Sign Up to like & get
recommendations!
0
Published in 2018 at "Wireless Networks"
DOI: 10.1007/s11276-016-1317-9
Abstract: AbstractPervasive computing environments allow users to get services anytime and anywhere. Security has become a great challenge in pervasive computing environments because of its heterogeneity, openness, mobility and dynamicity. In this paper, we propose two…
read more here.
Keywords:
computing environments;
pervasive computing;
practical deniable;
deniable authentication ... See more keywords
Photo from academic.microsoft.com
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Pervasive Computing"
DOI: 10.1109/mprv.2017.2940955
Abstract: In this article, the authors discuss new trends in powering pervasive computing systems and review what we have learned in the last 15 years of building such systems. Major advances in cloud computing, RF, power…
read more here.
Keywords:
computing systems;
pervasive computing;
powering pervasive;
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Pervasive Computing"
DOI: 10.1109/mprv.2019.2963156
Abstract: Reports on the events and findings from the Dagstuhl Seminar entitled “Ubiquitous Computing Education: Why, What, and How” to explore these questions in more detail.2 The workshop gathered 26 faculty members and one undergraduate student3…
read more here.
Keywords:
seminar;
report look;
teaching pervasive;
computing report ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Pervasive Computing"
DOI: 10.1109/mprv.2020.3003142
Abstract: The articles in this special section focus on personalized pervasive health. For over more than two decades, mobile, wearable, and ambient sensor and interaction devices have grown into today’s plethora of computing platforms and tools…
read more here.
Keywords:
personalized pervasive;
pervasive health;
pervasive computing;
physiology ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Pervasive Computing"
DOI: 10.1109/mprv.2021.3110539
Abstract: Developments in pervasive computing trigger a need to rethink security and privacy mechanisms. At the same time, security and privacy methods and systems can likewise benefit from the proliferation of pervasive computing technology, making novel…
read more here.
Keywords:
pervasive security;
security privacy;
security;
privacy brief ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Pervasive Computing"
DOI: 10.1109/mprv.2022.3182222
Abstract: Designers and developers of pervasive technologies have started to address privacy concerns. However, little work has been done to address the numerous safety concerns for specific social and population groups that fall outside conventional threat…
read more here.
Keywords:
safety;
pervasive computing;
using feminist;
safety grand ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Pervasive Computing"
DOI: 10.1109/mprv.2022.3199104
Abstract: Technologies already provide people with sophisticated and powerful digital ecosystems for lifelong and life-wide education. This article identifies grand challenges for ubiquitous and pervasive computing researchers to transform future education. It begins with a scenario…
read more here.
Keywords:
pervasive computing;
grand challenges;
education;
pervasive technology ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Transactions on Services Computing"
DOI: 10.1109/tsc.2016.2533348
Abstract: Mobile, pervasive computing environments respond to users’ requirements by providing access to and composition of various services over networked devices. In such an environment, service composition needs to satisfy a request’s goal, and be mobile-aware…
read more here.
Keywords:
goal;
pervasive computing;
mobile pervasive;
service composition ... See more keywords