Sciweavers

PERCOM
2009
ACM
14 years 11 months ago
Proactive and Adaptive Fuzzy Profile Control for Mobile Phones
In this paper we describe a context-sensitive way to change an active mobile phone profile. We present a method to create a proactive and adaptive phone profile control system that...
Miika Valtonen, Antti-Matti Vainio, Jukka Vanhala
PERCOM
2009
ACM
14 years 11 months ago
Programmable Presence Virtualization for Next-Generation Context-Based Applications
Abstract--Presence, broadly defined as an event publishnotification infrastructure for converged applications, has emerged as a key mechanism for collecting and disseminating conte...
Arup Acharya, Nilanjan Banerjee, Dipanjan Chakrabo...
PERCOM
2009
ACM
14 years 11 months ago
Video Ads Dissemination through WiFi-Cellular Hybrid Networks
In this paper, we propose a method for video ads dissemination through a hybrid network consisting of WiFi and cellular networks, in order to provide timely delivery of video ads w...
Hiroshi Hanano, Yoshihiro Murata, Naoki Shibata, K...
PERCOM
2009
ACM
14 years 11 months ago
Towards Adaptive Resource-Driven Routing
In pervasive computing environments, applications find themselves in constantly changing operating conditions. Such applications often need to discover locally available resources ...
Angela Dalton, Christine Julien
PERCOM
2009
ACM
14 years 11 months ago
What's up: P2P Spontaneous Social Networking
This demo presents some features of our platform What's up for P2P social networking. The main idea of What's Up is to provide spontaneous social networks in the events s...
Anh-Minh Ngyuen, Mehdi Mani, Noël Crespi
PERCOM
2009
ACM
14 years 11 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
PERCOM
2009
ACM
14 years 11 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...
PERCOM
2009
ACM
14 years 11 months ago
iLamp: A Sensor-Enhanced Lamp with Surface-Tracking Capability Based on Light Intensity
The iLamp1 system is a sensor-enhanced desk lamp with surface-tracking capability based on received light intensity. It consists of two components: lamp and bookmark. The bookmark ...
Lun-Wu Yeh, Che-Yen Lu, Yu-Hsuan Lin, Jia-Liang Li...
PERCOM
2009
ACM
14 years 11 months ago
DiaSim: A Parameterized Simulator for Pervasive Computing Applications
Abstract--Pervasive computing applications involve both software concerns, like any software system, and integration concerns, for the constituent networked devices of the pervasiv...
Wilfried Jouve, Julien Bruneau, Charles Consel
ICIP
2004
IEEE
15 years 13 days ago
Transmission protocols for streaming video over wireless
Rate control is an important issue in video streaming applications for both wired and wireless networks. A widely accepted rate control method in wired networks is TCP friendly eq...
Minghua Chen, Avideh Zakhor