Sciweavers

6861 search results - page 220 / 1373
» Security for Ubiquitous Computing
Sort
View
168
Voted
MIDDLEWARE
2007
Springer
15 years 10 months ago
Domain-based context management for dynamic and evolutionary environments
Research in context-aware computing has produced a number of application prototypes, frameworks, middlewares and models for describing context. However, development of ubiquitous ...
Ricardo Couto Antunes da Rocha, Markus Endler
123
Voted
WASA
2009
Springer
107views Algorithms» more  WASA 2009»
15 years 11 months ago
Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks
Abstract. Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target be a malicious d...
Christine Laurendeau, Michel Barbeau
136
Voted
SIES
2007
IEEE
15 years 11 months ago
Architecture and Implementation of an Embedded Wormhole
Abstract— Recent advances in wireless communication technology have opened the way for mobile services and applications. This paper describes ongoing work in the context of the H...
Hugo Ortiz, Antonio Casimiro, Paulo Veríssi...
126
Voted
CHI
2005
ACM
16 years 5 months ago
Using context-aware computing to reduce the perceived burden of interruptions from mobile devices
The potential for sensor-enabled mobile devices to proactively present information when and where users need it ranks among the greatest promises of ubiquitous computing. Unfortun...
Joyce Ho, Stephen S. Intille
GCC
2006
Springer
15 years 8 months ago
Redar: A Remote Desktop Architecture for the Distributed Virtual Personal Computing
Some popular computing technologies, such as ubiquitous computing, grid computing and thin-client computing, bring people to a much more distributed and pervasive computing enviro...
Yuedong Zhang, Zhenhua Song, Dingju Zhu, Zhuan Che...