Sciweavers

6861 search results - page 153 / 1373
» Security for Ubiquitous Computing
Sort
View
CHI
2006
ACM
16 years 4 months ago
Tableau machine: an alien presence in the home
Research in Ambient Intelligence and Ubiquitous Computing has put computational devices into many social settings while leaving intact much of the "task support and informati...
Mario Romero, Zachary Pousman, Michael Mateas
CHI
2005
ACM
16 years 4 months ago
It's a jungle out there: practical considerations for evaluation in the city
An essential aspect of mobile and ubiquitous computing research is evaluation within the expected usage context, including environment. When that environment is an urban center, i...
Melanie Kellar, Derek F. Reilly, Kirstie Hawkey, M...
TIS
2010
131views Education» more  TIS 2010»
14 years 11 months ago
Cultivating Interaction Ubiquity at Work
: Since the invention of the electronic computer in the 1940s, technological development has resulted in dramatically increased processing power, storage capacity and communication...
Carsten Sørensen
SCN
2010
Springer
129views Communications» more  SCN 2010»
15 years 2 months ago
Improved Primitives for Secure Multiparty Integer Computation
We consider a collection of related multiparty computation protocols that provide core operations for secure integer and fixed-point computation. The higher-level protocols offer...
Octavian Catrina, Sebastiaan de Hoogh
PERCOM
2004
ACM
16 years 3 months ago
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions
We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be succ...
Roshan K. Thomas, Ravi S. Sandhu