Sciweavers

2404 search results - page 231 / 481
» Middleware for pervasive computing
Sort
View
PERVASIVE
2007
Springer
15 years 9 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
PERVASIVE
2007
Springer
15 years 9 months ago
Inference Attacks on Location Tracks
Although the privacy threats and countermeasures associated with location data are well known, there has not been a thorough experiment to assess the effectiveness of either. We ex...
John Krumm
136
Voted
E4MAS
2005
Springer
15 years 9 months ago
Augmenting the Physical Environment Through Embedded Wireless Technologies
Emerging pervasive computing technologies such as sensor networks and RFID tags can be embedded in our everyday environment to digitally store and elaborate a variety of informatio...
Marco Mamei, Franco Zambonelli
121
Voted
PERVASIVE
2005
Springer
15 years 9 months ago
Service Discovery in TinyObj: Strategies and Approaches
In this paper, we describe TinyObj service discovery model, which uses short wireless packet broadcasts for service discovery within a user’s vicinity. We present a prototype im...
Pavel Poupyrev, Takahiro Sasao, Shunsuke Saruwatar...
PERVASIVE
2005
Springer
15 years 9 months ago
Exploring Mobile Phone Interaction with Situated Displays
One of the most promising possibilities for supporting user interaction with public displays is the use of personal mobile phones. Furthermore, by utilising Bluetooth users should...
Keith Cheverst, Alan J. Dix, Dan Fitton, Christian...