Sciweavers

6861 search results - page 53 / 1373
» Security for Ubiquitous Computing
Sort
View
146
Voted
WIMOB
2008
IEEE
15 years 10 months ago
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
— Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubiquitous computing environments. Understanding how to efficiently and effect...
Greg Bigwood, D. Rehunathan, Martin Bateman, Trist...
124
Voted
MKWI
2008
156views Business» more  MKWI 2008»
15 years 5 months ago
Enabling Open Innovation in a World of Ubiquitous Computing - Proposing a Research Agenda
: This article proposes a new Ubiquitous Computing (UC) infrastructure for open access to object data that will come along with a new research agenda especially for the field of Wi...
Detlef Schoder, Christian Schmitt, Kai Fischbach, ...
124
Voted
ACM
1995
15 years 7 months ago
Questioning Ubiquitous Computing
Agustin A. Araya