Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
A new computing era after Mainframes, PC’s and mobiles is becoming more and more anticipated since the beginning of the 21st century. This new era is often described with several...
Ubiquitous computing technologies offer the promise of extending the benefits of computing to workers who do not spend their time at a desktop environment. In this paper, we review...
John Sherry, Scott D. Mainwaring, Jenna Burrell, R...
As the proliferation of pervasive and ubiquitous computing devices continues, users will carry more devices. Without the ability for these devices to unobtrusively interact with on...
Jonathan Lester, Blake Hannaford, Gaetano Borriell...
Abstract. This paper presents some important directions in the use of ontologybased semantics in achieving the vision of Autonomic Communications. We examine the requirements of Au...
David Lewis, Kevin Feeney, Kevin Carey, Thanassis ...