Sciweavers

PERCOM
2005
ACM
15 years 2 days ago
Applying a Disciplined Approach to the Development of a Context-Aware Communication Application
Pervasive computing applications must be engineered to provide unprecedented levels of flexibility in order to reconfigure and adapt in response to changes in computing resources ...
Ted McFadden, Karen Henricksen, Jadwiga Indulska, ...
PERCOM
2005
ACM
15 years 2 days ago
Anonymous Content Sharing in Ad Hoc Networks
It may be costly for mobile pervasive computing device users to download content from the Internet using their 3G connections if the 3G connection cost is a function of the amount...
Seung-Seok Kang, Matt W. Mutka, Li Xiao
PERCOM
2005
ACM
15 years 2 days ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
PERCOM
2005
ACM
15 years 2 days ago
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
PERCOM
2005
ACM
15 years 2 days ago
PICASSO: Pervasive Information Chronicling, Access, Search, and Sharing for Organizations
Several researchers have pointed out and begun to demonstrate that it is now possible to digitize an entire lifetime of experiences into a pocket-sized storage device, and thus to...
Gopal Pingali, Mark Podlaseck, Sinem Güven
PERCOM
2005
ACM
15 years 2 days ago
Using Symbiotic Displays to View Sensitive Information in Public
Symbiotic displays are intelligent network devices that can be enlisted on demand by mobile devices, offering higher resolutions and larger viewing areas. Users of small mobile de...
Stefan Berger, Rick Kjeldsen, Chandrasekhar Naraya...
PERCOM
2005
ACM
15 years 2 days ago
TinyLIME: Bridging Mobile and Sensor Networks through Middleware
In the rapidly developing field of sensor networks, bridging the gap between the applications and the hardware presents a major challenge. Although middleware is one solution, it ...
Carlo Curino, Matteo Giani, Marco Giorgetta, Aless...
PERCOM
2005
ACM
15 years 2 days ago
SIP-Based Mobility Architecture for Next Generation Wireless Networks
Application-level protocol abstraction is required to support seamless mobility in next generation heterogeneous wireless networks. Session Initiation Protocol (SIP) proch an abst...
Nilanjan Banerjee, Sajal K. Das, Arup Acharya
PERCOM
2005
ACM
15 years 2 days ago
Traditional Systems Can Work Well for Pervasive Applications. A Case Study: Plan 9 from Bell Labs Becomes Ubiquitous
There is a huge effort in ongoing research on new middleware platforms and new distributed services to support ubiquitous environments and pervasive applications. Most research pr...
Francisco J. Ballesteros, Gorka Guardiola Muzquiz,...
PERCOM
2005
ACM
15 years 2 days ago
Policy-Driven Data Dissemination for Context-Aware Applications
Context-aware pervasive-computing applications require continuous monitoring of their physical and computational environment to make appropriate adaptation decisions in time. The ...
Guanling Chen, David Kotz