Sciweavers

213 search results - page 17 / 43
» Issues with RFID Usage in Ubiquitous Computing Applications
Sort
View
JDIM
2010
125views more  JDIM 2010»
14 years 4 months ago
Building Context-Awareness Models for Mobile Applications
ABSTRACT. The design process followed to produce traditional applications needs to be enhanced to cope with new contextaware ubiquitous application requirements. With the popularit...
Chantal Taconet, Zakia Kazi-Aoul
NBIS
2009
Springer
15 years 4 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...
DEXAW
2007
IEEE
142views Database» more  DEXAW 2007»
14 years 11 months ago
Synopsis Data Structures for XML Databases: Models, Issues, and Research Perspectives
Due to the lack of efficient native XML database management systems, XML data manipulation and query evaluation may be resource-consuming, and represent a bottleneck for several ...
Angela Bonifati, Alfredo Cuzzocrea
MTA
2011
220views Hardware» more  MTA 2011»
14 years 4 months ago
Modeling, simulation, and practice of floor control for synchronous and ubiquitous collaboration
: With the advances in a variety of software/hardware technologies and wireless networking, there is coming a need for ubiquitous collaboration which allows people to access inform...
Kangseok Kim, Geoffrey C. Fox
101
Voted
FGCN
2008
IEEE
152views Communications» more  FGCN 2008»
14 years 11 months ago
Extending the UbiMDR Supporting Situation-Aware Access Control
Ubiquitous computing environment requirement needs information sharing of sensors based on sensor network technology, situation-aware and determination functions and other related...
Jeong-Dong Kim, Dongwon Jeong, Doo-Kwon Baik