Sciweavers

PERCOM
2004
ACM
15 years 3 days ago
Programming Pervasive and Mobile Computing Applications with the TOTA Middleware
Pervasive computing calls for suitable middleware and programming models to deal with large software systems dived in dynamic mobile network environments. Here we present the prog...
Marco Mamei, Franco Zambonelli
PERCOM
2004
ACM
15 years 3 days ago
A Software Engineering Framework for Context-Aware Pervasive Computing
There is growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are flexible, adaptable, and capable of acting autono...
Karen Henricksen, Jadwiga Indulska
PERCOM
2004
ACM
15 years 3 days ago
Dynamic World Models from Ray-tracing
Context-aware computing systems demand an accurate and up-to-date world model which computationally represents the environment they oversee. Systems to date tend to have small-sca...
Robert K. Harle, Andy Hopper
PERCOM
2004
ACM
15 years 3 days ago
A User-Guided Cognitive Agent for Network Service Selection in Pervasive Computing Environments
Connectivity is central to pervasive computing environments. We seek to catalyze a world of rich and diverse connectivity through technologies that drastically simplify the task o...
George Lee, Peyman Faratin, Steven Bauer, John Wro...
PERCOM
2004
ACM
15 years 3 days ago
Analyzing Connectivity-Based Multi-Hop Ad-hoc Positioning
We investigate the theoretical limits of positioning algorithms. In particular, we study scenarios where the nodes do not receive anchors directly (multi-hop) and where no physica...
Regina Bischoff, Roger Wattenhofer
PERCOM
2004
ACM
15 years 3 days ago
Employing User Feedback for Fast, Accurate, Low-Maintenance Geolocationing
One way to improve inferences on sensor data is to tune the algorithms through a time-consuming offline procedure. A less expensive, and potentially more accurate method is to use...
Ezekiel S. Bhasker, Steven W. Brown, William G. Gr...
PERCOM
2004
ACM
15 years 3 days ago
One-Time Capabilities for Authorizations without Trust
This paper introduces and solves a security problem of pervasive computing: how to define authorizations for offline interactions when trust relationships among entities do not ex...
Laurent Bussard, Refik Molva
PERCOM
2004
ACM
15 years 3 days ago
PCOM - A Component System for Pervasive Computing
Applications in the Pervasive Computing domain are challenged by the dynamism in which their execution environment changes, e.g. due to user mobility. As a result, applications ha...
Christian Becker, Marcus Handte, Gregor Schiele, K...
PERCOM
2004
ACM
15 years 3 days ago
Patch Panel: Enabling Control-Flow Interoperability in Ubicomp Environments
Ubiquitous computing environments accrete slowly over time rather than springing into existence all at once. Mechanisms are needed for incremental integration-the problem of how t...
Rafael Ballagas, Andy Szybalski, Armando Fox
PERCOM
2004
ACM
15 years 3 days ago
Wi-Fi in Ad Hoc Mode: A Measurement Study
In this paper we investigate the performance of IEEE 802.11b ad hoc networks by means of an experimental study. This analysis reveals several aspects that are usually neglected in...
Giuseppe Anastasi, Eleonora Borgia, Marco Conti, E...