Sciweavers

1221 search results - page 7 / 245
» A Comparison of Two Programming Models for Pervasive Computi...
Sort
View
MIDDLEWARE
2005
Springer
15 years 3 months ago
Managing the follow-me semantics to build large-scale pervasive applications
In this paper, we present the concept of follow-me semantics of the large-scale pervasive application and discuss the features and services to its implementation based on the inte...
Iara Augustin, Adenauer C. Yamin, Cláudio F...
BIRTHDAY
2006
Springer
15 years 1 months ago
Realistic Worst-Case Execution Time Analysis in the Context of Pervasive System Verification
We describe a gate level design of a FlexRay-like bus interface. An electronic control unit (ECU) is obtained by integrating this interface into the design of the verified VAMP pro...
Steffen Knapp, Wolfgang J. Paul
FGCS
2008
159views more  FGCS 2008»
14 years 9 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
98
Voted
WOA
2010
14 years 7 months ago
Programming Wireless Body Sensor Network Applications through Agents
Wireless Sensor Networks (WSNs) are currently emerging as one of the most disruptive technologies enabling and supporting next generation ubiquitous and pervasive computing scenari...
Giancarlo Fortino, Stefano Galzarano
DAIS
2010
14 years 11 months ago
Distributed Object-Oriented Programming with RFID Technology
Our everyday environments will soon be pervaded with RFID tags integrated in physical objects. These RFID tags can store a digital representation of the physical object and transmi...
Andoni Lombide Carreton, Kevin Pinte, Wolfgang De ...