Sciweavers

2404 search results - page 262 / 481
» Middleware for pervasive computing
Sort
View
128
Voted
AINA
2007
IEEE
15 years 10 months ago
The Community Stack: Concept and Prototype
Location awareness and mobility are main factors in pervasive computing. There is a lot of work focusing on develop location aware applications. Generalizing from location awarene...
Tuan Nguyen, Seng Wai Loke, Torab Torabi
151
Voted
SPC
2005
Springer
15 years 9 months ago
Exploiting Empirical Engagement in Authentication Protocol Design
We develop the theme of an earlier paper [3], namely that security protocols for pervasive computing frequently need to exploit empirical channels and that the latter can be classi...
Sadie Creese, Michael Goldsmith, Richard Harrison,...
112
Voted
ACCV
2009
Springer
15 years 7 months ago
Refined Exponential Filter with Applications to Image Restoration and Interpolation
Ill-posed linear equations are pervasive in computer vision. A popular way to solve an ill-posed problem is regularization. In this paper, we propose a new criterion for designing ...
Yanlin Geng, Tong Lin, Zhouchen Lin, Pengwei Hao
HOTOS
2009
IEEE
15 years 7 months ago
Augmented Smartphone Applications Through Clone Cloud Execution
Smartphones enable a new, rich user experience in pervasive computing, but their hardware is still very limited in terms of computation, memory, and energy reserves, thus limiting...
Byung-Gon Chun, Petros Maniatis
115
Voted
CIS
2006
Springer
15 years 7 months ago
Security Contexts in Autonomic Systems
Autonomic Computing Systems (ACS) are expected to achieve the same level of self-regulation and pervasiveness as human autonomic systems. Because of the features of ACS, the tradit...
Kaiyu Wan, Vasu S. Alagar