The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
— This paper illustrates a novel decision making algorithm to deliver telecommunication services that match in the best possible way end-user’s requirements to current environm...
Context and context-awareness have been central issues in ubiquitous computing research for the last decade. Advances with regard to context acquisition and activity recognition a...
— with the ubiquity of handheld devices people can now access information and conduct online transactions virtually anywhere and anytime. In such flexible but less reliable envir...
Recent technological advances have enabled both the consumption and provision of mobile services (m-services) by small, portable, handheld devices. However, mobile devices still h...