Advances in pervasive computing

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advances in pervasive computing: GUEST EDITORIAL

Acknowledgements There are many people who were involved in the effort to put this issue together. The Guest Editor would like to thank all the authors of the papers for their hard work and their contributions to the story of pervasive computing. He would also like to thank the many reviewers for their thoughtful and insightful comments and the time they spent reading papers. When the issue was...

متن کامل

Advances in pervasive health

Pervasive Health seeks to harness developments in pervasive computing technologies and harness them in the health domain. This domain may be interpreted in its widest possible sense, including the medical aspect both physical and mental, but also that of care management, education, community and occupational health. Such is the potential of pervasive computing technologies that the domain of pe...

متن کامل

Pervasive Java - IEEE Pervasive Computing

1536-1268/02/$17.00 © 2002 IEEE T oday, mobile devices and gadgets come with more than just a cool and cutting-edge design; they come equipped with small brains and a common language, making them smarter and more powerful than ever before. Perhaps they’re a little too smart—after all, they can adapt and morph into each other and become many-in-one super devices. Mobile phones with PDA capabilit...

متن کامل

Trust in Pervasive Computing

Pervasive environments are comprised of resource-constrained mobile devices “limited” in their connectivity to other devices or networks due to the inherent dynamic nature of the environment. Limited connectivity to the Internet precludes the use of conventional security mechanisms like Certifying Authorities and other forms of server-centric authentication. Under these circumstances peer-to-pe...

متن کامل

Security in Pervasive Computing

This article gives a brief look at the history of security in computing and a look at some of the existing security techniques. New threats introduced by pervasive computing are considered and security of existing link-layer protocols and applicability of higher-layer protocols is reviewed. Possible directions of the future of the security of pervasive computing are also considered.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Pervasive Computing and Communications

سال: 2009

ISSN: 1742-7371

DOI: 10.1108/17427370910950276