Sciweavers

6861 search results - page 136 / 1373
» Security for Ubiquitous Computing
Sort
View
TKDE
2008
123views more  TKDE 2008»
15 years 4 months ago
DiSC: Benchmarking Secure Chip DBMS
Secure chips, e.g., present in smart cards, USB dongles, i-buttons, are now ubiquitous in applications with strong security requirements. Moreover, they require embedded data manag...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral, ...
EEMMAS
2007
Springer
15 years 10 months ago
Environment Support to the Management of Context Awareness Information
Abstract. Collaborative Ubiquitous Environments (CUEs) are environments supporting collaboration among persons in a ubiquitous computing setting. This paper shows how results of th...
Marco P. Locatelli, Giuseppe Vizzari
TRIDENTCOM
2005
IEEE
15 years 9 months ago
Analysis and Experimentation over Heterogeneous Wireless Networks
Wireless and mobile networks represent an enabling technology for ubiquitous access to information systems. However, there are critical issues that still prevent the widespread us...
Massimo Bernaschi, Antonio Pescapè, Filippo...
ICCS
2005
Springer
15 years 9 months ago
Publish/Subscribe Systems on Node and Link Error Prone Mobile Environments
Abstract. Publish/subscribe model is appropriate in many push based data dissemination applications such as data dissemination services, information sharing, service discovery, etc...
Sangyoon Oh, Sangmi Lee Pallickara, Sung Hoon Ko, ...
148
Voted
DSONLINE
2008
152views more  DSONLINE 2008»
15 years 4 months ago
Software Architecture Patterns for a Context-Processing Middleware Framework
Ubiquitous applications are characterised by variations of their execution context. Their correct operation requires some continual adaptations based on the observation of their e...
Romain Rouvoy, Denis Conan, Lionel Seinturier