Sciweavers

683 search results - page 29 / 137
» Infrastructure for Pervasive Computing: Challenges
Sort
View
IFM
2010
Springer
132views Formal Methods» more  IFM 2010»
14 years 10 months ago
From Operating-System Correctness to Pervasively Verified Applications
Though program verification is known and has been used for decades, the verification of a complete computer system still remains a grand challenge. Part of this challenge is the in...
Matthias Daum, Norbert Schirmer, Mareike Schmidt
ATAL
2005
Springer
15 years 6 months ago
AmbieAgents: a scalable infrastructure for mobile and context-aware information services
Context-aware information systems for mobile users have to cope with a variety of requirements in order to be able to provide an added value that goes beyond simply location-based...
Till Christopher Lech, Leendert W. M. Wienhofen
PERVASIVE
2004
Springer
15 years 5 months ago
Issues with RFID Usage in Ubiquitous Computing Applications
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation technology in the ubiquitous computing domain. In this paper we present various s...
Christian Floerkemeier, Matthias Lampe
112
Voted
INTERACT
2007
15 years 1 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
HPCA
2005
IEEE
15 years 6 months ago
Chip Multithreading: Opportunities and Challenges
Chip Multi-Threaded (CMT) processors provide support for many simultaneous hardware threads of execution in various ways, including Simultaneous Multithreading (SMT) and Chip Mult...
Lawrence Spracklen, Santosh G. Abraham