Service discovery in Mobile Ad Hoc Networks is an essential process in order for these networks to be selfconfigurable. In this paper we argue that Service Discovery can be greatl...
With the advances in mobile technologies is now possible to support learners and teachers activities on the move. We analyzed the functionalities that should be provided by a gene...
Topographic querying is the process of extracting data from a sensor network for understanding the graphic delineation of features of interest in a terrain. Query processing techn...
Different opportunistic routing protocols have been proposed recently for routing in sensor networks. These protocols exploit the redundancy among nodes by using a node that is av...
Adam Wolisz, Jan M. Rabaey, Rahul C. Shah, Sven Wi...
This paper considers the problem of maintaining the coverage degree of a wireless sensor network at an application specific level while keeping the sensing units of only a subset o...
Pervasive computing allows the coupling of the physical world to the information world, and provides a wealth of ubiquitous services and applications that allow users, machines, d...
Anand Ranganathan, Jalal Al-Muhtadi, Jacob T. Bieh...
This paper describes our ongoing work on a system that provides information about network resources and related communication facilities to applications running on a mobile device...
Arjan J. H. Peddemors, Henk Eertink, Ignas G. Niem...
In wireless sensor networks, localization systems use data from sensors which receive signals from moving targets, measure RSSI, and translate RSSI into the distance between senso...
As pervasive computing environments become popular, ID devices, such as smart cards and RFID tags, introduce multi-service environments, in which a user can receive multiple servi...
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...