Most authentication protocols designed for ubiquitous computing environments try to solve the problem of intuitive, scalable, secure authentication of wireless communication. Due ...
Ubiquitous computing has thus far not touched the realm of electronic prescriptions. This paper describes a Jini-based solution for electronic prescriptions, which allows for thei...
Abstract— By means of so-called Scatternets, Bluetooth provides the ability to construct robust wireless multi-hop networks. In this paper we propose a practical protocol for tim...
Abstract. Amongst the challenges of ubiquitous computing is the need to provide management support for personal wireless devices and sensors. In this extended abstract we introduce...
Naranker Dulay, Emil C. Lupu, Morris Sloman, Joe S...
– This paper describes the system design and implementation of Active Basestations, a novel application of the run-time reconfigurable hardware technology whose applications have...