Sciweavers

2446 search results - page 62 / 490
» First Smart Spaces
Sort
View
171
Voted
CSREAPSC
2006
15 years 4 months ago
An Access Control Framework for Pervasive Computing Environments
Abstract. The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven ...
Sarah Javanmardi, Hadi Hemmati, Rasool Jalili
133
Voted
IASTEDSEA
2004
15 years 4 months ago
Java bytecode verification with dynamic structures
Java applets run on a Virtual Machine that checks code's integrity and correctness before execution using a module called Bytecode Verifier. Java Card technology allows Java ...
Cinzia Bernardeschi, Luca Martini, Paolo Masci
WISES
2003
15 years 4 months ago
Prospects on Software-Agents-Based Applications in Embedded Systems
- Software agents have been already introduced successfully in the scope of embedded technology as smart controllers of intelligent systems. This paper presents a further applicati...
Yoseba K. Penya
IJNSEC
2006
69views more  IJNSEC 2006»
15 years 3 months ago
Active Trial-and-error Attack on SASC Protocols
SASC (Server-Aided Secret Computation) protocols enable a client (a smart card) to borrow computing power from a server (e.g., an untrustworthy auxiliary device like an ATM) witho...
Heeyoul Kim, Younho Lee, Seong-Min Hong, Hyunsoo Y...

Publication
209views
15 years 15 days ago
Adaptive beamforming method based on constrained LMS algorithm for tracking mobile user
In this paper, Constrained Least Mean Square (CLMS) algorithm for narrowband adaptive beamforming for tracking mobile user in a 2D urban environment has been used. This algorithm i...
Peyman Rahmati