Sciweavers

6861 search results - page 130 / 1373
» Security for Ubiquitous Computing
Sort
View
PODC
2010
ACM
15 years 8 months ago
Hybrid-secure MPC: trading information-theoretic robustness for computational privacy
Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion: If the number of corrupted p...
Christoph Lucas, Dominik Raub, Ueli M. Maurer
CF
2004
ACM
15 years 9 months ago
A framework for resource discovery in pervasive computing for mobile aware task execution
Aimed to provide computation ubiquitously, pervasive computing is perceived as a means to provide a user the transparency of anywhere, anyplace, anytime computing. Pervasive compu...
K. Kalapriya, S. K. Nandy, Deepti Srinivasan, R. U...
SAC
2004
ACM
15 years 9 months ago
Applications of context-aware computing in hospital work: examples and design principles
Context-awareness is a key concept in ubiquitous computing, which sometimes seems to be a technology looking for a purpose. In this paper we report on the application of context-a...
Jakob Bardram
IADIS
2004
15 years 5 months ago
An Exploratory Architecture for an Inhabited Web
The current World Wide Web is essentially a network of documents, a continuously evolving information universe. But the potential of internetworking goes far beyond information ac...
Ivan Tomek
JUCS
2006
135views more  JUCS 2006»
15 years 4 months ago
Visualization Services in a Conference Context: An Approach by RFID Technology
: Ambient Intelligent (AmI) vision is a new concept materialized by the Six Framework Program of the European Community. It involves three key technologies: Ubiquitous Computing, U...
José Bravo, Ramón Hervás, Ino...