Most authentication protocols designed for ubiquitous computing environments try to solve the problem of intuitive, scalable, secure authentication of wireless communication. Due ...
Abstract. In this paper we identify the common techniques and technologies that are enabling location identification in a ubiquitous computing environment. We also address the imp...
Kavitha Muthukrishnan, Maria Eva Lijding, Paul J. ...
Towards the wide acceptance of ubiquitous networking, practical and deployable ubiquitous applications must be provided in a concrete and easily understandable form to end-users. ...
This paper addresses a major weakness of current technologies for the Semantic Web, namely the lack of a principled means to represent and reason about uncertainty. This not only h...
Paulo Cesar G. da Costa, Kathryn B. Laskey, Kennet...
Highly optimized reasoning support for Description Logics (DLs) has been developed during the past years. This paper presents our efforts to develop a reasoner suitable for mobile ...