Sciweavers

9588 search results - page 1621 / 1918
» Service Value Networks
Sort
View
PERCOM
2008
ACM
16 years 4 months ago
Provably Correct Pervasive Computing Environments
The field of pervasive computing has seen a lot of exciting innovations in the past few years. However, there are currently no mechanisms for describing the properties and capabil...
Anand Ranganathan, Roy H. Campbell
PERCOM
2008
ACM
16 years 4 months ago
MAGIC Broker: A Middleware Toolkit for Interactive Public Displays
Large screen displays are being increasingly deployed in public areas for advertising, entertainment, and information display. Recently we have witnessed increasing interest in su...
Aiman Erbad, Michael Blackstock, Adrian Friday, Ro...
142
Voted
PERCOM
2007
ACM
16 years 4 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
PERCOM
2007
ACM
16 years 4 months ago
Dynamic Context Bindings in Pervasive Middleware
Context-awareness (CA) enables the development of personalized pervasive services. Current context-aware infrastructures focus on middleware solutions to support acquisition, usag...
Tom Broens, Marten van Sinderen, Aart van Halteren...
PERCOM
2006
ACM
16 years 4 months ago
Dialing for Displays: Session Initiation Protocol for Opportunistic Augmentation
Opportunistic augmentation denotes connecting a personal mobile device to another device to gain a transient advantage for the user. For example, a mobile phone user might borrow ...
John J. Barton, Stina Nylander, Fopefolu Folowosel...
« Prev « First page 1621 / 1918 Last » Next »