Sciweavers

ICDCSW
2003
IEEE
13 years 9 months ago
Middleware and Application Adaptation Requirements and Their Support in Pervasive Computing
Pervasive computing environments are characterized by an additional heterogeneity compared to existing computing infrastructures. Devices ranging from small embedded systems to fu...
Christian Becker, Gregor Schiele
PERVASIVE
2004
Springer
13 years 10 months ago
Adaptive On-Device Location Recognition
Abstract. Location-awareness is useful for mobile and pervasive computing. We present a novel adaptive framework for recognizing personally important locations in cellular networks...
Kari Laasonen, Mika Raento, Hannu Toivonen
NLDB
2004
Springer
13 years 10 months ago
A Generic Coordination Model for Pervasive Computing Based on Semantic Web Languages
Human interaction occurs always in a specific context and in a particular environment, and a common knowledge base about them is essential for understanding each other. By immersi...
Amine Tafat, Michèle Courant, Béat H...
MDM
2004
Springer
147views Communications» more  MDM 2004»
13 years 10 months ago
Mobile Agents: Can They Assist with Context Awareness?
This position paper argues that the mobile agents paradigm is a useful and important technology enabling pervasive and ubiquitous computing. Context awareness drives adaptability ...
Arkady B. Zaslavsky
CF
2004
ACM
13 years 10 months ago
A framework for resource discovery in pervasive computing for mobile aware task execution
Aimed to provide computation ubiquitously, pervasive computing is perceived as a means to provide a user the transparency of anywhere, anyplace, anytime computing. Pervasive compu...
K. Kalapriya, S. K. Nandy, Deepti Srinivasan, R. U...
SOCO
2005
Springer
13 years 10 months ago
Ad Hoc Composition of User Tasks in Pervasive Computing Environments
Due to the large success of wireless networks and portable devices, the pervasive computing paradigm is becoming a reality. One of the most challenging objectives to be achieved in...
Sonia Ben Mokhtar, Nikolaos Georgantas, Valé...
PERVASIVE
2005
Springer
13 years 10 months ago
Embedded Assessment: Overcoming Barriers to Early Detection with Pervasive Computing
Abstract. Embedded assessment leverages the capabilities of pervasive computing to advance early detection of health conditions. In this approach, technologies embedded in the home...
Margaret E. Morris, Stephen S. Intille, Jennifer B...
MIDDLEWARE
2005
Springer
13 years 10 months ago
Functional and architectural adaptation in pervasive computing environments
Service-oriented computing paradigm encourages the use of dynamic binding of application requirements to the resources needed to fulfill application tasks. Especially in pervasive...
Nanjangud C. Narendra, Umesh Bellur, S. K. Nandy, ...
MIDDLEWARE
2005
Springer
13 years 10 months ago
Improving flexibility on host discovery for pervasive computing middlewares
The vision of pervasive or ubiquitous computing, conceived by Mark Weiser, foresees a world where computing is embedded in every day objects. Such objects interact with each other...
Emerson Loureiro, Loreno Oliveira, Hyggo Oliveira ...
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
13 years 10 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis