Sciweavers

2912 search results - page 394 / 583
» Overlay Networks - Implementation by Specification
Sort
View
119
Voted
PERCOM
2007
ACM
16 years 4 months ago
Hoarding Context Information with Context Clusters
The components of a context-aware system can often become disconnected because of the dynamic environments within which they are deployed. Hoarding context information on the clie...
Myilone Anandarajah, Ricky Robinson, Jadwiga Indul...
PERCOM
2006
ACM
16 years 4 months ago
Proximity Based Access Control in Smart-Emergency Departments
In this paper, we propose a Proximity Based automated Access Control (PBAC) model for smart-ED environments which improves the existing ED work-flow by automating mundane administ...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
PERCOM
2005
ACM
16 years 4 months ago
Gaia Microserver: An Extendable Mobile Middleware Platform
The Gaia ubiquitous computing platform currently supports mobile devices through a thin client proxy architecture. Mobile devices run a lightweight proxy client written in J2ME to...
Ellick Chan, Jim Bresler, Jalal Al-Muhtadi, Roy H....
PERCOM
2004
ACM
16 years 4 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva
ICWL
2009
Springer
15 years 11 months ago
Enhancing the Social Capital of Learning Communities by Using an Ad Hoc Transient Communities Service
In online learning, communities can help to enhance learning. However, because of the dynamic nature of communities, attaining and sustaining these communities can be difficult. On...
Sibren Fetter, Adriana J. Berlanga, Peter B. Sloep