Sciweavers

5447 search results - page 1069 / 1090
» Environment-Mediated Mobile Computing
Sort
View
CCS
2009
ACM
15 years 10 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
IPSN
2009
Springer
15 years 10 months ago
Distributed resource management and matching in sensor networks
We consider a scenario in which there are resources at or near nodes of a network, which are either static (e.g. fire stations, parking spots) or mobile (e.g. police cars). Over ...
Jie Gao, Leonidas J. Guibas, Nikola Milosavljevic,...
COMPSAC
2009
IEEE
15 years 10 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
IROS
2009
IEEE
150views Robotics» more  IROS 2009»
15 years 9 months ago
AWE: A robotic wall and reconfigurable desk supporting working life in a digital society
—“AWE” is a programmable “Animated Work Environment” supporting everyday human activities, at home, work and school, in an increasingly digital society. AWE features a no...
Keith Evan Green, Ian D. Walker, Leo J. Gugerty, J...
LOCA
2009
Springer
15 years 9 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima
« Prev « First page 1069 / 1090 Last » Next »