Sciweavers

6861 search results - page 128 / 1373
» Security for Ubiquitous Computing
Sort
View
CSREASAM
2007
15 years 5 months ago
Contextual Risk-Based Access Control
- Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are in...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
CORR
2010
Springer
157views Education» more  CORR 2010»
15 years 4 months ago
Context Ontology Implementation for Smart Home
Context awareness is one of the important fields in ubiquitous computing. Smart Home, a specific instance of ubiquitous computing, provides every family with opportunities to enjo...
Tam Van Nguyen, Wontaek Lim, Huy Anh Nguyen, Deokj...
DKE
2008
72views more  DKE 2008»
15 years 4 months ago
On space constrained set selection problems
Space constrained optimization problems arise in a variety of applications, ranging from databases to ubiquitous computing. Typically, these problems involve selecting a set of it...
Themis Palpanas, Nick Koudas, Alberto O. Mendelzon
EUC
2005
Springer
15 years 9 months ago
A World Model for Smart Spaces
A world model for ubiquitous computing environments is presented. It can be dynamically organized like a tree based on geographical containment, such as in a user-room-floor-build...
Ichiro Satoh
MHCI
2004
Springer
15 years 9 months ago
Butler: A Universal Speech Interface for Mobile Environments
Abstract. Speech interfaces are about to be integrated in consumer appliances and embedded systems and are expected to be used by mobile users in ubiquitous computing environments....
Botond Pakucs