Zobrazeno 1 - 10
of 26
pro vyhledávání: '"HyungHyo Lee"'
Publikováno v:
CSTST
Current event processing systems simply define an event as a message about a status-change of data or information. As a result, the event models with domain-specific structure and attributes are not neutral to application domains. It is difficult for
Publikováno v:
AIP Conference Proceedings.
Using an indirect event service instead of other traditional communication models has an advantage of decreasing the coupling of applications in a distributed environment and removing the need for many static dependencies. In this paper, we design an
Publikováno v:
Ubiquitous Intelligence and Computing ISBN: 9783540735489
UIC
UIC
Ad hoc networks are exposed to numerous security threats that can adversely affect the success of important applications. Security services such as authentication and key management are important to secure the communication between two nodes in the n
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ec3f65f3139b399151ffd1f0e2ce4975
https://doi.org/10.1007/978-3-540-73549-6_121
https://doi.org/10.1007/978-3-540-73549-6_121
Publikováno v:
Intelligent Control and Automation ISBN: 9783540372554
In ubiquitous computing, application should adapt itself to the environment in accordance with context information. Context manager is able to transfer context information to application by using event service. Existing event services are mainly impl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d8ac1774cc821a1ccb5ab405845aeff6
https://doi.org/10.1007/978-3-540-37256-1_12
https://doi.org/10.1007/978-3-540-37256-1_12
Publikováno v:
2006 IEEE International Symposium on Industrial Electronics.
The study deals with the most important elements of ubiquitous computing, that is, the toolkit to acquire, express and safely use the context information. To do so, we introduce CAST(Context-Awareness Simulation Toolkit) and show how it works. CAST g
Publikováno v:
SUTC (2)
The study deals with the most important elements of ubiquitous computing, that is, the toolkit to acquire, express and safely use the context information. To do so, we introduce CAST (context-awareness simulation toolkit) and show how it works. CAST
Publikováno v:
Ubiquitous Intelligence and Computing ISBN: 9783540380917
UIC
UIC
The key feature of ubiquitous computing services or applications is that they should be highly adaptive to events and context information. These factors are essential in ubiquitous computing environments. The services and applications must communicat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d792d5a1b6f26e51bb58bcffb069c0dd
https://doi.org/10.1007/11833529_80
https://doi.org/10.1007/11833529_80
Publikováno v:
Applied Parallel Computing. State of the Art in Scientific Computing ISBN: 9783540290674
PARA
PARA
RBAC model is renowned as a security model for corporate environment, since its components, especially role hierarchy, are suitable for modeling an organization structure. But the functional role hierarchy constructed through the existing role engine
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c73b3a0cb0cf4c34a42f51c751febb82
https://doi.org/10.1007/11558958_123
https://doi.org/10.1007/11558958_123
Publikováno v:
Intelligence and Security Informatics ISBN: 9783540344780
ISI
ISI
In the Internet era, enterprises want to use personal information of their own or other enterprises’ subscribers, and even provide it to other enterprises for their profit. On the other hand, subscribers to Internet enterprises expect their privacy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a7c9a8a7d0427e5ed36efc3e888d8bac
https://doi.org/10.1007/11760146_12
https://doi.org/10.1007/11760146_12
Publikováno v:
Embedded and Ubiquitous Computing – EUC 2005 Workshops ISBN: 9783540308034
EUC Workshops
EUC Workshops
In the ubiquitous computing environment new service components should be able to connect to networks at any time, and clients also should be able to use them immediately even without extra settings. Jini is one of the widely used middlewares today. A
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1791acab56d1e64204cf1b47f665bdb9
https://doi.org/10.1007/11596042_51
https://doi.org/10.1007/11596042_51