Sciweavers

2111 search results - page 19 / 423
» How to Program Pervasive Systems
Sort
View
112
Voted
DEBS
2010
ACM
15 years 4 months ago
Reliable complex event detection for pervasive computing
Complex event processing for pervasive computing must deal with various sources of error. In this paper, we focus on improving complex event detector handling of several types of ...
Dan O'Keeffe, Jean Bacon
92
Voted
IFIP
2000
Springer
15 years 4 months ago
Process as Theory in Information Systems Research
Many researchers have searched for evidence of organizational improvements from the huge sums invested in ICT. Unfortunately, evidence for such a pay back is spotty at best (e.g.,...
Kevin Crowston
95
Voted
WETICE
2006
IEEE
15 years 6 months ago
Co-Presence Communities: Using Pervasive Computing to Support Weak Social Networks
Although the strongest social relationships feature most prominently in our lives, we also maintain a multitude of much weaker connections: the distant colleagues that we share a ...
Jamie Lawrence, Terry R. Payne, David De Roure
87
Voted
GI
2009
Springer
14 years 10 months ago
Visual Twittering Using Mobile Phones in Pervasive Environments
Abstract: Research in the field of academic teaching and life focuses on the integration of recent technologies. Additionally, new trends within the current usage of e.g. the Inter...
Michael Wittke, Sven Tomforde, Yaser Chaaban, J&uu...
EURONGI
2005
Springer
15 years 6 months ago
P2P-Based Mobility Management for Heterogeneous Wireless Networks and Mesh Networks
Abstract. The recent emergence of a whole plethora of new wireless technologies, such as IEEE802.15, IEEE802.11, and UMTS, etc, has exposed the limitations of mobility solutions in...
Amine M. Houyou, Hermann de Meer, Moritz Esterhazy