Sciweavers

2047 search results - page 34 / 410
» Pervasive Computing on Active Networks
Sort
View
AINA
2007
IEEE
15 years 4 months ago
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients
We propose a four-party password authenticated interdomain key exchange protocol which makes use of properties of identity-based cryptography and secret public keys. Being passwor...
Ford-Long Wong, Hoon Wei Lim
CF
2004
ACM
15 years 3 months ago
Modeling service-based multimedia content adaptation in pervasive computing
Pervasive computing applications allow users to access information from anywhere while traveling and using variety of devices. Heterogeneity and limitation of resources involved i...
Girma Berhe, Lionel Brunie, Jean-Marc Pierson
PERVASIVE
2004
Springer
15 years 3 months ago
Recognizing Workshop Activity Using Body Worn Microphones and Accelerometers
Most gesture recognition systems analyze gestures intended for communication (e.g. sign language) or for command (e.g. navigation in a virtual world). We attempt instead to recogn...
Paul Lukowicz, Jamie A. Ward, Holger Junker, Mathi...
PERVASIVE
2004
Springer
15 years 3 months ago
Activity Recognition in the Home Using Simple and Ubiquitous Sensors
In this work, a system for recognizing activities in the home setting using a set of small and simple state-change sensors is introduced. The sensors are designed to be “tape on ...
Emmanuel Munguia Tapia, Stephen S. Intille, Kent L...
MONET
2010
170views more  MONET 2010»
14 years 8 months ago
A Framework for Engineering Pervasive Applications Applied to Intra-vehicular Sensor Network Applications
The vehicle sector is one of the most exciting application areas for wireless ad hoc networks and pervasive computing technologies. Vehicles are constantly being equipped with more...
Antonio Coronato, Giuseppe De Pietro, Jong Hyuk Pa...