Sciweavers

6861 search results - page 40 / 1373
» Security for Ubiquitous Computing
Sort
View
138
Voted
SAC
2006
ACM
15 years 9 months ago
Methods and guidelines for the design and development of domestic ubiquitous computing applications
Bringing ubiquitous computing applications to home environments is a great challenge. In our research we investigate how applications can be conceived, designed, and implemented t...
Albrecht Schmidt, Lucia Terrenghi
123
Voted
APNOMS
2006
Springer
15 years 7 months ago
A Profile Based Vertical Handoff Scheme for Ubiquitous Computing Environment
Specifically ubiquitous computing paradigm is based on seamless connectivity. And also to guarantee the seamless connectivity, an intelligent network management between heterogeneo...
Chung-Pyo Hong, Tae-Hoon Kang, Shin-Dug Kim
162
Voted
ICWE
2004
Springer
15 years 9 months ago
Using Web Services to Build Context-Aware Applications in Ubiquitous Computing
Ubiquitous and mobile web applications are typically very autonomous in nature, because they rely on additional information about the user’s context. In this paper we present a g...
Gerhard Austaller, Jussi Kangasharju, Max Müh...
134
Voted
IAT
2010
IEEE
15 years 1 months ago
Location-Based Semantic Matchmaking in Ubiquitous Computing
Ever increasing efforts are spent in developing techniques and tools for a full exploitation of semantics in mobile environments, able to overcome volatility and resource limitati...
Michele Ruta, Floriano Scioscia, Eugenio Di Sciasc...
122
Voted
PERCOM
2003
ACM
16 years 3 months ago
Smart Identification Frameworks for Ubiquitous Computing Applications
Abstract. We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe su...
Friedemann Mattern, Kay Römer, Thomas Dü...