Sciweavers

11927 search results - page 2056 / 2386
» Wireless Sensor Networks
Sort
View
PERCOM
2006
ACM
16 years 4 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
144
Voted
PERCOM
2006
ACM
16 years 4 months ago
Transmission control scheme for fast RFID object identification
There are a variety of approaches to improve the speed at which large RFID tag populations are being identified. In this paper, we present a transmission control strategy for a co...
Christian Floerkemeier
PERCOM
2006
ACM
16 years 4 months ago
Proximity Based Access Control in Smart-Emergency Departments
In this paper, we propose a Proximity Based automated Access Control (PBAC) model for smart-ED environments which improves the existing ED work-flow by automating mundane administ...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
PERCOM
2006
ACM
16 years 4 months ago
Balancing Autonomy and User Control in Context-Aware Systems - a Survey
Application autonomy can reduce interactions with users, ease the use of the system, and decrease user distraction. On the other hand, users may feel loss of control over their ap...
Bob Hardian, Jadwiga Indulska, Karen Henricksen
PERCOM
2006
ACM
16 years 4 months ago
SmartContacts: A Large Scale Social Context Service Discovery System
The proliferation of cell phones has led to an ever increasing number of inappropriate interruptions. SmartContacts provides a solution to this problem by empowering the caller to...
Yong Liu, Kay Connelly
« Prev « First page 2056 / 2386 Last » Next »