Sciweavers

PERCOM
2005
ACM
14 years 4 months ago
Routing Layer Support for Service Discovery in Mobile Ad Hoc Networks
Service discovery in Mobile Ad Hoc Networks is an essential process in order for these networks to be selfconfigurable. In this paper we argue that Service Discovery can be greatl...
Christopher N. Ververidis, George C. Polyzos
PERCOM
2005
ACM
14 years 4 months ago
Hoarding Content in M-Learning Context
With the advances in mobile technologies is now possible to support learners and teachers activities on the move. We analyzed the functionalities that should be provided by a gene...
Anna Trifonova, Marco Ronchetti
PERCOM
2005
ACM
14 years 4 months ago
Supporting Topographic Queries in a Class of Networked Sensor Systems
Topographic querying is the process of extracting data from a sensor network for understanding the graphic delineation of features of interest in a terrain. Query processing techn...
Mitali Singh, Viktor K. Prasanna
PERCOM
2005
ACM
14 years 4 months ago
When Does Opportunistic Routing Make Sense?
Different opportunistic routing protocols have been proposed recently for routing in sensor networks. These protocols exploit the redundancy among nodes by using a node that is av...
Adam Wolisz, Jan M. Rabaey, Rahul C. Shah, Sven Wi...
PERCOM
2005
ACM
14 years 4 months ago
Energy Efficient Differentiable Coverage Service Protocols for Wireless Sensor Networks
This paper considers the problem of maintaining the coverage degree of a wireless sensor network at an application specific level while keeping the sensing units of only a subset o...
Hasan Çam, Hidayet Ozgur Sanli
PERCOM
2005
ACM
14 years 4 months ago
Towards a Pervasive Computing Benchmark
Pervasive computing allows the coupling of the physical world to the information world, and provides a wealth of ubiquitous services and applications that allow users, machines, d...
Anand Ranganathan, Jalal Al-Muhtadi, Jacob T. Bieh...
PERCOM
2005
ACM
14 years 4 months ago
Communication Context for Adaptive Mobile Applications
This paper describes our ongoing work on a system that provides information about network resources and related communication facilities to applications running on a mobile device...
Arjan J. H. Peddemors, Henk Eertink, Ignas G. Niem...
PERCOM
2005
ACM
14 years 4 months ago
Autonomous Localization Method in Wireless Sensor Networks
In wireless sensor networks, localization systems use data from sensors which receive signals from moving targets, measure RSSI, and translate RSSI into the distance between senso...
Yoshikazu Ohta, Masashi Sugano, Masayuki Murata
PERCOM
2005
ACM
14 years 4 months ago
Toward Unlinkable ID Management for Multi-Service Environments
As pervasive computing environments become popular, ID devices, such as smart cards and RFID tags, introduce multi-service environments, in which a user can receive multiple servi...
Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura
PERCOM
2005
ACM
14 years 4 months ago
Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...