Sciweavers

6861 search results - page 103 / 1373
» Security for Ubiquitous Computing
Sort
View
129
Voted
JNW
2007
81views more  JNW 2007»
15 years 18 days ago
A Ubiquitous Care-Support Service based on Agent-oriented Multiple-Context Coordination
Abstract— This paper presents a gentle system for supervising care-support services that fulfill users’ actual requirements based on their physical locations and statuses of s...
Hideyuki Takahashi, Yoshikazu Tokairin, Kazuhiro Y...
212
Voted
GIS
2008
ACM
16 years 1 months ago
Using tomography for ubiquitous sensing
By embedding sensors in mobile devices, it is possible to exploit the ubiquitous presence of these devices to construct applications for large-scale sensing and monitoring of envi...
Stacy Patterson, Bassam Bamieh, Amr El Abbadi
123
Voted
EUC
2007
Springer
15 years 6 months ago
A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks
Abstract. Random key pre-distribution schemes are vulnerable to collusion attacks. In this paper, we propose a new key management scheme for ubiquitous heterogeneous sensor network...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...
SIGCSE
2005
ACM
192views Education» more  SIGCSE 2005»
15 years 6 months ago
Ubiquitous presenter: increasing student access and control in a digital lecturing environment
The University of Washington’s Classroom Presenter lecturing system enables an active lecturing environment by combining a standard electronic slide presentation format with the...
Michelle Wilkerson, William G. Griswold, Beth Simo...
EUC
2005
Springer
15 years 6 months ago
Ubiquitous Learning on Pocket SCORM
With advanced technologies, computer devices have become smaller and powerful. As a result, many people enjoy ubiquitous learning using mobile devices such as Pocket PCs. Pocket PC...
Hsuan-Pu Chang, Wen-Chih Chang, Yun-Long Sie, Nige...