Sciweavers

2404 search results - page 217 / 481
» Middleware for pervasive computing
Sort
View
JPDC
2006
83views more  JPDC 2006»
15 years 3 months ago
Virtual Leashing: Creating a computational foundation for software protection
We introduce Virtual Leashing,1 a new technique for software protection and control. The leashing process removes small fragments of code, pervasive throughout the application, an...
Ori Dvir, Maurice Herlihy, Nir Shavit
ICASSP
2011
IEEE
14 years 7 months ago
In-class demonstrations with a portable laboratory for teaching DSP to Computer Engineering majors
Given its pervasive use, and being a clear example of a computing system integrating hardware and software, Digital Signal Processing (DSP) is an important discipline in Computer ...
Andres Kwasinski
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
15 years 9 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner
129
Voted
ICMB
2005
IEEE
118views Business» more  ICMB 2005»
15 years 9 months ago
A Context-Sensitive Service Discovery Protocol for Mobile Computing Environments
Service discovery is important in mobile and pervasive computing environments, where the set of resources available to an entity changes dynamically over time. This paper describe...
Ricky Robinson, Jadwiga Indulska
MIDDLEWARE
2005
Springer
15 years 9 months ago
Integrated support for handoff management and context awareness in heterogeneous wireless networks
The overwhelming success of mobile devices and wireless communications is stressing the need for the development of mobility-aware services. Device mobility requires services adap...
Paolo Bellavista, Marcello Cinque, Domenico Cotron...