Sciweavers

1325 search results - page 232 / 265
» Exploring sensor networks using mobile agents
Sort
View
146
Voted
SIGUCCS
2005
ACM
15 years 9 months ago
An augmented campus design for context-aware service provision
This paper deals with the design of a multi-modal system for pervasive context-aware service provision and humanenvironment interaction in augmented environments by the use of Per...
Alessandro Genco, Giuseppe Reina, Paolo Raccuglia,...
133
Voted
SUTC
2008
IEEE
15 years 10 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
123
Voted
TCS
2008
15 years 3 months ago
The Magnus-Derek game
We introduce a new combinatorial game between two players: Magnus and Derek. Initially, a token is placed at position 0 on a round table with n positions. In each round of the gam...
Zhivko Prodanov Nedev, S. Muthukrishnan
151
Voted
TMC
2011
149views more  TMC 2011»
14 years 10 months ago
Context-Based Network Estimation for Energy-Efficient Ubiquitous Wireless Connectivity
— Context information brings new opportunities for efficient and effective system resource management of mobile devices. In this work we focus on the use of context information t...
Ahmad Rahmati, Lin Zhong
162
Voted
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 4 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...