Sciweavers

6861 search results - page 131 / 1373
» Security for Ubiquitous Computing
Sort
View
FASE
2008
Springer
15 years 5 months ago
Language-Based Optimisation of Sensor-Driven Distributed Computing Applications
In many distributed computing paradigms, especially sensor networks and ubiquitous computing but also grid computing and web services, programmers commonly tie their application to...
Jonathan J. Davies, Alastair R. Beresford, Alan My...
PDCAT
2007
Springer
15 years 10 months ago
Incorporating Security Requirements into Communication Protocols in Multi-agent Software Systems
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages o...
Yuxiu Luo, Giannakis Antoniou, Leon Sterling
ACSAC
1999
IEEE
15 years 8 months ago
Toward a Taxonomy and Costing Method for Security Services
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning co...
Cynthia E. Irvine, Timothy E. Levin
CJ
2004
99views more  CJ 2004»
15 years 3 months ago
Filters for XML-based Service Discovery in Pervasive Computing
Pervasive computing refers to an emerging trend towards numerous casually accessible devices connected to an increasingly ubiquitous network infrastructure. An important challenge...
Georgia Koloniari, Evaggelia Pitoura
PERCOM
2005
ACM
15 years 9 months ago
A Learning Model for Trustworthiness of Context-Awareness Services
When ubiquitous computing devices access a contextawareness service, such as a location service, they need some assurance that the quality of the information received is trustwort...
Markus C. Huebscher, Julie A. McCann