Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit int...
Konstantinos Pelechrinis, Ioannis Broustis, Srikan...
— Centrality is a concept often used in social network analysis to study different properties of networks that are modeled as graphs. We present a new centrality metric called Lo...
The lack of structured methodologies and software engineering efforts on designing the support of contextawareness in pervasive systems hinders the potential advantages of analyzi...
Oriana Riva, Cristiano di Flora, Stefano Russo, Ki...
Users' tasks are typically a sequence of steps. Today, the goal of Pervasive Computing applications ? to support users in their tasks by using context information ? is only p...
Stephan Urbanski, Christian Becker, Kurt Rothermel
A course on pervasive computing should be structured around key functions throughout a systems development process to cover common underlying concerns throughout science and engin...