A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
The rapid increase in the number and variety of consumer-level electronic devices without the corresponding development of device management technology has lead to a configuration ...
Justin Mazzola Paluska, Hubert Pham, Umar Saif, Ch...
The pervasive and mobile computing scenario is characterized by the high heterogeneity of devices used to access services, and by frequent changes in the user's context. In t...
This paper describes our ongoing work on a system that provides information about network resources and related communication facilities to applications running on a mobile device...
Arjan J. H. Peddemors, Henk Eertink, Ignas G. Niem...
We consider the challenge of dynamically adapting services to context changes that occur in ubiquitous computing environments (e.g., changes in a user's activity) and propose ...
Cristian Hesselman, Andrew Tokmakoff, Pravin Pawar...