Sciweavers

2047 search results - page 17 / 410
» Pervasive Computing on Active Networks
Sort
View
73
Voted
PERCOM
2003
ACM
15 years 9 months ago
Location-Detection Strategies in Pervasive Computing Environments
Pervasive computing environments accommodate interconnected and communicating mobile devices. Mobility is a vital aspect of everyday life and technology must offer support for mov...
Sebastian Fischmeister, Guido Menkhaus, Alexander ...
82
Voted
CJ
2004
99views more  CJ 2004»
14 years 10 months ago
Filters for XML-based Service Discovery in Pervasive Computing
Pervasive computing refers to an emerging trend towards numerous casually accessible devices connected to an increasingly ubiquitous network infrastructure. An important challenge...
Georgia Koloniari, Evaggelia Pitoura
PERVASIVE
2007
Springer
15 years 4 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
92
Voted
GI
2009
Springer
15 years 2 months ago
Flow-driven Interactions for Adaptive Pervasive Applications
: The era of ubiquitous and pervasive computing technology opens the world for new pervasive applications and services within the physical surroundings. Often users find themselves...
Bashar Altakrouri
85
Voted
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis