Sciweavers

2404 search results - page 389 / 481
» Middleware for pervasive computing
Sort
View
INTERACT
2007
14 years 11 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
CSREAPSC
2006
14 years 11 months ago
An Inexact Matching Method Based on Ontology and Semantic Distance for Resource Discovery and Interaction
- To overcome shortcomings of Exact Matching Method (EMM) and Substitute Description Method (SDM), an Inexact Matching Method Based on Ontology and Semantic Distance (OSDIMM) is in...
Tang Shancheng, Qian Yi, Wang Wei
SWWS
2007
14 years 11 months ago
Modeling an Ontology for Managing Contexts in Smart Meeting Space
- In recent years, computing becomes more mobile and pervasive; these changes imply that applications and services must be aware of and adapt to their changing contexts in highly d...
Mohammad Rezwanul Huq, Nguyen Thi Thanh Tuyen, You...
HUC
2010
Springer
14 years 11 months ago
Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing
The popularity of micro-blogging has made generalpurpose information sharing a pervasive phenomenon. This trend is now impacting location sharing applications (LSAs) such that use...
Karen P. Tang, Jialiu Lin, Jason I. Hong, Daniel P...
CORR
2010
Springer
167views Education» more  CORR 2010»
14 years 10 months ago
Development of a Context Aware Virtual Smart Home Simulator
Context awareness is the most important research area in ubiquitous computing. In particular, for smart home, context awareness attempts to bring the best services to the home hab...
Tam Van Nguyen, Huy Anh Nguyen, Deokjai Choi