Pervasive Computing Applications-2
A Trust-Based Access Control Model for Pervasive Computing Applications FREE-DOWNLOAD [PDF] M Toahchoodee, R Abdunabi, I Ray… – Data and Applications …, 2009 Abstract. With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. In this work, we propose a […]
Context-Aware Pervasive Computing Environments-2
Embedded Semantics Empowering Context-Aware Pervasive Computing Environments FREE-DOWNLOAD [PDF] A Soylu… – Ubiquitous, Autonomic and …, 2009 Pervasive or ubiquitous computing enlarged traditional computing setting into the human layer of the earth. World Wide Web is the biggest digital information layer, hence it is unavoidable to stretch and integrate such an information layer over this new enlarged […]
Pervasive Computing Infrastructure
A Digital City Needs Open Pervasive Computing Infrastructure FREE-DOWNLOAD [PDF] T Ojala… – Proc. of Digital Cities, 2009 – ABSTRACT In this paper we promote open pervasive computing infrastructure in the public space as a prerequisite for conducting urban computing research with visible and lasting impact on the community. As a concrete example we present the UBI Open […]