Sciweavers

283 search results - page 4 / 57
» Exploiting Immunological Properties for Ubiquitous Computing...
Sort
View
ENTCS
2006
180views more  ENTCS 2006»
13 years 7 months ago
Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
Fernando Rosa Velardo, Olga Marroquín Alons...
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
14 years 28 days ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
NBIS
2009
Springer
14 years 2 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...
ISWC
2002
IEEE
14 years 17 days ago
Using Wearable Computers to Construct Semantic Representations of Physical Spaces
The representation of physical space has traditionally focused on keyphrases such as “Computer Science Building” or “Physics Department” that help us in describing and nav...
Fernando Diaz
WIMOB
2009
IEEE
14 years 2 months ago
Exploiting RF-Scatter: Human Localization with Bistatic Passive UHF RFID-Systems
—In ubiquitous computing, localization of users in indoor environments is a challenging issue. On the one hand, localization data needs to have fine granularity to provide reaso...
Dominik Lieckfeldt, Jiaxi You, Dirk Timmermann