In pervasive computing environments, changes in context may trigger changes in an individual’s access permissions. We contend that existing access control frameworks do not provi...
Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Pras...
The conventional approach for building pervasive environments relies on middleware to integrate different systems. Instead, we have built a system that can deal with these environ...
Francisco J. Ballesteros, Enrique Soriano, Katia L...
Pervasive networks with low-cost embedded 8-bit processors are set to change our day-to-day life. Public-key cryptography provides crucial functionality to assure security which is...
A novel text input for public displays and palmtop computers is presented that separates the input from the display of the edited text. While the public display shows both the edi...
Abstract. In this paper we introduce the simultaneous tracking and activity recognition (STAR) problem, which exploits the synergy between location and activity to provide the info...