• No results found

ubiquitous computing environment

GCUCE: Grid Computing for Ubiquitous Computing Environment

GCUCE: Grid Computing for Ubiquitous Computing Environment

... (Grid Computing for Ubiquitous Computing Environment) core service modules which are composed of context, environment, event, task, space management for application ...unified ...

6

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

... Abstract — As a case study of the ubiquitous computing system, we have implemented a prototype for the JPEG encoding application. In order to achieve this eventual development in the real world, we studied ...

8

Modeling interaction using trust and recommendation in ubiquitous computing environment

Modeling interaction using trust and recommendation in ubiquitous computing environment

... human notion is applied to cope with new security con- cerns in ubiquitous environments. Blaze et al. [14], first proposed decentralized trust-management PolicyMaker. Their trust model was based on credential ...

13

Virtual Database Technology for Distributed Database in Ubiquitous Computing Environment

Virtual Database Technology for Distributed Database in Ubiquitous Computing Environment

... all ubiquitous databases on the Internet as if they were recognized as a single database, thereby helping to reduce their workloads such as data collection from the Internet databases and data cleansing ...such ...

13

Creating, Editing, and Sharing Complex Ubiquitous Computing Environment Configurations with CollaborationBus

Creating, Editing, and Sharing Complex Ubiquitous Computing Environment Configurations with CollaborationBus

... interfae allows users to ontrol their respetive repositorythey an reate new pipeline ompositions, or edit,.. ativate or deativate existing ones.[r] ...

15

Secured Policy based Resource Access and User Authentication in Ubiquitous Computing Environment

Secured Policy based Resource Access and User Authentication in Ubiquitous Computing Environment

... Abstract: Policy-based resource access and data sharing are the most specific in context-aware computing. Granting authentication to the wireless and ad hoc users is usually difficult because the system has got to ...

6

Formal Policy based Authorization Model for Ubiquitous Enterprise Computing Environment

Formal Policy based Authorization Model for Ubiquitous Enterprise Computing Environment

... the computing system through single security ...for ubiquitous and mobile computing environment by taking into account different types of ...for ubiquitous computing ...

8

Ubiquitous Computing Frameworks and Location Sensing Technologies: A Survey

Ubiquitous Computing Frameworks and Location Sensing Technologies: A Survey

... Mark Wiser in his articles [1,5] related to : “The Computer for the 21 st Century” highlighted the future trend of merging of profound technologies into everyday life. Today the ubicomp applications are diverse in nature ...

6

Ubiquitous Security for Ubiquitous Computing

Ubiquitous Security for Ubiquitous Computing

... truly ubiquitous computing ...equally ubiquitous security risks due principally to the num- ber and complexity of services being run over such ...a ubiquitous computing ...

8

Privacy Preserving in Ubiquitous Computing: Classification & Hierarchy

Privacy Preserving in Ubiquitous Computing: Classification & Hierarchy

... Though our system can work appropriately and satisfactorily, there still exist many problems compared with other existing systems. Basically speaking, it is a behavior-based system. When it comes to a service that a user ...

22

MANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS

MANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS

... Ubiquitous computing applications occupied more research areas like medicine, banking and reporting applications that require user privacy. In this paper, privacy is detected as a set of parameters ...

5

An Agent Construction Model for Ubiquitous Computing Devices

An Agent Construction Model for Ubiquitous Computing Devices

... In this paper, we address just these issues by presenting a model for agent con- struction that is conceptually grounded and architecturally neutral. It is conceptually grounded by the understanding of agent systems ...

16

Self-localization in ubiquitous computing using sensor fusion

Self-localization in ubiquitous computing using sensor fusion

... By and large the most popular ubiquitous localization systems are RF based and the performance of those systems is as broad as it could possibly be. As discussed in [4] the accuracy ranges from hundreds of meters ...

175

A Generic Service Architecture for Secure Ubiquitous Computing Systems

A Generic Service Architecture for Secure Ubiquitous Computing Systems

... of Ubiquitous Com- puting [1] rely on the seamless interoperation of hetero- geneous devices including not only powerful computer equipment, but also resource constrained devices, like Personal Digital Assistants ...

16

Futures in the making: Practices to anticipate 'ubiquitous computing'

Futures in the making: Practices to anticipate 'ubiquitous computing'

... many ubiquitous computings (Greenfi eld, 2006, page ...catalogued. Ubiquitous computing continues to signify an arena of academic and industrial research, several conferences (for example, Bardram et ...

16

Situation based testing for ubiquitous computing systems

Situation based testing for ubiquitous computing systems

... user’s environment. Although the terms ubiquitous computing and pervasive computing are often used interchangeably, a literature survey by Ronzani [93] uncovered subtle differences between the ...

338

UbiMount: 2nd workshop on ubiquitous computing in the mountains

UbiMount: 2nd workshop on ubiquitous computing in the mountains

... • Interaction techniques for motor skills learning • Wearable computing technologies for mountaineers This workshop aims to bring together researchers from academia and industry (e.g. sports technologies, tourism, ...

5

Ubiquitous computing environments and its usage access control

Ubiquitous computing environments and its usage access control

... of ubiquitous computing and its applications are in infant stage, but an active research area [2], [3], ...for ubiquitous computing [5], [6], [4], ...a computing system with physical ...

10

A general purpose programming framework for ubiquitous computing environments

A general purpose programming framework for ubiquitous computing environments

... Infrastructure. Ubiquitous environments are non- deterministic in terms of the number of users they are required to support, availability of resources and connectivity of ...

9

Trust and Concurrency   A Theory Contribution to Ubiquitous Computing (talk)

Trust and Concurrency A Theory Contribution to Ubiquitous Computing (talk)

... Security scenario for global computing environment Large number of autonomous entities Large number of administrative domains No common trusted computing base No global system trust Virt[r] ...

106

Show all 10000 documents...

Related subjects