Sciweavers

2047 search results - page 50 / 410
» Pervasive Computing on Active Networks
Sort
View
PERCOM
2007
ACM
15 years 4 months ago
Decentralized Bootstrapping in Pervasive Applications
Abstract— Deploying world-scale pervasive applications usually requires substantial investments in server infrastructure. A better option is to use P2P techniques, because it dis...
Mirko Knoll, Arno Wacker, Gregor Schiele, Torben W...
POLICY
2005
Springer
15 years 4 months ago
Managing the Policies of Non-Technical Users in a Dynamic World
In this paper, we describe the use of description logic as the basis for a policy representation language and show how it is used in our implementation of a policy managed pervasi...
Tim Owen, Ian Wakeman, Bill Keller, Julie Weeds, D...
ICISC
2009
138views Cryptology» more  ICISC 2009»
14 years 8 months ago
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly...
Madeline González Muñiz, Rainer Stei...
JCST
2010
119views more  JCST 2010»
14 years 9 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
ICDCSW
2003
IEEE
15 years 3 months ago
Controlled Availability of Pervasive Web Services
The increasing use of computers to manage everyday business poses problems for workers when they are away from their home environment. There are two key problems: • How can a mo...
Peter Robinson, Stefan Hild