The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Anticipatory mobile computing is an emerging research field in pervasive environments. However, building multiple anticipatory applications to proactively support a user on his behalf still involves a disproportionate effort through their interdisciplinary nature and individual complex development from scratch. In this paper, we present architectural concepts and a reference implementation of a distributed...
In disaster situations or on emergency terrains, Internet and Cloud access may be restricted; it may still be important to process complex resource-intensive tasks and to acquire distributed information for emergency response, using ad-hoc networks among, e.g., first responder mobile devices. Corresponding approaches towards coordination, resource utilization, and interoperability are still challenging...
Many networking applications implement topology adaptations to cope with network dynamics. Related work focuses on the specific application, lacking a general model for topology adaptations. In this paper, we analyze 14 topology adaptations from two different application domains. Based on the derived characteristics, we propose a general topology adaptation model. We present the Topology Adaptation...
Over the last years the number of cyber-attacks has been constantly increasing. Since isolated Intrusion Detection Systems (IDSs) cannot cope with the number and sophistication of attacks, collaboration among the defenders is required. Collaborative IDSs (CIDSs) work by exchanging alert traffic to construct a holistic view of the monitored network. However, an adversary can utilize probe-response...
Privacy, in particular anonymity, is required to increase the acceptance of users for the Internet of Things (IoT). The IoT is built upon sensors that encompass us in each step we take. Hence, they can collect sensitive, privacy-invading data that can be used to establish complete user profiles. For this reason, sensing in the IoT needs to provide means of privacy-protection. In this paper, we discuss...
In the future our homes will be more and more equipped with sensing and interaction devices that will make new multimedia experiences possible. These experiences will not necessarily be bound to the TV, tabletop, smart phone, tablet or desktop computer but will be embedded in our everyday surroundings. In order to enable new forms of interaction, we equipped an ordinary kitchen with a large variety...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.