Software infrastructure and design challenges for ubiquitous computing applications
Communications of the ACM
Beyond Prototypes: Challenges in Deploying Ubiquitous Systems
IEEE Pervasive Computing
Aura: an Architectural Framework for User Mobility in Ubiquitous Computing Environments
WICSA 3 Proceedings of the IFIP 17th World Computer Congress - TC2 Stream / 3rd IEEE/IFIP Conference on Software Architecture: System Design, Development and Maintenance
Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?
IEEE Security and Privacy
Soft-Decision Tracing in Fingerprinted Multimedia Content
IEEE MultiMedia
A Dual Watermark-Fingerprint System
IEEE MultiMedia
Trusted Computing Platforms: TCPA Technology in Context
Trusted Computing Platforms: TCPA Technology in Context
Theory of Self-Reproducing Automata
Theory of Self-Reproducing Automata
Evaluation of Copyright Marking Systems
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Approximate object location and spam filtering on peer-to-peer systems
Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware
A unified approach to content-based and fault-tolerant music recognition
IEEE Transactions on Multimedia
IEEE Transactions on Information Theory
Modeling privacy compromise: visibility of individuals via DRM and RFID in ubiquitous computing
Proceedings of the 2008 Spring simulation multiconference
Service-oriented grid computing system for digital rights management (GC-DRM)
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
The Internet has revolutionized multimedia content distribution, shifting the way content producers and users approach digital rights. However, ubiquitous computing will alter the digital rights management environment even more, and current techniques are ill equipped to deal with the changes. Distributed trust can help to overcome the challenge of maintaining digital rights for ubiquitous computing, using cellular automata to measure trust levels across a system.