The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to their privileged position halfway between the physical and the cyber universes, user interfaces may play an important role in preventing, tolerating, and learning from scenarios potentially affecting mission safety and the user's quality of experience. This vision is embodied here in the main ideas and a proof-of-concepts implementation of user interfaces that combine dynamic profiling with...
Radio frequency identification (RFID) technology is increasingly being incorporated into everyday objects. This case study examines three examples - credit cards, transit cards, and the U.S. e-Passport - given ubiquitous computing power through the addition of RFID. We explored user comprehension of RFID technology generally and these implementations specifically to understand if and how the addition...
The following topics are dealt with: Internet; crowdsourcing; software engineering; cyber security; successive iterative decoding; correlated Rayleigh fading envelope; pseudorandom phase generation; nonuniform signal constellation; network coding; mobile Web service; mobile Web services; fault tolerant architecture; context aware approach; arabic language processing; smart grid; video techniques;...
The omnipresence of e-services running on various instances of pervasive e-infrastructures that are fundamental to the contemporary information society generates an abundance of digital evidence. The evidence in a digital form stems from a myriad of sources ranging from stand alone computers and their volatile and non-volatile storages, to mobile small scale digital devices, network traffic, ever-present...
The current and future dynamic development and innovation in the field of Information Communications Technologies (ICT) create a platform for the ubiquitous connectivity via Cyberspace for anywhere at any time for anyone worldwide. Having millions of people all over the planet, connected to the Internet via his/her PC, laptop, or any portable mobile device create opportunities for communication all...
Internet of Things (IoT) consists of several tiny devices connected together to form a collaborative computing environment. IoT imposes peculiar constraints in terms of connectivity, computational power and energy budget, which make it significantly different from those contemplated by the canonical doctrine of security in distributed systems. In order to circumvent the problem of security in IoT...
Pervasive computing environments comprise a myriad of devices. In this framework, interactions take place between different parties to simplify users' everyday life in a natural and transparent manner. These interactions, that are generally oriented to the delivery of services, usually involve the exchange of identity information and personal data over the networks. Since transactions may occur between...
Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there...
The following topics are dealt with: security; pervasive & ubiquitous computing; IPTV, video and mobility; network topology; wireless & 4G; WiMax; resilience & network planning; wireless protocols; network architectures and systems; virtualisation & scaling; self-adaptive network systems; distributed control algorithms; adaptive network control and; networked healthcare...
With a prevalence of pervasive computing, especially cloud computing, the software is at the core and play a vital role. This advance the security problem, so software trust is drawing increasing attention. Therefore, we need a unified trust relationship model between entities, which captures both the needs of the traditional computing world and the world of pervasive computing where the continuum...
Smartphones define a trend towards increasing combination and integration of sensing capabilities with almost ubiquitous inter-connectivity. Resulting location-based services and context-aware applications will benefit users by adapting better to the user application needs. However, there is a lack of effective means for controlling privacy in such systems which will likely increase further with future...
Daidalos offers a platform for service and identity management that supports secure context-aware and personalizable delivery of service discovery, composition, and adaptation. It also provides a runtime environment for deployment and execution.
The following topics are dealt with: mobile computing; wireless sensor networks; cloud computing; grid, computing; data center computing; cluster computing; energy-aware applications; virtualization; multicore computing; computer architecture; distributed computing; computer networks; network architecture; CPS security; CPS computing; social networking; Internet of things; WISARN I and embedded system...
In this paper, we investigate the security challenges and issues of cyber-physical systems. (1)We abstract the general workflow of cyber physical systems, (2)identify the possible vulnerabilities, attack issues, adversaries characteristics and a set of challenges that need to be addressed, (3)then we also propose a context-aware security framework for general cyber-physical systems and suggest some...
Pervasive computing is a rapidly developing area of Information and Communications Technology (ICT). It refers to the increasing integration of ICT into people's lives and environments, made possible by the convergence of advanced electronic - and particularly, wireless - technologies and the Internet. Wireless technologies are expected to connect various devices in many potential applications, from...
The following topics are dealt with: mobile computing; wireless communications; database and data mining; grid and cloud computing; ubiquitous computing; intelligent and bio-inspired computing; advanced networking; security; distributed and parallel computing; data management; workflow management; quality of services and scientific computing.
The following topics are dealt with: health care; information technology; biofeedback; technology infrastructure; collaborative business; pervasive database security; context-aware scheduling algorithm; enterprises process cooperative model; feedback adaptive fuzzy Petri net model; group-based load balancing; network-level synchronization; data collected routing algorithm; multimodal wireless video...
According to the characteristics of pervasive computing, a suitable service model based on recommendation trust for pervasive computing is presented in this paper. In this model, the concept of recommendation credibility, credibility of service content and indirect credibility are introduced to overcome the problem of pervasive computing in the choice of service provider blindly. Recommendation credibility...
To cope with the inflexible security configuration in current mainstream embedded database system, this paper proposes a discretionary safely system (DSS), which is independent of any specific database system. DSS is based on hook technology. The experiment on SQLITE demonstrates that DSS is able to provide the pervasive and flexible security and audit with acceptable extra time consuming.
The following topics are dealt with: autonomic event computing; user-provided networking; broadband single carrier; HeterWMN mobile networks; HeterWMN wireless sensor networks; femtocell networks; exploiting shared media; aerial channel analysis and physical data links; handover and network selection in future broadband networks; performance modelling; coding for memories; cognitive radio, VANET and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.