Sciweavers

PERCOM
2005
ACM
14 years 4 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
PERCOM
2005
ACM
14 years 4 months ago
Experiences with MundoCore
Pervasive Computing environments require new communication and programming paradigms. In this paper we present our experiences from the implementation of MundoCore, a pervasive co...
Erwin Aitenbichler, Jussi Kangasharju, Max Mü...
PERCOM
2005
ACM
14 years 4 months ago
PDP and GSDL: A New Service Discovery Middleware to Support Spontaneous Interactions in Pervasive Systems
In pervasive computing environments, mobile devices communicate via wireless links without requiring any fixed infrastructure. These devices must be able to discover and share ser...
Andrés Marín López, Carlos Ga...
PERCOM
2005
ACM
14 years 4 months ago
Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments
In pervasive computing environments, service discovery facilitates users to access network services by automating tedious manual configurations. When network services becomes perv...
Feng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni
PERCOM
2005
ACM
14 years 4 months ago
EZCab: A Cab Booking Application Using Short-Range Wireless Communication
EZCab is a proof-of-concept ubiquitous computing application that allows people to book nearby cabs using their cell phones or PDAs equipped with short-range wireless network inte...
Peng Zhou, Tamer Nadeem, Porlin Kang, Cristian Bor...
PERCOM
2005
ACM
14 years 4 months ago
Adaptive Temporal Radio Maps for Indoor Location Estimation
In this paper, we present a novel method to adapt the temporal radio maps for indoor location determination by offsetting the variational environmental factors using data mining t...
Jie Yin, Qiang Yang, Lionel M. Ni
PERCOM
2005
ACM
14 years 4 months ago
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two...
Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul ...
PERCOM
2005
ACM
14 years 4 months ago
A Location Model for Pervasive Computing Environments
This paper presents a world model for location-aware and user-aware services in ubiquitous computing environments. It can be dynamically organized like a tree based on geographica...
Ichiro Satoh
PERCOM
2005
ACM
14 years 4 months ago
Scalable Service Discovery for MANET
Mobile Ad hoc NETworks (MANETs) conveniently complement infrastructure-based networks, allowing mobile nodes to spontaneously form a network and share their services, including br...
Françoise Sailhan, Valérie Issarny
PERCOM
2005
ACM
14 years 4 months ago
Accessing Ubiquitous Services Using Smart Phones
The integration of Bluetooth service discovery protocol (SDP), and GPRS internet connectivity into phones provides a simple yet powerful infrastructure for accessing services in n...
Nishkam Ravi, Peter Stern, Niket Desai, Liviu Ifto...