Sciweavers

245 search results - page 29 / 49
» pervasive 2008
Sort
View
FGCS
2008
159views more  FGCS 2008»
14 years 9 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
KES
2008
Springer
14 years 9 months ago
The PERPLEXUS bio-inspired hardware platform: A flexible and modular approach
This paper introduces the Perplexus hardware platform, a scalable computing substrate made of custom reconfigurable devices endowed with bio-inspired capabilities. This platform w...
Andres Upegui, Yann Thoma, Eduardo Sanchez, Andr&e...
IADIS
2004
14 years 10 months ago
A CSP based ontology for a smart home
This paper addresses the problem of establishing collaboration between devices in a home environment, even when no previous knowledge is known or stored on the devices. It focuses...
José Ignacio Rendo Fernández, Iain W...
IWRT
2008
109views Communications» more  IWRT 2008»
14 years 11 months ago
Classification of RFID Attacks
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Altho...
Aikaterini Mitrokotsa, Melanie R. Rieback, Andrew ...
BMCBI
2008
85views more  BMCBI 2008»
14 years 9 months ago
Comprehensive analysis of circadian periodic pattern in plant transcriptome
Background: Circadian rhythm is a crucial factor in orchestration of plant physiology, keeping it in synchrony with the daylight cycle. Previous studies have reported that up to 1...
Andrey A. Ptitsyn