Sciweavers

1579 search results - page 6 / 316
» Simulation Model for Self-Adaptive Applications in Pervasive...
Sort
View
ICPPW
2006
IEEE
15 years 4 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
MOBICOM
2000
ACM
15 years 2 months ago
Challenges: an application model for pervasive computing
Ì Û Ý ÑÓ Ð ÓÑÔÙØ Ò Ú × Ò ÔÔÐ Ø ÓÒ× Ö ¹ Ú ÐÓÔ ¸ ÔÐÓÝ Ò Ù× ØÓ Ý Ó × ÒÓØ Ñ Ø Ø Ü¹ Ô Ø Ø ÓÒ× Ó Ø Ù× Ö ÓÑÑÙÒ ØÝ Ò Ð...
Guruduth Banavar, James Beck, Eugene Gluzberg, Jon...
ECOOPWEXCEPTION
2006
Springer
15 years 1 months ago
Exception Handling in CSCW Applications in Pervasive Computing Environments
Abstract. In this paper we present conceptual foundations of an exception handling model for context-aware CSCW applications. Human participation in the recovery actions is an inte...
Anand R. Tripathi, Devdatta Kulkarni, Tanvir Ahmed
104
Voted
COMPSAC
2006
IEEE
15 years 4 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
PERCOM
2006
ACM
15 years 9 months ago
Sentient Processes - Process-based Applications in Pervasive Computing
Users' tasks are typically a sequence of steps. Today, the goal of Pervasive Computing applications ? to support users in their tasks by using context information ? is only p...
Stephan Urbanski, Christian Becker, Kurt Rothermel