Sciweavers

181 search results - page 24 / 37
» Semantically-Enhanced Ubiquitous User Modeling
Sort
View
FC
2010
Springer
260views Cryptology» more  FC 2010»
15 years 25 days ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
PUC
2002
82views more  PUC 2002»
14 years 11 months ago
A Location Model for Communicating and Processing of Context
Location is one of the most important elements of context in ubiquitous computing. In this paper we describe a location model, a spatial-aware communication model and an implement...
Michael Beigl, Tobias Zimmer, Christian Decker
JUCS
2008
145views more  JUCS 2008»
14 years 11 months ago
Development of Ambient Intelligence Systems Based on Collaborative Task Models
: So far, the Ambient Intelligence (AmI) paradigm has been applied to the development of a great variety of real systems. They use advanced technologies such as ubiquitous computin...
Roberto F. Arroyo, Miguel Gea, José Luis Ga...
RE
2010
Springer
14 years 6 months ago
A goal-based framework for contextual requirements modeling and analysis
Abstract Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerg...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini
WISE
2006
Springer
15 years 5 months ago
Finding Reliable Recommendations for Trust Model
This paper presents a novel context-based approach to find reliable recommendations for trust model in ubiquitous environments. Context is used in our approach to analyze the userâ...
Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Ko...