Sciweavers

2404 search results - page 151 / 481
» Middleware for pervasive computing
Sort
View
PERCOM
2009
ACM
15 years 11 months ago
Privacy-Preserving Event Detection in Pervasive Spaces
Abstract—In this paper, we consider privacy challenges in eventdriven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to det...
Bijit Hore, Jehan Wickramasuriya, Sharad Mehrotra,...
PERCOM
2007
ACM
15 years 10 months ago
Decentralized Bootstrapping in Pervasive Applications
Abstract— Deploying world-scale pervasive applications usually requires substantial investments in server infrastructure. A better option is to use P2P techniques, because it dis...
Mirko Knoll, Arno Wacker, Gregor Schiele, Torben W...
ACMACE
2005
ACM
15 years 10 months ago
Designing sound for a pervasive mobile game
We examine the role of sound design in pervasive mobile games. As a case study, we present the sound design and evaluation of a working prototype game called The Songs of North. A...
Inger Ekman, Laura Ermi, Jussi Lahti, Jani Nummela...
WMCSA
2003
IEEE
15 years 9 months ago
Proximity Mining: Finding Proximity using Sensor Data History
Emerging ubiquitous and pervasive computing applications often need to know where things are physically located. To meet this need, many locationsensing systems have been develope...
Toshihiro Takada, Satoshi Kurihara, Toshio Hirotsu...
ASAP
2008
IEEE
182views Hardware» more  ASAP 2008»
15 years 11 months ago
Low-cost implementations of NTRU for pervasive security
NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design ...
Ali Can Atici, Lejla Batina, Junfeng Fan, Ingrid V...