Sciweavers

28 search results - page 2 / 6
» Exception Handling in CSCW Applications in Pervasive Computi...
Sort
View
88
Voted
PERCOM
2004
ACM
15 years 9 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles
85
Voted
INTERSENSE
2006
ACM
15 years 4 months ago
Addressing network heterogeneity in pervasive application environments
— Pervasive computing applications typically involve rich interactions and heterogeneous network types; e.g. involving the collation of data from a sensor network into a replicat...
Paul Grace, Geoff Coulson, Gordon S. Blair, Barry ...
70
Voted
EDBT
2010
ACM
147views Database» more  EDBT 2010»
15 years 4 months ago
A simple (yet powerful) algebra for pervasive environments
Querying non-conventional data is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is the ability to qu...
Yann Gripay, Frédérique Laforest, Je...
116
Voted
ISPAN
2009
IEEE
15 years 4 months ago
SoCQ: A Framework for Pervasive Environments
Abstract—Querying non-conventional data sources is recognized as a major issue in new environments and applications such as those occurring in pervasive computing. A key issue is...
Yann Gripay, Frédérique Laforest, Je...
WOA
2003
14 years 11 months ago
Filling the Gap Between Users and Objects: a Multichannel Interactive Environment
— The design and the implementation of software for mobile computers and for pervasive computing environments entail several issues and lead to new requirements. Applications mus...
Davide Carboni, Andrea Piras, Stefano Sanna, Gavin...