In social network theory, a simple graph G is called k-role assignable if there is a surjective mapping that assigns a number from {1, . . . , k} called a role to each vertex of G ...
In utility computing environments, multiple users and applications are served from the same r esource pool. To maintain service level objectives and maintain high levels of utiliza...
Cipriano A. Santos, Akhil Sahai, Xiaoyun Zhu, Dirk...
Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This paper describes Intentional ...
Brett D. Higgins, Azarias Reda, Timur Alperovich, ...
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Abstract—Context-aware applications adapt to changing computing environments or changing user circumstances/tasks. Context information that supports such adaptations is provided ...