Sciweavers

PERCOM
2006
ACM
14 years 4 months ago
JiTS: Just-in-Time Scheduling for Real-Time Sensor Data Dissemination
Ke Liu, Nael B. Abu-Ghazaleh, Kyoung-Don Kang
PERCOM
2006
ACM
14 years 4 months ago
Criticality Aware Access Control Model for Pervasive Applications
In this paper we present a new framework for specifying access control policies in smart spaces called Criticality-Aware Access Control (CAAC). The main idea is to automatically r...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
PERCOM
2006
ACM
14 years 4 months ago
Analysis of Appropriate Timing for Information Notification Based on Indoor User's Location Transition
The purpose of this study was to explore the convenient timing for information notification of the users in their daily life. Using the location and the time interval since a loca...
Vlaho Kostov, Takashi Tajima, Eiichi Naito, Jun Oz...
PERCOM
2006
ACM
14 years 4 months ago
A Multi-Commodity Flow Approach for Globally Aware Routing in Multi-Hop Wireless Networks
Routing in multi-hop wireless networks is typically greedy, with every connection attempting to establish a path that minimizes its number of hops. However, interference plays a m...
Vinay Kolar, Nael B. Abu-Ghazaleh
PERCOM
2006
ACM
14 years 4 months ago
Mapping Human Networks
We have developed a method of measuring user interest and affiliation for conference attendees, using behavioral data to collected by `smart badges' worn by the attendees. Th...
Jonathan Gips, Alex Pentland
PERCOM
2006
ACM
14 years 4 months ago
Virtual Channel Management for Densely Deployed IEEE 802.15.4 LR-WPANs
The number of channels specified for IEEE 802.15.4 Low-Rate Wireless Personal Area Networks (LR-WPANs) is too few to operate many applications of WPANs in the same area. To overco...
Tae-Hyun Kim, Jae Yeol Ha, Sunghyun Choi, Wook Hyu...
PERCOM
2006
ACM
14 years 4 months ago
Dialing for Displays: Session Initiation Protocol for Opportunistic Augmentation
Opportunistic augmentation denotes connecting a personal mobile device to another device to gain a transient advantage for the user. For example, a mobile phone user might borrow ...
John J. Barton, Stina Nylander, Fopefolu Folowosel...
PERCOM
2006
ACM
14 years 4 months ago
Plan B: An Operating System for Ubiquitous Computing Environments
The conventional approach for building pervasive environments relies on middleware to integrate different systems. Instead, we have built a system that can deal with these environ...
Francisco J. Ballesteros, Enrique Soriano, Katia L...
PERCOM
2006
ACM
14 years 4 months ago
Omero: Ubiquitous User Interfaces in the Plan B Operating System
It is difficult to build user interfaces that must be distributed over a set of dynamic and heterogeneous I/O devices. This difficulty increases when we want to split, merge, repl...
Francisco J. Ballesteros, Gorka Guardiola Muzquiz,...
PERCOM
2006
ACM
14 years 4 months ago
A Keystroke and Pointer Control Input Interface for Wearable Computers
The widespread adoption of mobile electronic devices and the advent of wearable computing has encouraged the development of compact alternatives to the keyboard and mouse. These i...
Farooq Ahmad, Petr Musílek