Sciweavers

PERCOM
2005
ACM
13 years 10 months ago
Design and Implementation of "kubit" for Sensing and Control Ubiquitous Applications
Towards the wide acceptance of ubiquitous networking, practical and deployable ubiquitous applications must be provided in a concrete and easily understandable form to end-users. ...
Kiyohito Yoshihara, Shinji Motegi, Hiroki Horiuchi
PERCOM
2005
ACM
13 years 10 months ago
Selection and Navigation of Mobile Sensor Nodes Using a Sensor Network
Hybrid sensor networks comprise of mobile and static sensor nodes setup for the purpose of collaboratively performing tasks like sensing a phenomenon or monitoring a region. In th...
Atul Verma, Hemjit Sawant, Jindong Tan
PERCOM
2005
ACM
13 years 10 months ago
Applying Active Space Principles to Active Classrooms
Recent developments in pervasive computing have enabled new features for collaboration and instrumentation in educational technology systems. An infrastructure for the integration...
Chad Peiper, David Warden, Ellick Chan, Roy H. Cam...
PERCOM
2005
ACM
13 years 10 months ago
A Learning Model for Trustworthiness of Context-Awareness Services
When ubiquitous computing devices access a contextawareness service, such as a location service, they need some assurance that the quality of the information received is trustwort...
Markus C. Huebscher, Julie A. McCann
PERCOM
2005
ACM
13 years 10 months ago
RDF-Based Model for Context-Aware Reasoning in Rich Service Environment
We present a framework for utilizing context-awareness for classifying services. We also present a novel RDFbased model for context-aware reasoning in pervasive computing environm...
Jari Forstadius, Ora Lassila, Tapio Seppänen
PERCOM
2005
ACM
13 years 10 months ago
A Distributed System for Answering Range Queries on Sensor Network Data
A distributed system for approximate query answering on sensor network data is proposed, where a suitable compression technique is exploited to represent data and support query an...
Alfredo Cuzzocrea, Filippo Furfaro, Sergio Greco, ...
PERCOM
2005
ACM
14 years 4 months ago
Determination of Time and Order for Event-Based Middleware in Mobile Peer-to-Peer Environments
An event correlation is becoming an important service in event-based middleware allowing subscribers in publish/subscribe paradigm to consume patterns of events (composite events)...
Eiko Yoneki, Jean Bacon
PERCOM
2005
ACM
14 years 4 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
PERCOM
2005
ACM
14 years 4 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
PERCOM
2005
ACM
14 years 4 months ago
Enabling Reliable Many-to-Many Communication in Ad-Hoc Pervasive Environments
In order for pervasive computing to realize its full potential, pervasive applications have to be able to operate without support from fixed communication infrastructure at least ...
Einar Vollset, Paul D. Ezhilchelvan