Sciweavers

438 search results - page 3 / 88
» Pervasive Theory of Memory
Sort
View
CANS
2008
Springer
126views Cryptology» more  CANS 2008»
13 years 7 months ago
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
Atefeh Mashatan, Douglas R. Stinson
BIRTHDAY
2006
Springer
13 years 9 months ago
Realistic Worst-Case Execution Time Analysis in the Context of Pervasive System Verification
We describe a gate level design of a FlexRay-like bus interface. An electronic control unit (ECU) is obtained by integrating this interface into the design of the verified VAMP pro...
Steffen Knapp, Wolfgang J. Paul
SAC
2006
ACM
13 years 11 months ago
Making tuple spaces physical with RFID tags
In this paper, we describe the design and implementation of a tuple-based distributed memory realized with the use of RFID technology. The key idea – rooted in a more general sc...
Marco Mamei, Renzo Quaglieri, Franco Zambonelli
BCSHCI
2007
13 years 6 months ago
Figuring configuration: "everyday" users and end-user configuration of pervasive computing environments
The research outlined investigates strategies that nonprogramming or “everyday” users may take in interaction with a Pervasive Computing Environment within relevant domains sp...
Thom Heslop
IJIPT
2007
78views more  IJIPT 2007»
13 years 5 months ago
If objects could talk: a novel resource discovery approach for pervasive environments
: We propose to extend standard Radio Frequency IDentification (RFID) usage by storing semantically annotated data within RFID tags memory, so that objects may actually ‘describ...
Michele Ruta, Tommaso Di Noia, Eugenio Di Sciascio...