Sciweavers

MOBIQUITOUS
2008
IEEE
14 years 6 months ago
An adaptive middleware applied to the ad-hoc nature of cardiac health care
Heart disease is the number one killer in the civilized world,
Gemma Power, Christopher Foley, Sasitharan Balasub...
MOBIQUITOUS
2008
IEEE
14 years 6 months ago
ScreenSpot: multidimensional resource discovery for distributed applications in smart spaces
The big challenge related to the contemporary research on ubiquitous and pervasive computing is that of seamless integration. For the next generation of ubiquitous and distributed...
Marko Jurmu, Sebastian Boring, Jukka Riekki
MOBIQUITOUS
2008
IEEE
14 years 6 months ago
Some research questions for computational transportation science
In this paper some research questions which potentially lie within the purview of the new discipline of Computational Transportation Science are presented. Some of these questions...
Glenn Geers
MOBIQUITOUS
2008
IEEE
14 years 6 months ago
A study on user acceptance of error visualization techniques
Location-based services in general require information about the position of certain objects. For instance, for a navigation service the position of the user needs to be known. Th...
Hendrik Lemelson, Thomas King, Wolfgang Effelsberg
MOBIQUITOUS
2008
IEEE
14 years 6 months ago
How to edit gigabyte XML files on a mobile phone with XAS, RefTrees, and RAXS
The Open Source mobility middleware developed in the Fuego Core project provides a stack for efficient XML processing on limited devices. Its components are a persistent map API, ...
Tancred Lindholm, Jaakko Kangasharju
ISCC
2008
IEEE
171views Communications» more  ISCC 2008»
14 years 6 months ago
The operation mode selection in FMIPv6
The Fast Handover for Mobile IPv6 (FMIPv6) [2] aims at reducing the long handover latency in Mobile IPv6 [1] by fast movement detection and fast binding update. Furthermore, it al...
Bin Liu, Philippe Martins, Philippe Bertin
ISCC
2008
IEEE
143views Communications» more  ISCC 2008»
14 years 6 months ago
SSMS - A secure SMS messaging protocol for the m-payment systems
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried se...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ISCC
2008
IEEE
110views Communications» more  ISCC 2008»
14 years 6 months ago
Model for polling in noisy multihop systems with application to PLC and AMR
The present paper presents a Markov Chain model of polling in noisy multi-hop systems typical of Power Line Communications (PLC) as well as of other systems. The model includes the...
Joseph M. Selga, Agustín Zaballos, Jaume Ab...
ISCC
2008
IEEE
114views Communications» more  ISCC 2008»
14 years 6 months ago
An enhanced approach for efficient MBMS handovers in 3G networks
With MBMS, a mobile Terminal (MT) that is on the move and receive an MBMS service may have to handover from a Common to a Dedicated Channel when crossing the cell’s edge. In pre...
Christophoros Christophorou, Andreas Pitsillides
ISCC
2008
IEEE
119views Communications» more  ISCC 2008»
14 years 6 months ago
Deterministic service on IEEE 802.11-like networks
Wireless IEEE 802.11 networks are typically deployed as a convenient and flexible way to access wired backbones. However, due to the inherently shared nature and physical propert...
Mario Baldi, Marco Papa Manzillo