Sciweavers

213 search results - page 18 / 43
» Issues with RFID Usage in Ubiquitous Computing Applications
Sort
View
105
Voted
EUC
2008
Springer
14 years 10 months ago
A Context Management System for Supporting Context-Aware Applications
This paper presents a context management system for supporting context-aware applications in a smart home. In a ubiquitous computing environment context changes dynamically and th...
Eunhoe Kim, Jaeyoung Choi
EUC
2005
Springer
15 years 3 months ago
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful security applications in ubiquitous computing systems. The ubiquitous computer o...
Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon...
EUC
2007
Springer
15 years 3 months ago
An Activity-Centered Wearable Computing Infrastructure for Intelligent Environment Applications
There are many research efforts that focus on converting everyday environments into intelligent and computationally active environments that support and enhance the abilities of it...
Dipak Surie, Thomas Pederson
ESCIENCE
2005
IEEE
15 years 3 months ago
The Challenge of Volunteer Computing with Lengthy Climate Model Simulations
This paper describes the issues confronted by the climateprediction.net project in creating a volunteer computing project using a large legacy climate model application. This appl...
Carl Christensen, Tolu Aina, Dave Stainforth
COMPUTER
2007
123views more  COMPUTER 2007»
14 years 9 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar