Sciweavers

8770 search results - page 1519 / 1754
» Named Service Networking
Sort
View
PERCOM
2007
ACM
15 years 11 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
PERCOM
2007
ACM
15 years 11 months ago
Dynamic Context Bindings in Pervasive Middleware
Context-awareness (CA) enables the development of personalized pervasive services. Current context-aware infrastructures focus on middleware solutions to support acquisition, usag...
Tom Broens, Marten van Sinderen, Aart van Halteren...
88
Voted
PERCOM
2006
ACM
15 years 11 months ago
Dialing for Displays: Session Initiation Protocol for Opportunistic Augmentation
Opportunistic augmentation denotes connecting a personal mobile device to another device to gain a transient advantage for the user. For example, a mobile phone user might borrow ...
John J. Barton, Stina Nylander, Fopefolu Folowosel...
PERCOM
2006
ACM
15 years 11 months ago
A Collaborative Web Browsing System for Multiple Mobile Users
In mobile computing environments, handheld devices with low functionality restrict the services provided for mobile users. We propose a new concept of collaborative browsing, wher...
Takuya Maekawa, Takahiro Hara, Shojiro Nishio
83
Voted
PERCOM
2006
ACM
15 years 11 months ago
Ordering Management Actions in Pervasive Systems using Specification-enhanced Policies
A pervasive system features a plethora of devices, services and applications organized as a large distributed system. One approach to managing such systems is by policies where ad...
Chetan Shiva Shankar, Roy H. Campbell
« Prev « First page 1519 / 1754 Last » Next »