Sciweavers

INFOCOM
2012
IEEE
11 years 7 months ago
WILL: Wireless indoor localization without site survey
—Indoor localization is of great importance for a range of pervasive applications, attracting many research efforts in the past two decades. Most radio-based solutions require a ...
Chenshu Wu, Zheng Yang, Yunhao Liu, Wei Xi
ICDCS
2011
IEEE
12 years 4 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu
MONET
2010
170views more  MONET 2010»
13 years 3 months ago
A Framework for Engineering Pervasive Applications Applied to Intra-vehicular Sensor Network Applications
The vehicle sector is one of the most exciting application areas for wireless ad hoc networks and pervasive computing technologies. Vehicles are constantly being equipped with more...
Antonio Coronato, Giuseppe De Pietro, Jong Hyuk Pa...
PERVASIVE
2006
Springer
13 years 4 months ago
Declarative Support for Sensor Data Cleaning
Pervasive applications rely on data captured from the physical world through sensor devices. Data provided by these devices, however, tend to be unreliable. The data must, therefor...
Shawn R. Jeffery, Gustavo Alonso, Michael J. Frank...
FPL
2004
Springer
119views Hardware» more  FPL 2004»
13 years 8 months ago
Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor
Pervasive networks with low-cost embedded 8-bit processors are set to change our day-to-day life. Public-key cryptography provides crucial functionality to assure security which is...
Sandeep S. Kumar, Christof Paar
GI
2009
Springer
13 years 9 months ago
Flow-driven Interactions for Adaptive Pervasive Applications
: The era of ubiquitous and pervasive computing technology opens the world for new pervasive applications and services within the physical surroundings. Often users find themselves...
Bashar Altakrouri
MOMM
2009
ACM
163views Communications» more  MOMM 2009»
13 years 9 months ago
Tools for designing and prototyping activity-based pervasive applications
This paper proposes a new approach for modelling, testing and prototyping pervasive, possibly mobile, and distributed applications. It describes a set of tools aimed at supporting...
Pascal Bruegger, Denis Lalanne, Agnes Lisowska, B&...
AC
2003
Springer
13 years 9 months ago
System Support for Pervasive Applications
To make pervasive computing a reality, we need better system support for building, deploying, and using pervasive applications. In this paper, we identify the unique requirements ...
Robert Grimm, Brian N. Bershad
MOBIDE
2006
ACM
13 years 10 months ago
Towards correcting input data errors probabilistically using integrity constraints
Mobile and pervasive applications frequently rely on devices such as RFID antennas or sensors (light, temperature, motion) to provide them information about the physical world. Th...
Nodira Khoussainova, Magdalena Balazinska, Dan Suc...
ICDCS
2008
IEEE
13 years 11 months ago
Heuristics-Based Strategies for Resolving Context Inconsistencies in Pervasive Computing Applications
Context-awareness allows pervasive applications to adapt to changeable computing environments. Contexts, the pieces of information that capture the characteristics of environments...
Chang Xu, Shing-Chi Cheung, Wing Kwong Chan, Chuny...