Sciweavers

193 search results - page 20 / 39
» pervasive 2010
Sort
View
72
Voted
ACNS
2010
Springer
159views Cryptology» more  ACNS 2010»
15 years 2 months ago
A Message Recognition Protocol Based on Standard Assumptions
We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the ran...
Atefeh Mashatan, Serge Vaudenay
PERCOM
2010
ACM
14 years 4 months ago
The architecture design of a cross-domain context management system
A new context management framework, which supports the interaction between different domain context managers, is proposed. Two different context producerconsumer patterns are defin...
Bin Guo, Lin Sun, Daqing Zhang
SBP
2010
Springer
15 years 4 months ago
User Generated Content Consumption and Social Networking in Knowledge-Sharing OSNs
Abstract. Knowledge-sharing online social networks are becoming increasingly pervasive and popular. While the user-to-user interactions in these networks have received substantial ...
Jake T. Lussier, Troy Raeder, Nitesh V. Chawla
IWMM
2010
Springer
157views Hardware» more  IWMM 2010»
15 years 2 months ago
Tracing garbage collection on highly parallel platforms
The pervasiveness of multiprocessor and multicore hardware and the rising level of available parallelism are radically changing the computing landscape. Can software deal with tom...
Katherine Barabash, Erez Petrank
PERCOM
2010
ACM
15 years 1 months ago
Decomposing power measurements for mobile devices
—Modern mobile phones are an appealing platform for pervasive computing applications. However, the complexity of these devices makes it difficult for developers to understand th...
Andrew Colin Rice, Simon Hay