Sciweavers

15 search results - page 3 / 3
» Pervasive Personal Computing in an Internet Suspend Resume S...
Sort
View
OTM
2007
Springer
14 years 16 days ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
PERVASIVE
2009
Springer
14 years 1 months ago
Askus: Amplifying Mobile Actions
Information sharing has undeniably become ubiquitous in the Internet age. The global village created on the Internet provides people with instant access to information and news on ...
Shin'ichi Konomi, Niwat Thepvilojanapong, Ryohei S...
NOSSDAV
2011
Springer
12 years 9 months ago
A measurement study of resource utilization in internet mobile streaming
The pervasive usage of mobile devices and wireless networking support have enabled more and more Internet streaming services to all kinds of heterogeneous mobile devices. However,...
Yao Liu, Fei Li, Lei Guo, Songqing Chen
MOBISYS
2010
ACM
13 years 8 months ago
Ensemble: cooperative proximity-based authentication
Ensemble is a system that uses a collection of trusted personal devices to provide proximity-based authentication in pervasive environments. Users are able to securely pair their ...
Andre Kalamandeen, Adin Scannell, Eyal de Lara, An...
MOBISYS
2008
ACM
14 years 6 months ago
Micro-Blog: sharing and querying content through mobile phones and social participation
Recent years have witnessed the impacts of distributed content sharing (Wikipedia, Blogger), social networks (Facebook, MySpace), sensor networks, and pervasive computing. We beli...
Al Schmidt, Jack Li, Landon P. Cox, Romit Roy Chou...