Sciweavers

20813 search results - page 352 / 4163
» Introduction to Computer Networking
Sort
View
145
Voted
AINA
2007
IEEE
15 years 10 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang
144
Voted
DEXAW
1999
IEEE
128views Database» more  DEXAW 1999»
15 years 8 months ago
Trends and Future of Mobile Computing
Networking homes, offices, cars and hand-held computers is the current trend of distributed mobile computing. The ever growing demand of the enterprise for integrating new technol...
Andry Rakotonirainy
SIGCOMM
1996
ACM
15 years 8 months ago
Adaptive Resource Management Algorithms for Indoor Mobile Computing Environments
Emerging indoor mobile computing environments seek to provide a user with an advanced setofcommunication-intensive applications, which require sustained quality of service in the ...
Songwu Lu, Vaduvur Bharghavan
110
Voted
PERCOM
2008
ACM
16 years 3 months ago
Safety Enhancing Mechanisms for Pervasive Computing Systems in Intelligent Environments
Pervasive computing systems provide personalized and intimate services to improve users' quality of life by integrating computation and communication into the environments. Wi...
Hen-I Yang, Abdelsalam Helal
PERCOM
2006
ACM
16 years 3 months ago
On Authentication between Human and Computer
Electronic authentication with a portable device such as a smart card has been receiving increasing attention. An explosion of papers argues security on such kind of authenticatio...
Takahiro Watanabe, Yasunobu Nohara, Kensuke Baba, ...