Sciweavers

1988 search results - page 105 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
EUSAI
2004
Springer
15 years 8 months ago
Integrating Handhelds into Environments of Cooperating Smart Everyday Objects
Because of their severe resource-restrictions and limited user interfaces, smart everyday objects must often rely on remote resources to realize their services. This paper shows ho...
Frank Siegemund, Tobias Krauer
CAISE
2000
Springer
15 years 7 months ago
CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain user...
David Liu, Kincho H. Law, Gio Wiederhold
PERCOM
2003
ACM
15 years 8 months ago
Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile
Passive RFID technology and unobtrusive Bluetoothenabled active tags are means to augment products and everyday objects with information technology invisible to human users. This ...
Frank Siegemund, Christian Floerkemeier
IFIP
2004
Springer
15 years 8 months ago
Efficient Protocols for Computing the Optimal Swap Edges of a Shortest Path Tree
We consider the problem of computing the optimal swap edges of a shortest-path tree. This theoretical problem arises in practice in systems that offer point-offailure shortest-path...
Paola Flocchini, Antonio Mesa Enriques, Linda Pagl...
ICDCS
2008
IEEE
15 years 9 months ago
Heuristics-Based Strategies for Resolving Context Inconsistencies in Pervasive Computing Applications
Context-awareness allows pervasive applications to adapt to changeable computing environments. Contexts, the pieces of information that capture the characteristics of environments...
Chang Xu, Shing-Chi Cheung, Wing Kwong Chan, Chuny...