Sciweavers

Share
PERCOM
2003
ACM
10 years 14 hour ago
Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile
Passive RFID technology and unobtrusive Bluetoothenabled active tags are means to augment products and everyday objects with information technology invisible to human users. This ...
Frank Siegemund, Christian Floerkemeier
PERCOM
2003
ACM
10 years 14 hour ago
Application-Service Interoperation without Standardized Service Interfaces
To programmatically discover and interact with services in ubiquitous computing environments, an application needs to solve two problems: (1) is it semantically meaningful to inte...
Shankar Ponnekanti, Armando Fox
PERCOM
2003
ACM
10 years 14 hour ago
Object Labelling from Human Action Recognition
This paper presents a method for finding and classifying objects within real-world scenes by using the activity of humans interacting with these objects to infer the object’s i...
Patrick Peursum, Svetha Venkatesh, Geoff A. W. Wes...
PERCOM
2003
ACM
10 years 14 hour ago
An Architecture that Treats Everyday Objects as Communicating Tangible Components
The paper describes research that has been carried out in “extrovert-Gadgets”, a research project funded in the context of EU IST/FET proactive initiative “Disappearing Comp...
Achilles Kameas, Stephen J. Bellis, Irene Mavromma...
PERCOM
2003
ACM
10 years 14 hour ago
Recognition of Human Activity through Hierarchical Stochastic Learning
Seeking to extend the functional capability of the elderly, we explore the use of probabilistic methods to learn and recognise human activity in order to provide monitoring suppor...
Sebastian Lühr, Hung Hai Bui, Svetha Venkates...
PERCOM
2003
ACM
10 years 14 hour ago
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks
We investigate the performance issues of destinationsequenced distance vector (DSDV) and ad-hoc on-demand distance vector (AODV) routing protocols for mobile ad hoc networks. Four...
Yi Lu, Weichao Wang, Yuhui Zhong, Bharat K. Bharga...
PERCOM
2003
ACM
10 years 14 hour ago
Mobile Agent Based Evacuation System When The Battery Runs Out: EASTER
As mobile computing becomes common, the battery issue of mobile computing devices has become increasingly notable. To this end, research and development of various power-conservat...
Heisuke Kaneko, Yoshiaki Fukazawa, Fumihiro Kumeno...
PERCOM
2003
ACM
10 years 6 months ago
Energy-Aware Target Localization in Wireless Sensor Networks
Wireless distributed sensor networks (DSNs) are important for a number of strategic applications such as coordinated target detection, surveillance, and localization. Energy is a ...
Yi Zou, Krishnendu Chakrabarty
PERCOM
2003
ACM
10 years 6 months ago
Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services
In pervasive computing environments, powerful handheld devices with wireless connections create opportunities for many new nomadic applications. We propose a new service discovery...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
PERCOM
2003
ACM
10 years 6 months ago
ReCalendar: Calendaring and Scheduling Applications with CPU and Energy Resource Guarantees for Mobile Devices
In this paper, we present an advance reservation scheme for CPU and energy resources, called ReCalendar. The goal is to enable soft real-time applications on mobile devices to ach...
Wanghong Yuan, Klara Nahrstedt
books