Sciweavers

20813 search results - page 357 / 4163
» Introduction to Computer Networking
Sort
View
141
Voted
PERCOM
2006
ACM
16 years 3 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
129
Voted
MOBISYS
2003
ACM
16 years 3 months ago
Predictive Resource Management for Wearable Computing
Achieving crisp interactive response in resource-intensive applications such as augmented reality, language translation, and speech recognition is a major challenge on resource-po...
Dushyanth Narayanan, Mahadev Satyanarayanan
143
Voted
AINA
2009
IEEE
15 years 10 months ago
A Property Based Framework for Trust and Reputation in Mobile Computing
In this paper we reinforce the benefits of a trust based approach in mobile multi-agent systems. Whilst we do not specify a trust model we provide a framework for property based ...
Kevin Jones, Helge Janicke, Antonio Cau
127
Voted
PERCOM
2008
ACM
15 years 10 months ago
An Autonomic Context Management System for Pervasive Computing
Abstract—Context-aware applications adapt to changing computing environments or changing user circumstances/tasks. Context information that supports such adaptations is provided ...
Peizhao Hu, Jadwiga Indulska, Ricky Robinson
110
Voted
SUTC
2008
IEEE
15 years 10 months ago
Controlled Disclosure of Context Information across Ubiquitous Computing Domains
One of the challenges in ubiquitous computing is that of mobility, which typically requires interaction between intelligent environments in different domains of administration. We...
Cristian Hesselman, Henk Eertink, Martin Wibbels, ...