Sciweavers

203 search results - page 22 / 41
» Ontology-based models in pervasive computing systems
Sort
View
78
Voted
PERVASIVE
2009
Springer
15 years 4 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
PERSUASIVE
2010
Springer
15 years 1 months ago
Activity-Based Micro-pricing: Realizing Sustainable Behavior Changes through Economic Incentives
Abstract. In this paper, we further develop the idea of combining pervasive computing techniques with electronic payment systems to create activity-based micro-incentives. Economic...
Tetsuo Yamabe, Vili Lehdonvirta, Hitoshi Ito, Hayu...
ICWS
2004
IEEE
14 years 11 months ago
A Meta-Modeling Approach to Web Services
Web Services (WS) technology is becoming pervasive in the development of distributed systems and is an appealing vehicle for service presentation and horizontal integration. On th...
Fei Cao, Barrett R. Bryant, Wei Zhao, Carol C. Bur...
AINA
2007
IEEE
15 years 3 months ago
The Community Stack: Concept and Prototype
Location awareness and mobility are main factors in pervasive computing. There is a lot of work focusing on develop location aware applications. Generalizing from location awarene...
Tuan Nguyen, Seng Wai Loke, Torab Torabi
128
Voted
LBM
2007
14 years 11 months ago
Decentralised Clinical Guidelines Modelling with Lightweight Coordination Calculus
Background: Clinical protocols and guidelines have been considered as a major means to ensure that cost-effective services are provided at the point of care. Recently, the comput...
Bo Hu, Srinandan Dasmahapatra, David Robertson, Pa...