In this paper, we survey the models and approaches applied to the middleware services of pervasive computing environments. Architectural styles and patterns introduced in the doma...
Most of existing user authentication schemes require high computation cost of exponentiation operations for the purpose of security. However, it is not suitable for mobile devices...
This paper presents a formal model for asynchronous distributed systems with servers that may exhibit Byzantine faults or crash and subsequently recover. The model is computationa...
The large scale adoption of adaptive services in pervasive and mobile computing is likely to be conditioned to the availability of reliable privacy-preserving technologies. Unfort...
In this paper, we report on a user-centered, iterative design process for augmenting sports equipment with ubiquitous computing technology. In several design iterations, a fully w...
Matthias Kranz, Wolfgang Spiessl, Albrecht Schmidt