Sciweavers

490 search results - page 76 / 98
» Enabling User Control with Personal Identity Management
Sort
View
116
Voted
WS
2006
ACM
15 years 6 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
149
Voted
AR
2011
14 years 7 months ago
A Direct Physical Interface for Navigation and Positioning of a Robotic Nursing Assistant
People often use direct physical contact to guide a person to a desired location (e.g., leading a child by the hand) or to adjust a person’s posture for a task (e.g., a dance in...
Tiffany L. Chen, Charles C. Kemp
ICC
2007
IEEE
139views Communications» more  ICC 2007»
15 years 6 months ago
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network
— A self-healing key distribution scheme enables a large group of users (sensor nodes) to establish a session key dynamically over an unreliable, or lossy wireless network. The m...
Ratna Dutta, Yong Dong Wu, Sourav Mukhopadhyay
89
Voted
ICAS
2009
IEEE
109views Robotics» more  ICAS 2009»
15 years 7 months ago
Ponder2: A Policy System for Autonomous Pervasive Environments
Policies form an important part of management and can be an effective means of implementing self-adaptation in pervasive systems. Most policy-based systems focus on large-scale ne...
Kevin P. Twidle, Naranker Dulay, Emil Lupu, Morris...
118
Voted
SIGUCCS
2005
ACM
15 years 6 months ago
An augmented campus design for context-aware service provision
This paper deals with the design of a multi-modal system for pervasive context-aware service provision and humanenvironment interaction in augmented environments by the use of Per...
Alessandro Genco, Giuseppe Reina, Paolo Raccuglia,...