Sciweavers

2404 search results - page 225 / 481
» Middleware for pervasive computing
Sort
View
116
Voted
CSREASAM
2008
15 years 5 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao
130
Voted
PERVASIVE
2006
Springer
15 years 3 months ago
Scalability in a Secure Distributed Proof System
Abstract. A logic-based language is often adopted in systems for pervasive computing, because it provides a convenient way to define rules that change the behavior of the systems d...
Kazuhiro Minami, David Kotz
131
Voted
ICSE
2007
IEEE-ACM
16 years 3 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
141
Voted
HICSS
2006
IEEE
146views Biometrics» more  HICSS 2006»
15 years 9 months ago
A Taxonomy for RFID
—Ben Clacy and Brian Jennings presented their recently published paper with the title of “service management: driving the future of IT” [1], which highlighted service oriente...
Taimur Hassan, Samir Chatterjee
DAIS
2010
15 years 5 months ago
Structured Context Prediction: A Generic Approach
Context-aware applications and middleware platforms are evolving into major driving factors for pervasive systems. The ability to also make accurate assumptions about future contex...
Matthias Meiners, Sonja Zaplata, Winfried Lamersdo...