Sciweavers

829 search results - page 103 / 166
» Customizable Pervasive Applications
Sort
View
PERVASIVE
2009
Springer
15 years 4 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
PERVASIVE
2007
Springer
15 years 4 months ago
Objects Calling Home: Locating Objects Using Mobile Phones
Locating physical items is a highly relevant application addressed by numerous systems. Many of these systems share the drawback that costly infrastructure must be installed before...
Christian Frank, Philipp Bolliger, Christof Rodune...
PERVASIVE
2007
Springer
15 years 4 months ago
TrackSense: Infrastructure Free Precise Indoor Positioning Using Projected Patterns
While commercial solutions for precise indoor positioning exist, they are costly and require installation of additional infrastructure, which limits opportunities for widespread ad...
Moritz Köhler, Shwetak N. Patel, Jay Summet, ...
PERVASIVE
2007
Springer
15 years 4 months ago
A Time to Glance: Studying the Use of Mobile Ambient Information
Recent work by our group at Motorola Labs has focused on applying the principles of ambient interfaces to the domain of mobile communications. Our methods incorporate both formati...
Frank Bentley, Joe Tullio, Crysta J. Metcalf, Drew...
GLOBECOM
2006
IEEE
15 years 4 months ago
A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks
– Mobile Ad-hoc Networks (MANETs) are important in pervasive computing systems, in which users discover and utilize various services to achieve their goals. Integrating service d...
Stephen S. Yau, Wei Gao, Dazhi Huang