Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Inexpensive broadband routers are a popular way for people to create an internal, and sometimes wireless, network in their homes. By purchasing such a router and plugging it in, t...
Pervasive computing applications are tedious to develop because they combine a number of problems ranging from device heterogeneity, to middleware constraints, to lack of programm...
Charles Consel, Wilfried Jouve, Julien Lancia, Nic...
In this paper we present our ongoing research about the integration of ubiquitous computing systems into classroom settings, in order to give basic support for some classroom and ...
Nobuji A. Saito, Hiroaki Ogata, Rosa G. J. Paredes...
– This paper presents a Java service platform for mobile healthcare that enables remote health monitoring using 2.5/3G public wireless networks. The platform complies with todayâ...