Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Information diffusion, viral marketing, and collective classification all attempt to model and exploit the relationships in a network to make inferences about the labels of nodes....
In a mobile computing system, users carrying portable devices can access database services from any location without requiring a fixed position in the networking environment. Some ...
The in-network aggregation and processing of information is what sets a sensor network apart from a pure data acquisition device. One way to model the exchange of information betwe...
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...