Sciweavers

512 search results - page 8 / 103
» Pervasive data access in wireless and mobile computing envir...
Sort
View
WETICE
2003
IEEE
15 years 3 months ago
Coordination in Pervasive Computing Environments
Computer science and engineering nowadays appears to be challenged (and driven) by technological progress and quantitative growth. Among the technological progress challenges are ...
Alois Ferscha
SAC
2006
ACM
15 years 3 months ago
Making tuple spaces physical with RFID tags
In this paper, we describe the design and implementation of a tuple-based distributed memory realized with the use of RFID technology. The key idea – rooted in a more general sc...
Marco Mamei, Renzo Quaglieri, Franco Zambonelli
CSREAEEE
2006
120views Business» more  CSREAEEE 2006»
14 years 11 months ago
Object Caching Model for Cell Phone Mobile Database
- Inherent limitations of mobile computing environment such as limited bandwidth, limited resourced mobile phones, and instability of wireless environment require summarized mobile...
Khubaib Ahmed Qureshi
WINET
2002
169views more  WINET 2002»
14 years 9 months ago
Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments
In the near future, we will see dramatic changes in computing and networking hardware. A large number of devices (e.g., phones, PDAs, even small household appliances) will become c...
Lalana Kagal, Vlad Korolev, Sasikanth Avancha, Anu...
PERCOM
2006
ACM
15 years 9 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni