Sciweavers

2404 search results - page 325 / 481
» Middleware for pervasive computing
Sort
View
PERCOM
2010
ACM
15 years 1 months ago
A flexible context stabilization approach for self-adaptive application
Abstract—Pervasive applications are characterized by variations in their context of execution. Their correct behavior requires continuous adaptations, accordingly to changes obse...
Russel Nzekwa, Romain Rouvoy, Lionel Seinturier
ACL
2010
15 years 1 months ago
Beyond NomBank: A Study of Implicit Arguments for Nominal Predicates
Despite its substantial coverage, NomBank does not account for all withinsentence arguments and ignores extrasentential arguments altogether. These arguments, which we call implic...
Matthew Gerber, Joyce Yue Chai
HCI
2009
15 years 28 days ago
Accessing e-Learning Systems via Screen Reader: An Example
The evolution of the Information and Communication Technology (ICT) and the rapid growth of the Internet have impelled the pervasive diffusion of e-Learning systems. This is a grea...
Maria Claudia Buzzi, Marina Buzzi, Barbara Leporin...
JCS
2011
126views more  JCS 2011»
14 years 10 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
MOBICOM
2012
ACM
13 years 5 months ago
Locating in fingerprint space: wireless indoor localization with little human intervention
Indoor localization is of great importance for a range of pervasive applications, attracting many research efforts in the past decades. Most radio-based solutions require a proce...
Zheng Yang, Chenshu Wu, Yunhao Liu