Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
Daniel C. Nash, Thomas L. Martin, Dong S. Ha, Mich...
—This paper addresses context issues in pervasive mobile computing and presents a semantic context model to support location based cooperative mobile applications. In this paper,...
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
As wireless communication advances, research on location-based services using mobile devices has attracted interest, which provides information and services related to user’s phy...
Tiny networked sensor devices will be disseminated over our physical life space, and take a significant role in realizing a ubiquitous computing environment. As sensor network tec...