Sciweavers

PERCOM
2004
ACM
14 years 4 months ago
A Middleware for Supporting Disconnections and Multi-Network Access in Mobile Environments
The middleware infrastructure to support applications is becoming critically important to the new horizons of mobile and pervasive computing. In this context, the goal of our work...
Mejdi Kaddour, Laurent Pautet
PERCOM
2004
ACM
14 years 4 months ago
"Yoking-Proofs" for RFID Tags
RFID (Radio-Frequency Identification) tags are small, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility i...
Ari Juels
PERCOM
2004
ACM
14 years 4 months ago
Proselytizing Pervasive Computing Education: A Strategy and Approach Influenced by Human-Computer Interaction
A course on pervasive computing should be structured around key functions throughout a systems development process to cover common underlying concerns throughout science and engin...
D. Scott McCrickard, Christa M. Chewar
PERCOM
2004
ACM
14 years 4 months ago
XML Language Binding Support for Pervasive Communication in Distributed Virtual Shared Information Spaces
In this paper we show a novel middleware approach for pervasise applications that communicate via an XMLbased distributed virtual shared information space. This approach extends s...
Norbert Luttenberger, Florian Reuter, Jochen Kober...
PERCOM
2004
ACM
14 years 4 months ago
Modelling and Using Imperfect Context Information
Most recently developed context-aware software applications make unrealistic assumptions about the quality of the available context information, which can lead to inappropriate ac...
Karen Henricksen, Jadwiga Indulska
PERCOM
2004
ACM
14 years 4 months ago
Anatomy of a Graduate Ubiquitous/Pervasive Computing Course
This paper presents the author's experience in designing and teaching a graduate level Ubiquitous Computing (Ubicomp) course at Arizona State University. It identifies some o...
S. K. S. Gupta
PERCOM
2004
ACM
14 years 4 months ago
Peer-to-peer File-sharing over Mobile Ad hoc Networks
Current peer-to-peer file-sharing systems mostly work on wired networks. Mobile ad hoc network is characterized as multi-hop wireless communications between mobile devices. In thi...
Gang Ding, Bharat K. Bhargava
PERCOM
2004
ACM
14 years 4 months ago
Mix Zones: User Privacy in Location-aware Services
Privacy of personal location information is becoming an increasingly important issue. This paper refines a method, called the mix zone, developed to enhance user privacy in locati...
Alastair R. Beresford, Frank Stajano
PERCOM
2004
ACM
14 years 4 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva
PERCOM
2004
ACM
14 years 4 months ago
Escape from the Computer Lab: Education in Mobile Wireless Networks
As mobile wireless network technology becomes widespread, the importance of education about this new form of communication is becoming critical. One of the benefits of mobile comp...
Elizabeth M. Belding-Royer