Sciweavers

PERCOM
2004
ACM
14 years 7 months ago
A Mobility Gateway for Small-Device Networks
Networks of small devices, such as environmental sensors, introduce a number of new challenges for traditional protocols and approaches. In particular, the extreme resource constr...
Robert C. Chalmers, Kevin C. Almeroth
PERCOM
2004
ACM
14 years 7 months ago
Performance Issues with Vertical Handovers - Experiences from GPRS Cellular and WLAN Hot-spots Integration
Interworking heterogeneous wireless access technologies is an important step towards building the next generation, all-IP wireless access infrastructure. In this paper, we present...
Rajiv Chakravorty, Pablo Vidales, Kavitha Subraman...
PERCOM
2004
ACM
14 years 7 months ago
Pervasive Enablement of Business Processes
People are an important part of many business processes. Current workflow-based implementations of business processes constrain users to the desktop environment; require them to p...
Dipanjan Chakraborty, Hui Lei
PERCOM
2004
ACM
14 years 7 months ago
Cooperative Location-Sensing for Wireless Networks
We present the Cooperative Location-sensing system (CLS), an adaptive location-sensing system that enables devices to estimate their position in a self-organizing manner without t...
Charalampos Fretzagias, Maria Papadopouli
PERCOM
2005
ACM
14 years 7 months ago
Determination of Time and Order for Event-Based Middleware in Mobile Peer-to-Peer Environments
An event correlation is becoming an important service in event-based middleware allowing subscribers in publish/subscribe paradigm to consume patterns of events (composite events)...
Eiko Yoneki, Jean Bacon
PERCOM
2005
ACM
14 years 7 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
PERCOM
2005
ACM
14 years 7 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
PERCOM
2005
ACM
14 years 7 months ago
Enabling Reliable Many-to-Many Communication in Ad-Hoc Pervasive Environments
In order for pervasive computing to realize its full potential, pervasive applications have to be able to operate without support from fixed communication infrastructure at least ...
Einar Vollset, Paul D. Ezhilchelvan
PERCOM
2005
ACM
14 years 7 months ago
Routing Layer Support for Service Discovery in Mobile Ad Hoc Networks
Service discovery in Mobile Ad Hoc Networks is an essential process in order for these networks to be selfconfigurable. In this paper we argue that Service Discovery can be greatl...
Christopher N. Ververidis, George C. Polyzos
PERCOM
2005
ACM
14 years 7 months ago
Hoarding Content in M-Learning Context
With the advances in mobile technologies is now possible to support learners and teachers activities on the move. We analyzed the functionalities that should be provided by a gene...
Anna Trifonova, Marco Ronchetti