期刊文献+
共找到118篇文章
< 1 2 6 >
每页显示 20 50 100
Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for Clustered IoT Driven Ubiquitous Computing System
1
作者 Reda Salama Mahmoud Ragab 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期2917-2932,共16页
In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(... In the Internet of Things(IoT)based system,the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems(UCS).The UCS necessitates heterogeneity,management level,and data transmission for distributed users.Simultaneously,security remains a major issue in the IoT-driven UCS.Besides,energy-limited IoT devices need an effective clustering strategy for optimal energy utilization.The recent developments of explainable artificial intelligence(XAI)concepts can be employed to effectively design intrusion detection systems(IDS)for accomplishing security in UCS.In this view,this study designs a novel Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for IoT Driven Ubiquitous Computing System(BXAI-IDCUCS)model.The major intention of the BXAI-IDCUCS model is to accomplish energy efficacy and security in the IoT environment.The BXAI-IDCUCS model initially clusters the IoT nodes using an energy-aware duck swarm optimization(EADSO)algorithm to accomplish this.Besides,deep neural network(DNN)is employed for detecting and classifying intrusions in the IoT network.Lastly,blockchain technology is exploited for secure inter-cluster data transmission processes.To ensure the productive performance of the BXAI-IDCUCS model,a comprehensive experimentation study is applied,and the outcomes are assessed under different aspects.The comparison study emphasized the superiority of the BXAI-IDCUCS model over the current state-of-the-art approaches with a packet delivery ratio of 99.29%,a packet loss rate of 0.71%,a throughput of 92.95 Mbps,energy consumption of 0.0891 mJ,a lifetime of 3529 rounds,and accuracy of 99.38%. 展开更多
关键词 Blockchain internet of things ubiquitous computing explainable artificial intelligence CLUSTERING deep learning
下载PDF
Architecture design and demand analysis on application layer of standard system for ubiquitous power Internet of Things 被引量:4
2
作者 Jing Zhang Yunying Ye +1 位作者 Chunjin Hu Bin Li 《Global Energy Interconnection》 EI CAS CSCD 2021年第3期304-314,共11页
The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power syst... The ubiquitous power Internet of Things(UPIoT)is an intelligent service system with comprehensive state perception,efficient processing,and flexible application of information.It focuses on each link of the power system and makes full use of the mobile internet,artificial intelligence,and other advanced information and communication technologies in order to realize the inter-human interaction of all things in all links of the power system.This article systematically presents to the national and international organizations and agencies in charge of UPIoT layer standardization the status quo of the research on the Internet of Things(IoT)-related industry standards system.It briefly describes the generic standard classification methods,layered architecture,conceptual model,and system tables in the UPIoT application layer.Based on the principles of inheritance,innovation,and practicability,this study divides the application layer into customer service,power grid operation,integrated energy,and enterprise operation,emerging business and analyzes the standard requirements of these five fields.This study also proposes a standard plan.Finally,it summarizes the research report and provides suggestions for a follow-up work. 展开更多
关键词 ubiquitous power Internet of Things(UPIoT) Application layer Standard system Architecture design Demand analysis
下载PDF
A Generic Service Architecture for Secure Ubiquitous Computing Systems
3
作者 Shudong Chen Johan Lukkien Richard Verhoeven 《International Journal of Communications, Network and System Sciences》 2012年第1期50-65,共16页
The development of ubiquitous computing systems benefits tremendously from the service-oriented computing concept in seamless interoperation of heterogeneous devices. However, architectures, services interfaces and ne... The development of ubiquitous computing systems benefits tremendously from the service-oriented computing concept in seamless interoperation of heterogeneous devices. However, architectures, services interfaces and network implementation of the existing service-oriented systems differ case by case. Furthermore, many systems lack the capability of being applied to resource constrained devices, for example, sensors. Therefore, we propose a standardized approach to present a service to the network and to access a networked service, which can be adopted by arbitrary types of devices. In this approach, services are specified and exposed through a set of standardized interfaces. Moreover, a virtual community concept is introduced to determine a secure boundary within which services can be freely discovered, accessed and composed into applications;a hierarchical management scheme is presented which enables the third party management of services and their underlying resources. In this way, application control logic goes into the network and environment context is dealt with intelligently by the system. A prototype system is developed to validate our ideas. Results show the feasibility of this open distributed system software architecture. 展开更多
关键词 GENERIC PROGRAMMING Service ORIENTATION ubiquitous Computing Virtual Community CONTEXT-AWARE RESOURCE Management
下载PDF
Challenges and Possibilities for the Household Medicine Lease (HML) System Viewed in Light of CRM: HML-Based Everyday Self-Medication in Ubiquitous Network Society
4
作者 Masaru Furukawa Shutaro Takashima 《Computer Technology and Application》 2011年第7期501-512,共12页
Household medicine lease (HML) industry originated way back in the Edo period (17C-19C), when it was promoted by the local fiefdom government to revitalize the economy. Accumulations of wealth, acquired thereafter... Household medicine lease (HML) industry originated way back in the Edo period (17C-19C), when it was promoted by the local fiefdom government to revitalize the economy. Accumulations of wealth, acquired thereafter from everywhere outside the region, have culminated in the formation of the present-day industrial cluster in Toyama, the largest in the whole area facing the Sea of Japan. Today an adaptation of the quasi-CRM (customer relationship management) business model of the HML system has proved to be a success in Mongolia. This fact seems to offer the authors some clues for dealing with those problems that healthcare and medical services in Japan and elsewhere are riddled with. In this paper, focusing on the common critical success factors (CSFs) behind the success of the authors' prototype HML system and its recent successful application in Mongolia, the authors will analyze these factors from the perspective of CRM. The authors will then clarify the following: (1) the usefulness of the business model for ensuring primary healthcare for people in developing countries; (2) the usefulness in our ubiquitous network society of applying ICT to the HML system; (3) possible contributions that the use of the system can make toward improving the quality of our everyday healthcare and medical services in our prominently aging society; and the authors will also suggest (4) the importance of elevating "individual self-medication" to "community-based self-medication". 展开更多
关键词 Household medicine lease (HML) CRM (customer relationship management) SELF-MEDICATION primary health care (PHC) use first pay later ICT (information and communication technology) ubiquitous network society.
下载PDF
Ubiquitous CSCL的概念模型与关键技术要素 被引量:12
5
作者 付道明 徐福荫 《远程教育杂志》 CSSCI 2009年第1期8-12,共5页
以自然、和谐的学习交互环境为主要特征的计算机支持的泛在协作学习(Ubiquitous CSCL)是近年来国内外CSCL研究领域关注的热点。本文通过文献研究、内容分析和归纳演绎等过程,探讨了Ubiquitous CSCL的概念模型、关键交互技术、普适终端... 以自然、和谐的学习交互环境为主要特征的计算机支持的泛在协作学习(Ubiquitous CSCL)是近年来国内外CSCL研究领域关注的热点。本文通过文献研究、内容分析和归纳演绎等过程,探讨了Ubiquitous CSCL的概念模型、关键交互技术、普适终端技术、协作知识建构的基本过程和基于智能空间的交互模型。 展开更多
关键词 普适计算 ubiquitous CSCL 概念模型 关键技术要素
下载PDF
基于Ubiquitous-Joint模型的层状岩坡稳定性分析 被引量:5
6
作者 王曰国 王星华 林杭 《灾害学》 CSCD 2007年第4期46-50,共5页
在应力的作用下,层状岩土体表现出来的力学行为比较复杂,目前广泛使用的各向同性模型不再适用,因此,有必要建立合理描述层状岩质边坡的力学模型。以某公路边坡为工程背景,首先,探讨了层状岩质边坡的失稳机制;然后,利用快速拉格朗日差分... 在应力的作用下,层状岩土体表现出来的力学行为比较复杂,目前广泛使用的各向同性模型不再适用,因此,有必要建立合理描述层状岩质边坡的力学模型。以某公路边坡为工程背景,首先,探讨了层状岩质边坡的失稳机制;然后,利用快速拉格朗日差分法(FLAC3D),建立该边坡的数值分析模型,探讨了强度折减技术在U-biquitous-Joint模型中的实施方法,即对岩体和层理面参数同时进行折减,采用计算不收敛作为边坡临界失稳判据;最后,通过数值计算,分析层状岩质边坡稳定性的影响因素,得到边坡整体安全系数F随节理倾角β先减小后增大,呈现两头高中间低的形态。 展开更多
关键词 层状边坡 稳定性 ubiquitous—Joint模型 强度折减法 失稳判据 影响因素
下载PDF
北京信息化与经济增长——基于ICT资本存量和Ubiquitous指数的分析 被引量:2
7
作者 孙川 《北京行政学院学报》 CSSCI 北大核心 2011年第6期72-78,共7页
信息化对经济增长的影响主要表现在信息化投资和信息化资源利用两个方面,在核算ICT资本存量和建立Ubiquitous指数的基础上,需要将ICT投资和信息化的普及与应用纳入一个统一的框架进行分析。利用ICT增长模型对ICT投资贡献度以及网络外部... 信息化对经济增长的影响主要表现在信息化投资和信息化资源利用两个方面,在核算ICT资本存量和建立Ubiquitous指数的基础上,需要将ICT投资和信息化的普及与应用纳入一个统一的框架进行分析。利用ICT增长模型对ICT投资贡献度以及网络外部性的计量分析表明,ICT投资对北京经济增长发挥了重要作用,ICT投资与普及应用之间的交互作用产生了明显的溢出效应和网络效应,从而进一步增强了ICT对经济增长的影响力。软件投资与硬件投资相比较,软件投资的作用更为显著,对北京经济增长的影响更大。 展开更多
关键词 信息化 经济增长 ICT资本存量 ubiquitous指数
下载PDF
“Ubiquitous”环境下商业展示信息传达与导航界面的应用——基于GUI的导航原型设计的3D要素应用提案
8
作者 马金祥 单秋月 朴釜美 《美术大观》 2011年第8期114-115,共2页
会展业的商业展示中,计算机信息导航是信息传达过程的重要组成部分,通常依赖于界面设计来实现,经历了命令语言界面到图形用户界面(GUI)等发展阶段,适于更优越的人机交互(HCI)及展示信息导航的新概念随着技术环境的改变,必将持续发展。
关键词 ubiquitous 信息导航 界面设计 信息传达 商业 环境 GUI 应用
下载PDF
Study on the Ubiquitous English Learning Environment in Vocational Colleges
9
作者 徐硕雁 《海外英语》 2021年第10期279-280,共2页
Ubiquitous learning is a new type of learning method with rich learning concepts and educational significance. The study of ubiquitous learning began in 1991, and has experienced three stages of gestation, start-up an... Ubiquitous learning is a new type of learning method with rich learning concepts and educational significance. The study of ubiquitous learning began in 1991, and has experienced three stages of gestation, start-up and formation and development.After entering the 21 st century, new technologies and new ideas have emerged endlessly. The change in learning methods has led to the flip of classroom teaching, and ubiquitous learning has become more known as the pace of social development. The current higher vocational education presents the characteristics of disjointed education content, misaligned learning roles, and single teaching form. The integration of ubiquitous learning environment into vocational education teaching is a new direction for the development of vocational education. 展开更多
关键词 vocational colleges ubiquitous learning ENGLISH ENVIRONMENT RESEARCH
下载PDF
Evolution Toward Artificial Intelligence of Things Under 6G Ubiquitous⁃X 被引量:4
10
作者 Ping Zhang Xiaodong Xu +3 位作者 Xiaoqi Qin Yiming Liu Nan Ma Shujun Han 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2020年第3期116-135,共20页
With the evolution of cellular networks,6G is a promising technology to provide ubiquity of communications,computing,control,and consciousness(UC4)for“human⁃machine⁃thing⁃genie”and build a ubiquitous intelligent mob... With the evolution of cellular networks,6G is a promising technology to provide ubiquity of communications,computing,control,and consciousness(UC4)for“human⁃machine⁃thing⁃genie”and build a ubiquitous intelligent mobile society.Genie,which can act as the artificial intelligence assistance for 6G users,is the key enabler to realize the unprecedented transformation from mobile Internet to network of intelligence.While Internet of Things(IoT)is the digital nervous system,genie acts like the brain of the overall system.Supported by 6G,IoT will step into the Artificial Intelligence of Things(AIoT)era and the AIoT networks have the abilities of intelligent perception,intelligent analysis,and intelligent control.In this paper,the concept of Ubiquitous⁃X is introduced,which is considered as the fundamental architecture of 6G network,and the definition and architecture of AIoT under Ubiquitous⁃X is also presented.Several major technical challenges posed by the service requirements of novel AIoT applications are pinpointed,including massive and intelligent connectivity,efficient computing,security,privacy,authentication,high scalability and efficiency.Potential enabling technologies to support seamless service experiences across terminals to realize AIoT are introduced as well. 展开更多
关键词 AIoT 6G ubiquitous⁃X AI MEC blockchain physical layer security
下载PDF
Ubiquitous环境下高校图书馆空间布局模型研究——以韩国延世大学三星图书馆为例 被引量:3
11
作者 李苗 《科技情报开发与经济》 2014年第9期155-158,共4页
介绍了韩国延世大学新建的三星图书馆的整体空间布局情况以及人性化服务,以期对我国图书馆有所启示。
关键词 ubiquitous环境 高校图书馆 空间布局模型 信息共享空间 韩国延世大学三星图书馆
下载PDF
Ubiquitous Learning Environment as a Solution to Education Problem 被引量:5
12
作者 ZHAO Hailan Jung-Hwan Park 《开放教育研究》 CSSCI 2006年第4期61-66,共6页
Ubiquitous learning means the intelligent learning environment that enables people to learn using any terminal at any place and at any time no matter what the contents may be.This is different from the existing method... Ubiquitous learning means the intelligent learning environment that enables people to learn using any terminal at any place and at any time no matter what the contents may be.This is different from the existing method of learning the information through the internet or studying at specific place,such as school or library,and so on.People do not need to go to specific place at specific time to access the information that they want,but the learning information finds its way to people,which is the biggest difference from the existing method. Ubiquitous learning aims to solve current problems of education in more creative and learner-oriented way by creating an education environment where learners can learn with any terminal anytime and anywhere without regard to contents.The presentation this time would help promote the understanding of the Ubiquitous and explore the ubiquitous education environment that is capable of solving overall problems of education.In addition,it will propose a direction of ubiquitous learning scenario and the change in the educational environment. 展开更多
关键词 ubiquitous ubiquitous Learning U-LEARNING
下载PDF
Long term integration of radar signals with unknown Doppler shift for ubiquitous radar 被引量:4
13
作者 Qinglong Bao Zengping Chen Yue Zhang Jian Yang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第2期219-227,共9页
Ubiquitous radar is a new radar system that provides continuous and uninterrupted multifunction capability within a coverage volume. Continuous coverage from close-in "pop-up" targets in clutter to long-range target... Ubiquitous radar is a new radar system that provides continuous and uninterrupted multifunction capability within a coverage volume. Continuous coverage from close-in "pop-up" targets in clutter to long-range targets impacts selection of waveform parameters. The coherent processing interval (CPI) must be long enough to achieve a certain signal-to-noise ratio (SNR) that ensures the efficiency of detection. The condition of detection in the case of low SNR is analyzed, and three different cases that would occur during integration are discussed and a method to determine the CPI is presented. The simulation results show that targets detection with SNR as low as -26 dB in the experimental system can possibly determine the CPI. 展开更多
关键词 ubiquitous radar low signal-to-noise ratio (SNR) coherent processing interval (CPI) coherent integration non-coherent integration.
下载PDF
Mobile Ubiquitous Service Environment 被引量:12
14
作者 Zhang Ping,Ji Yang,Feng Zhiyong (Research Center for Wireless New Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China) The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the major development trend for the next generation mobile wireless network. Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system,all of which involve exploration and innovation of a new networking structure,its control and management as well as way of measuring. The change in network resources triggers the change in network computing models. To let readers have a basic understanding of MUSE,this lecture introduces it in four sections. This section focuses on the development and demand analysis of the service platform. 《ZTE Communications》 2007年第2期58-60,共3页
The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the m... The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the major development trend for the next generation mobile wireless network. Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system,all of which involve exploration and innovation of a new networking structure,its control and management as well as way of measuring. The change in network resources triggers the change in network computing models. To let readers have a basic understanding of MUSE,this lecture introduces it in four sections. This section focuses on the development and demand analysis of the service platform. 展开更多
关键词 Mobile ubiquitous Service Environment GPP
下载PDF
Development of Ubiquitous Simulation Service Structure Based on High Performance Computing Technologies 被引量:2
15
作者 Sang-Hyun CHO Jeong-Kil CHOI 《Journal of Materials Science & Technology》 SCIE EI CAS CSCD 2008年第3期374-378,共5页
The simulation field became essential in designing or developing new casting products and in improving manufacturing processes within limited time, because it can help us to simulate the nature of processing, so that ... The simulation field became essential in designing or developing new casting products and in improving manufacturing processes within limited time, because it can help us to simulate the nature of processing, so that developers can make ideal casting designs. To take the prior occupation at commercial simulation market, so many development groups in the world are doing their every effort. They already reported successful stories in manufacturing fields by developing and providing the high performance simulation technologies for multipurpose. But they all run at powerful desk-side computers by well-trained experts mainly, so that it is hard to diffuse the scientific designing concept to newcomers in casting field. To overcome upcoming problems in scientific casting designs, we utilized information technologies and full-matured hardware backbones to spread out the effective and scientific casting design mind, and they all were integrated into Simulation Portal on the web. It professes scientific casting design on the NET including ubiquitous access way represented by "Anyone, Anytime, Anywhere" concept for casting designs. 展开更多
关键词 Parallel computation Message passing interface (MPI) Shared memory processing (SMP) CLUSTERING ubiquitous
下载PDF
Energy-efficient and security-optimized AES hardware design for ubiquitous computing 被引量:2
16
作者 Chen Yicheng Zou Xuecheng Liu Zhenglin Han Yu Zheng Zhaoxia 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期652-658,共7页
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. H... Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost. 展开更多
关键词 encryption and decryption power analysis model inhomogeneous S-Boxes ubiquitous computing advanced encryption standard.
下载PDF
Interactive navigation system in smart phone with vibration feedback 被引量:1
17
作者 YU He GU Wen-zhao +5 位作者 SUN Ming-hui QIN Gui-he WANG Li-min PAN Zhi-geng ZHAO Wei SUN Xiao-ying 《Journal of Beijing Institute of Technology》 EI CAS 2016年第3期375-381,共7页
The traffic congestion has become an urgent problem to be solved,which appears in the domestic and foreign large and medium-sized cities.Intelligent transportation is one of the important applications of ubiquitous co... The traffic congestion has become an urgent problem to be solved,which appears in the domestic and foreign large and medium-sized cities.Intelligent transportation is one of the important applications of ubiquitous computing.And it's an important way to ease the traffic congestion of the city.Intelligent navigation system is an important embodiment of intelligent transportation.So far,there have been many kinds of traditional vehicle navigation systems.But when they are in use,drivers will pay extra attention to get the path information through the visual and auditory cues.It's dangerous for drivers when they drive.At the same time,with the development of science and technology,mobile navigation system has been widely used.The mobile navigation system is a comprehensive system which relates to the field of mobile communication and GPS.The objective of this paper is to develop a smart phone and interaction navigation system based on the feedback of vibration and micro programmed control unit(MCU)control system.When drivers are in the driving process,the new navigation system can avoid the same sense of multiple tasks,which makes each sensory focus on only one independent task.Through the analysis,the system is demonstrated to improve the driving safety. 展开更多
关键词 vibration feedback smart navigation Android platform ubiquitous computing
下载PDF
Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI 被引量:1
18
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期564-570,共7页
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific... Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems. 展开更多
关键词 ubiquitous computing identity authentication mechanism D-S Evidence Theory SPKI/SDSI SECURITY
下载PDF
UCIMssp:Ubiquitous Computing Identification Mechanism Based on SPKI/SDSI and P2P 被引量:1
19
作者 孙道清 蒲芳 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第4期475-483,共9页
Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconne... Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment. 展开更多
关键词 ubiquitous computing identification mechanism UCIMssp SPKI/SDSI Peer-to-Peer security
下载PDF
An Indoor Ubiquitous Computing Environment Based on Location-awareness 被引量:1
20
作者 蒲芳 孙道清 +2 位作者 曹奇英 蔡海滨 李永宁 《Journal of Donghua University(English Edition)》 EI CAS 2006年第4期76-79,共4页
To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IU... To provide the right services or information to the right users, at the right time and in the right place in ubiquitous computing environment, an Indoor Ubiquitous Computing Environment based on Location-Awareness, IUCELA, is presented in this paper. A general architecture of IUCELA is designed to connect multiple sensing devices with locationaware applications. Then the function of location-aware middleware which is the core componnet of the proposed architecture is elaborated. Finally an indoor forum is taken as an example scenario to demonstrate the security, usefulness, flexibiltity and robustness of IUCELA. 展开更多
关键词 ubiquitous computing location awareness middleware.
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部