Context awareness and context modeling have raised their call for attention and importance quite recently in the world of contact centers for better customer services and relation...
People are an important part of many business processes. Current workflow-based implementations of business processes constrain users to the desktop environment; require them to p...
Ubiquitous computing environments accrete slowly over time rather than springing into existence all at once. Mechanisms are needed for incremental integration-the problem of how t...
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...
: Service Discovery as an essential element in pervasive computing environments is widely accepted. Much active research on service discovery has been conducted, but privacy has be...