Sciweavers

490 search results - page 85 / 98
» Protocols for Mobile Devices Integration in Heterogeneous En...
Sort
View
ACISP
2006
Springer
15 years 3 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
AUTOMOTIVEUI
2009
ACM
15 years 4 months ago
Towards a flexible UI model for automotive human-machine interaction
In this paper we present an approach for creating user infrom abstract representations for the automotive domain. The approach is based on transformations between different user ...
Guido M. de Melo, Frank Honold, Michael Weber, Mar...
SACMAT
2009
ACM
15 years 4 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
PERCOM
2007
ACM
15 years 9 months ago
BlueTorrent: Cooperative content sharing for Bluetooth users
People wish to enjoy their everyday lives in various ways, among which entertainment plays a major role. In order to improve lifestyle with more ready access to entertainment cont...
Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki C...
PERCOM
2003
ACM
15 years 9 months ago
BASE - A Micro-Broker-Based Middleware for Pervasive Computing
Pervasive computing environments add a multitude of additional devices to our current computing landscapes. Specialized embedded systems provide sensor information about the real ...
Christian Becker, Gregor Schiele, Holger Gubbels, ...