Sciweavers

6861 search results - page 127 / 1373
» Security for Ubiquitous Computing
Sort
View
MOBIMEDIA
2007
15 years 5 months ago
Experimental evaluation of community-based WLAN voice and data services
The purpose of this work is to experimentally evaluate the quality of voice and data services over community-based WLAN access networks. We use P2PWNC, the Wireless LAN roaming ar...
Pantelis A. Frangoudis, Vasileios P. Kemerlis, Dim...
RTCSA
2005
IEEE
15 years 9 months ago
Service Delivery in Context Aware Environments: Lookup and Access Control Issues
Large-scale distributed systems, such as ubiquitous computing environments, require a service delivery mechanism in order to keep track of the vast set of services offered and mak...
Maria Riaz, Saad Liaquat Kiani, Sungyoung Lee, San...
IHM
2004
ACM
15 years 9 months ago
Couplage de ressources d'interaction
Although coupling interaction resources is key to ubiquitous computing, this notion has been overlooked in previous studies. In this paper, we address this notion in a more system...
Nicolas Barralon, Christophe Lachenal, Joëlle...
ISAS
2004
Springer
15 years 9 months ago
On Enhancing the Robustness of Commercial Operating Systems
A ubiquitous computing system derives its operations from the collective interactions of its constituent components. Consequently, a robust ubiquitous system entails that the discr...
Andréas Johansson, Adina Sarbu, Arshad Jhum...
MDM
2004
Springer
15 years 9 months ago
Enabling Context-Aware and Privacy-Conscious User Data Sharing
This paper provides detail on two key components of the Houdini framework under development at Bell Labs, that enable context-aware and privacy-conscious user data sharing appropr...
Richard Hull, Bharat Kumar, Daniel F. Lieuwen, Pet...