The middleware infrastructure to support applications is becoming critically important to the new horizons of mobile and pervasive computing. In this context, the goal of our work...
RFID (Radio-Frequency Identification) tags are small, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility i...
A course on pervasive computing should be structured around key functions throughout a systems development process to cover common underlying concerns throughout science and engin...
In this paper we show a novel middleware approach for pervasise applications that communicate via an XMLbased distributed virtual shared information space. This approach extends s...
Most recently developed context-aware software applications make unrealistic assumptions about the quality of the available context information, which can lead to inappropriate ac...
This paper presents the author's experience in designing and teaching a graduate level Ubiquitous Computing (Ubicomp) course at Arizona State University. It identifies some o...
Current peer-to-peer file-sharing systems mostly work on wired networks. Mobile ad hoc network is characterized as multi-hop wireless communications between mobile devices. In thi...
Privacy of personal location information is becoming an increasingly important issue. This paper refines a method, called the mix zone, developed to enhance user privacy in locati...
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
As mobile wireless network technology becomes widespread, the importance of education about this new form of communication is becoming critical. One of the benefits of mobile comp...