A survey of context data distribution for mobile ubiquitous systems

P Bellavista, A Corradi, M Fanelli… - ACM computing surveys …, 2012 - dl.acm.org
The capacity to gather and timely deliver to the service level any relevant information that
can characterize the service-provisioning environment, such as computing …

A multi-level study of information trust models in WSN-assisted IoT

I Souissi, NB Azzouna, LB Said - Computer Networks, 2019 - Elsevier
Abstract The Internet of Things (IoT) comprises heterogeneous and interconnected objects. It
tries to provide information anytime, anywhere and for anything. The IoT incorporates a …

A survey on context‐aware web service systems

HL Truong, S Dustdar - International Journal of Web Information …, 2009 - emerald.com
Purpose–This survey aims to study and analyze current techniques and methods for context‐
aware web service systems, to discuss future trends and propose further steps on making …

On the meaningfulness of “big data quality”

D Firmani, M Mecella, M Scannapieco… - Data Science and …, 2016 - Springer
In this paper, we discuss the application of concept of data quality to big data by highlighting
how much complex is to define it in a general way. Already data quality is a …

Secure and stable vehicular ad hoc network clustering algorithm based on hybrid mobility similarities and trust management scheme

S Oubabas, R Aoudjit, JJPC Rodrigues… - Vehicular …, 2018 - Elsevier
Clustering is currently receiving great attention due to the emergence of Vehicular Ad-Hoc
Network (VANET) technology. It is a challenging issue due to the high mobility of vehicles …

Quality of context: models and applications for context-aware systems in pervasive environments

A Manzoor, HL Truong, S Dustdar - The Knowledge Engineering …, 2014 - cambridge.org
Limitations of sensors and the situation of a specific measurement can affect the quality of
context information that is implicitly collected in pervasive environments. The lack of …

Semantic-aware blocking for entity resolution

Q Wang, M Cui, H Liang - IEEE Transactions on Knowledge …, 2015 - ieeexplore.ieee.org
In this paper, we propose a semantic-aware blocking framework for entity resolution (ER).
The proposed framework is built using locality-sensitive hashing (LSH) techniques, which …

Design and implementation of a contextual-based continuous authentication framework for smart homes

Y Ashibani, D Kauling, QH Mahmoud - Applied System Innovation, 2019 - mdpi.com
There has been a rapid increase in the number of Internet of Things (IoT) devices in the last
few years, providing a wide range of services such as camera feeds, light controls, and door …

Process-aware interrupt scheduling and accounting

Y Zhang, R West - 2006 27th IEEE International Real-Time …, 2006 - ieeexplore.ieee.org
In most operating systems, the handling of interrupts is typically performed within the
address space of the kernel. Moreover, interrupt handlers are invoked asynchronously …

Presentation attack detection algorithms for finger vein biometrics: A comprehensive study

R Raghavendra, C Busch - 2015 11th International Conference …, 2015 - ieeexplore.ieee.org
Finger vein biometric systems have shown a vulnerability to presentation attacks (or direct
attack or spoof attack). The presentation attacks have raised crucial security issues for finger …