Sciweavers

2362 search results - page 442 / 473
» The wireless network jamming problem
Sort
View
PERCOM
2004
ACM
16 years 1 months ago
Patch Panel: Enabling Control-Flow Interoperability in Ubicomp Environments
Ubiquitous computing environments accrete slowly over time rather than springing into existence all at once. Mechanisms are needed for incremental integration-the problem of how t...
Rafael Ballagas, Andy Szybalski, Armando Fox
PERCOM
2004
ACM
16 years 1 months ago
PrudentExposure: A Private and User-centric Service Discovery Protocol
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
PERCOM
2004
ACM
16 years 1 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles
PERCOM
2003
ACM
16 years 1 months ago
PILGRIM: A Location Broker and Mobility-Aware Recommendation System
Mobile computing adds a mostly unexplored dimension to data mining: user's position is a relevant piece of information, and recommendation systems, selecting and ranking link...
Mauro Brunato, Roberto Battiti
PERCOM
2003
ACM
16 years 1 months ago
Providing Contextual Information to Pervasive Computing Applications
Pervasive computing applications are increasingly leveraging contextual information from several sources to provide users with behavior appropriate to the environment in which the...
Glenn Judd, Peter Steenkiste