Sciweavers

2404 search results - page 276 / 481
» Middleware for pervasive computing
Sort
View
121
Voted
PERVASIVE
2009
Springer
15 years 10 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
88
Voted
PERVASIVE
2010
Springer
15 years 10 months ago
Indoor Positioning Using GPS Revisited
It has been considered a fact that GPS performs too poorly inside buildings to provide usable indoor positioning. We analyze results of a measurement campaign to improve on the und...
Mikkel Baun Kjærgaard, Henrik Blunck, Torben...
LOCA
2007
Springer
15 years 9 months ago
The Whereabouts Diary
The user profile is one of the main context-information in a wide range of pervasive computing applications. Modern handheld devices provided with localization capabilities could a...
Gabriella Castelli, Marco Mamei, Alberto Rosi
PERVASIVE
2007
Springer
15 years 9 months ago
Objects Calling Home: Locating Objects Using Mobile Phones
Locating physical items is a highly relevant application addressed by numerous systems. Many of these systems share the drawback that costly infrastructure must be installed before...
Christian Frank, Philipp Bolliger, Christof Rodune...
PERVASIVE
2007
Springer
15 years 9 months ago
Using Ground Reaction Forces from Gait Analysis: Body Mass as a Weak Biometric
Ground reaction forces generated during normal walking have recently been used to identify and/or classify individuals based upon the pattern of the forces observed over time. One ...
Jam Jenkins, Carla Schlatter Ellis