Sciweavers

2669 search results - page 28 / 534
» Providing Contextual Information to Pervasive Computing Appl...
Sort
View
PERCOM
2003
ACM
14 years 24 days ago
Interaction in Pervasive Computing Settings Using Bluetooth-Enabled Active Tags and Passive RFID Technology Together with Mobile
Passive RFID technology and unobtrusive Bluetoothenabled active tags are means to augment products and everyday objects with information technology invisible to human users. This ...
Frank Siegemund, Christian Floerkemeier
PERCOM
2005
ACM
14 years 7 months ago
A Location Model for Pervasive Computing Environments
This paper presents a world model for location-aware and user-aware services in ubiquitous computing environments. It can be dynamically organized like a tree based on geographica...
Ichiro Satoh
PERVASIVE
2005
Springer
14 years 1 months ago
Embedded Assessment: Overcoming Barriers to Early Detection with Pervasive Computing
Abstract. Embedded assessment leverages the capabilities of pervasive computing to advance early detection of health conditions. In this approach, technologies embedded in the home...
Margaret E. Morris, Stephen S. Intille, Jennifer B...
EDBT
2006
ACM
111views Database» more  EDBT 2006»
14 years 7 months ago
BISON: Providing Business Information Analysis as a Service
In this paper, we present the architecture of a Business Information Analysis provisioning system, BISON. The system is built based on a functioning business information analysis ...
Hakan Hacigümüs, James Rhodes, Jeffrey T...
PERVASIVE
2006
Springer
13 years 7 months ago
Scalability in a Secure Distributed Proof System
Abstract. A logic-based language is often adopted in systems for pervasive computing, because it provides a convenient way to define rules that change the behavior of the systems d...
Kazuhiro Minami, David Kotz