Sciweavers

245 search results - page 22 / 49
» pervasive 2008
Sort
View
118
Voted
EUC
2008
Springer
14 years 11 months ago
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications
Password authentication is a popular approach used for user authentication in pervasive computing environments due to its simplicity and convenience. To secure the transmission be...
Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung
GLOBECOM
2008
IEEE
14 years 10 months ago
Cross-Layer Rate Allocation for Multimedia Applications in Pervasive Computing Environment
Abstract— An important issue for supporting multimedia applications in multiple heterogeneous networks, a typical pervasive computing environment, is how to optimize the rate all...
Liang Zhou, Benoit Geller, Anne Wei, Baoyu Zheng, ...
SAC
2008
ACM
14 years 9 months ago
Total order broadcast on pervasive systems
Total Order Broadcast protocols are important tools to ensure coherence across distributed systems. Contrarily to classical distributed systems, pervasive systems bring important ...
Luiz Angelo Steffenel, Manuele Kirsch-Pinheiro, Yo...
GPC
2008
Springer
14 years 10 months ago
A Pragmatic Approach for the Semantic Description and Matching of Pervasive Resources
The increasing popularity of personal wireless devices has raised new demands for the efficient discovery of heterogeneous devices and services in pervasive environments. With the...
Ayomi Bandara, Terry R. Payne, David De Roure, Nic...
89
Voted
SASO
2008
IEEE
15 years 3 months ago
Pervasive Self-Learning with Multi-modal Distributed Sensors
Truly ubiquitous computing poses new and significant challenges. A huge number of heterogeneous devices will interact to perform complex distributed tasks. One of the key aspects...
Nicola Bicocchi, Marco Mamei, Andrea Prati, Rita C...