Sciweavers

2362 search results - page 395 / 473
» The wireless network jamming problem
Sort
View
PERCOM
2008
ACM
16 years 4 months ago
Cardinality Estimation for Large-scale RFID Systems
Counting or estimating the number of tags is crucial for large-scale RFID systems. The use of multiple readers was recently proposed to improve the efficiency and effectiveness in ...
Chen Qian, Hoilun Ngan, Yunhao Liu
PERCOM
2007
ACM
16 years 4 months ago
Ontology-Directed Generation of Frameworks for Pervasive Service Development
Pervasive computing applications are tedious to develop because they combine a number of problems ranging from device heterogeneity, to middleware constraints, to lack of programm...
Charles Consel, Wilfried Jouve, Julien Lancia, Nic...
PERCOM
2007
ACM
16 years 4 months ago
Challenges for Pervasive RFID-Based Infrastructures
The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deploym...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
PERCOM
2007
ACM
16 years 4 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...
119
Voted
PERCOM
2007
ACM
16 years 4 months ago
Hoarding Context Information with Context Clusters
The components of a context-aware system can often become disconnected because of the dynamic environments within which they are deployed. Hoarding context information on the clie...
Myilone Anandarajah, Ricky Robinson, Jadwiga Indul...