Location-based services have attracted the attention of important research in the field of mobile computing. Specifically, different mechanisms have been proposed to process loc...
Cooperation among wireless nodes has been recently proposed for improving the physical layer (PHY) security of wireless transmission in the presence of multiple eavesdroppers. Whil...
WiFi interface is known to be a primary energy consumer in mobile devices, and idle listening (IL) is the dominant source of energy consumption in WiFi. Most existing protocols, s...
Abstract. Ubiquitous computing environments are characterised by a high number of heterogenous devices that generate a huge amount of context data. These data are used, for example...
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...