Producing an adaptive usage control model that is compatible with
UbiComp environments is a challenging task. A ubicomp system must
be able to adapt its behavior based on its environment. Thus, it must
respond to change ...
Virtual learning means to learn from social interactions in a virtual platform that enables people to study anywhere and at any time. Current Virtual Learning Environments (VLEs) are a range of integrated web based ...
In this paper we present a syntactical approach for deriving
real-time programs from a formal specification of the requirements of
real-time systems. The main idea of our approach is to model discretization
at state ...
In this paper we present a syntactical approach for deriving
real-time programs from a formal specification of the requirements of
real-time systems. The main idea of our approach is to model discretization
at state ...
Iconic communication is paramount today in order to assist people with disability (e.g. illiteracy) enjoying, as much as everybody else, the advances in information and communication technologies (e.g. Internet). Previous ...
Information security is critical to economies, communities, governments, social networking and safety of citizens. With the advent of the Internet and the rapid development of Internet-based application such as e-commerce, ...
Combinatorial maps are widely used in image representation and processing, however map matching problems have not been extensively researched. This paper addresses the problem of inexact matching between labeled combinatorial ...
Security requirements deal with the protection of assets against unauthorized access (disclosure
or modification) and their availability to authorized users. Temporal constraints of history-based
access control policies ...
Service composition is a fundamental technique for develop-
ing web-service applications. In general, a single service is not enough
to achieve the user’s goal, rather several services, often from different
providers, ...
The first step for determining the quality of context
(QoC) in context aware systems (CASs) is to make sure that
there are no conflicts among the values of each context element
collected from different resources/sensors. ...
A Context-Aware Usage
CONtrol (CA- UCON)
model is an extension of the traditional UCON model which
enable adaptation to environmental changes in the aim of
preserving continuity of access. When the authorisations ...
A Context-Aware Usage CONtrol (CA- UCON) model is an extension of the traditional UCON model which enable adaptation to environmental changes in the aim of preserving continuity of access. When the authorisations and ...
A Context-Aware Usage CONtrol (CA- UCON) model is an extension of the traditional UCON model which enable adaptation to environmental changes in the aim of preserving continuity of access. When the authorisations and ...
Due to the growing importance of electronic commerce and on-line shopping economically and socially in people's lives,
the researchers took interest in conducting several studies in order to identify the factors that urges ...
Context-aware systems (CASs) have become a reality thanks to the development of smart software and hardware
to assist the users in various real life activities. The proliferation of context-aware services has led to the ...
The main characteristics of context-aware systems are their ability to sense perpetually the context of the user and adapt their behavior accordingly in response to changes the user's context. Modularity is an important ...
Context-aware applications have the ability to sense the context of the user and use the sensed context information to make adaptation decision in response to changes in the user’s context. Hence, besides the functional ...