This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
Questions about the effectiveness of increasingly ubiquitous video technology in law enforcement have prompted an examination of the practices surrounding this technology. We pres...
Joe Tullio, Elaine M. Huang, David Wheatley, Harry...
Wireless sensor networks (WSNs) provide various environment data in the real-world, and also WSNs´s middleware is able to offer field data in real-time by user queries. For mate...
Jeong-Hee Kim, Hoon Kwon, Do-Hyeon Kim, Ho-Young K...
As in any other organization, hospital personnel absorb information from their environment, turn it into knowledge, and then make decisions based on it. Hospital Information System...
Technology is now available for creating affordable sensor networks and infrastructures for ubiquitous computing environments. In the area of ambient assisted living, contextaware...