Sciweavers

245 search results - page 11 / 49
» pervasive 2008
Sort
View
ICISC
2009
138views Cryptology» more  ICISC 2009»
14 years 7 months ago
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly...
Madeline González Muñiz, Rainer Stei...
PERCOM
2008
ACM
14 years 9 months ago
Composing software services in the pervasive computing environment: Languages or APIs?
The pervasive computing environment will be composed of heterogeneous services. In this work, we have explored how a domain specific language for service composition can be implem...
Jon Robinson, Ian Wakeman, Dan Chalmers
INFSOF
2008
98views more  INFSOF 2008»
14 years 9 months ago
Engineering contextual knowledge for autonomic pervasive services
Services for mobile and pervasive computing should extensively exploit contextual information both to adapt to user needs and to enable autonomic behavior. This raises the problem...
Gabriella Castelli, Marco Mamei, Franco Zambonelli
IJSWIS
2008
100views more  IJSWIS 2008»
14 years 9 months ago
Semantic-Based Bluetooth-RFID Interaction for Advanced Resource Discovery in Pervasive Contexts
We propose a novel object discovery framework integrating the application layer of Bluetooth and RFID standards. The approach is motivated and illustrated in an innovative u-comme...
Tommaso Di Noia, Eugenio Di Sciascio, Francesco M....
SIVP
2010
118views more  SIVP 2010»
14 years 7 months ago
Self-organization of sensor networks for detection of pervasive faults
Resource aware operation of sensor networks requires adaptive re-organization to dynamically adapt to the operational environment. A complex dynamical system of interacting compone...
Abhishek Srivastav, Asok Ray