• No results found

pervasive environment

Evaluation of Integrated WiMAX WLAN under Pervasive Environment in OPNET

Evaluation of Integrated WiMAX WLAN under Pervasive Environment in OPNET

... rural environment with Outdoor to Indoor and Pedestrian path loss model under different network ...the pervasive environment of mobility and path loss as presented in ...

5

Attribute Based Access Control with Trust Calculation (ABAC T) for Decision Policies of Health Care in Pervasive Environment

Attribute Based Access Control with Trust Calculation (ABAC T) for Decision Policies of Health Care in Pervasive Environment

... the pervasive computing environment, this traditional technique is not suitable to provide complete security to the network ...a pervasive environment may need access to local services and ...

5

Trusted and secure clustering in mobile pervasive environment

Trusted and secure clustering in mobile pervasive environment

... In the pervasive environment the mobile devices (bio-sensor nodes) connected in ad- hoc way for communication and needs to behave cooperatively. Though the security threats and attacks posed to specific ...

17

Adaptation as an aspect in pervasive computing

Adaptation as an aspect in pervasive computing

... While the 'LVSOD\0DQDJHU and &RQWHQW0DQDJHU aspects are application independent and handle adaptation facets that span across applications in the pervasive environment, the 'LVSOD\$GDSWDWLRQ aspect, ...

6

DYNAMIC SENSOR RELOCATION TECHNIQUE BASED LIGHT WEIGHT INTEGRATED PROTOCOL FOR 
WSN

DYNAMIC SENSOR RELOCATION TECHNIQUE BASED LIGHT WEIGHT INTEGRATED PROTOCOL FOR WSN

... In Pervasive environment privacy is foremost concern. In this paper proposed an intelligent mechanism for privacy preservation model using dynamic trust and security management techniques. The minimum ...

9

A PROFICIENT LOW COMPLEXITY ALGORITHM FOR PREEMINENT TASK SCHEDULING INTENDED 
FOR HETEROGENEOUS ENVIRONMENT

A PROFICIENT LOW COMPLEXITY ALGORITHM FOR PREEMINENT TASK SCHEDULING INTENDED FOR HETEROGENEOUS ENVIRONMENT

... Vampire attacks as illustrated in [6] are very hard to sense and simply carry out the malevolent pervasive environment which was send during the protocol amenable messages. At the time of topology ...

10

Solving the Challenges of Pervasive Computing

Solving the Challenges of Pervasive Computing

... emergence. Pervasive Computing con- tains other different challenges like: assessment systems for Pervasive Computing applications, development cycle issues, social collaboration, user interface and ...

10

Multimedia Resource Replication Strategy for a Pervasive Peer-to-Peer Environment

Multimedia Resource Replication Strategy for a Pervasive Peer-to-Peer Environment

... context-aware pervasive computing, where diverse computer devices communicate with each other through different network access technologies, and allow resource access based on user ...

7

An Approach for Location privacy in Pervasive Computing Environment

An Approach for Location privacy in Pervasive Computing Environment

... Many countries recognize privacy as a right and have attempted to codify it in law. The 1948 Universal Declaration of Human Rights [3] declares that everyone has a right to privacy at home, with family, and in ...

6

A unified trust model for pervasive computing environment

A unified trust model for pervasive computing environment

... In pervasive computing environments, devices tend to interact without prior knowledge of each other and meanwhile need to distinguish each other autonomously without human ...of pervasive environments ...

36

Pervasive Transcription of a Herpesvirus Genome Generates Functionally Important RNAs

Pervasive Transcription of a Herpesvirus Genome Generates Functionally Important RNAs

... of pervasive transcription of the MHV68 genome (6) have been independently confirmed (7), whether these RNAs have any function is ...of pervasive transcription are irrelevant to the viral life cycle and ...

13

PERVASIVE AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURES FOR MOBILE USERS USING PERVASIVE PKI

PERVASIVE AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURES FOR MOBILE USERS USING PERVASIVE PKI

... Authentication and authorization services for Internet users can be based on AAIs. In the connected mode, Public Key Infrastructures and Privilege Management Infrastructures (PMIs) can efficiently support both services, ...

7

ALPH : a DSAL based programming model for complexity management in pervasive healthcare applications

ALPH : a DSAL based programming model for complexity management in pervasive healthcare applications

... in pervasive healthcare applications discussed in Chapter 1 and identified in the limitations of Chapter ...modular pervasive healthcare ...crosscutting pervasive healthcare concerns is also ...

248

Pervasive Data Science:New Challenges at the Intersection of Data Science and Pervasive Computing

Pervasive Data Science:New Challenges at the Intersection of Data Science and Pervasive Computing

... Designing these systems will require a clear under- standing of cognition. Psychologists have recently begun to distinguish between two metaphorical systems of thought – System 1 (“intuition”) and System 2 (“reasoning”) ...

7

Technical Report: The Pediatrician’s Role in the Diagnosis and Management of Autistic Spectrum Disorder in Children

Technical Report: The Pediatrician’s Role in the Diagnosis and Management of Autistic Spectrum Disorder in Children

... An audiologic evaluation and a comprehensive speech and language evaluation should always be performed in any child who has language delays, whether or not autistic features are present. A lead study should be performed ...

20

Spatial awareness in pervasive ecosystems

Spatial awareness in pervasive ecosystems

... physical environment as the main example), and following the constraints that this space enacts typically in terms of topology of interactions between computing devices, as well as the timing aspects including ...

29

Sleep, anxiety and the effects on cognition

Sleep, anxiety and the effects on cognition

... (PedsQL), Pervasive Developmental Disorder Behaviour Inventory (PDDBI), Photoelectric Rotary Pursuit Task (PRPT), Pittsburgh Insomnia Rating Scale 20 (PIRS 20), Polysomnographic (PSG), Psychoeducational ...

143

Analysis of the Evaluation of Application Led Research in Pervasive Computing

Analysis of the Evaluation of Application Led Research in Pervasive Computing

... prevent pervasive comput- ing from being relegated to the status of a ...this environment it is not possible to actually compare applications in specific ...

15

Reuse of pervasive system architectures

Reuse of pervasive system architectures

... today’s pervasive/communication systems and used in a conceptual reasoning framework allowing easy comparison and ...of pervasive systems into models of these building blocks and integrating these models to ...

15

Weaving the Pervasive Information Fabric

Weaving the Pervasive Information Fabric

... Also, through our collaboration with IBM Hursley Labs, we have introduced Tspaces [17] as a link repository and messaging infrastructure. TSpaces, con- ceptually nothing more than a communications buffer with database ...

9

Show all 10000 documents...

Related subjects