM
2005
ACM
15 years 9 months ago
Communication Context for Adaptive Mobile Applications
This paper describes our ongoing work on a system that provides information about network resources and related communication facilities to applications running on a mobile device...
Arjan J. H. Peddemors, Henk Eertink, Ignas G. Niem...
NORDICHI
2004
ACM
15 years 2 months ago
Place storming: performing new technologies in context
We present Place Storming, an original method of brainstorming technological concepts, particularly in the area of pervasive computing. Place Storming is contextdriven and play-ba...
Ken Anderson, Jane McGonigal
90
Voted
MSWIM
2006
ACM
15 years 3 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt