Sciweavers

11927 search results - page 2055 / 2386
» Wireless Sensor Networks
Sort
View
PERCOM
2006
ACM
16 years 4 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
PERCOM
2006
ACM
16 years 4 months ago
Omero: Ubiquitous User Interfaces in the Plan B Operating System
It is difficult to build user interfaces that must be distributed over a set of dynamic and heterogeneous I/O devices. This difficulty increases when we want to split, merge, repl...
Francisco J. Ballesteros, Gorka Guardiola Muzquiz,...
PERCOM
2006
ACM
16 years 4 months ago
Plan B: An Operating System for Ubiquitous Computing Environments
The conventional approach for building pervasive environments relies on middleware to integrate different systems. Instead, we have built a system that can deal with these environ...
Francisco J. Ballesteros, Enrique Soriano, Katia L...
PERCOM
2006
ACM
16 years 4 months ago
Enhancing Bluetooth Connectivity with RFID
One of the challenges in pervasive computing is communication between a mobile user's terminal and the continuously changing local environment. Bluetooth is one potential opt...
Timo Salminen, Simo Hosio, Jukka Riekki
PERCOM
2006
ACM
16 years 4 months ago
Customizable Pervasive Applications
Human behavior and housing resist every standardization effort. Many aspects such as different technical equipment, furniture, and usage patterns make our surroundings as individu...
Torben Weis, Marcus Handte, Mirko Knoll, Christian...
« Prev « First page 2055 / 2386 Last » Next »