Sciweavers

PERCOM
2008
ACM
13 years 11 months ago
CASD: Management of a context-aware service directory
Traditional web service discovery is strongly related to the use of service directories. Especially in the case of mobile web services, where both service requestors and providers...
Christos Doulkeridis, Michalis Vazirgiannis
PERCOM
2008
ACM
13 years 11 months ago
Composing software services in the pervasive computing environment: Languages or APIs?
The pervasive computing environment will be composed of heterogeneous services. In this work, we have explored how a domain specific language for service composition can be implem...
Jon Robinson, Ian Wakeman, Dan Chalmers
PERCOM
2008
ACM
13 years 11 months ago
The sensor internet at work: Locating everyday items using mobile phones
We present a system for monitoring and locating everyday items using mobile phones. The system is based on phones which are enhanced with the capability to detect electronically t...
Christian Frank, Philipp Bolliger, Friedemann Matt...
PERCOM
2008
ACM
13 years 11 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
PERCOM
2008
ACM
13 years 11 months ago
An application framework for mobile, context-aware trails
In this paper 1 we describe the design, implementation and evaluation of a software framework that supports the development of mobile, context-aware trails-based applications. A t...
Cormac Driver, Siobhán Clarke
PERCOM
2008
ACM
13 years 11 months ago
Providing Security and Privacy in RFID Systems Using Triggered Hash Chains
RFID technology shall increase security, e.g. by helping to prevent counterfeiting. But the technology also causes privacy issues. In this paper, after highlighting goals and prob...
Dirk Henrici, Paul Müller
PERCOM
2008
ACM
13 years 11 months ago
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems
In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protec...
Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo
PERCOM
2008
ACM
13 years 11 months ago
An Infrastructure for Developing Pervasive Learning Environments
This paper presents an infrastructure for developing problem-based pervasive learning environments. Building such environments necessitates having many autonomous components deali...
Sabine Graf, Kathryn MacCallum, Tzu-Chien Liu, Mai...
PERCOM
2008
ACM
13 years 11 months ago
Peer-to-Peer Context Reasoning in Pervasive Computing Environments
In this paper, we propose a peer-to-peer approach to derive and obtain additional context data from lowlevel context data that may be spread over multiple domains in pervasive com...
Tao Gu, Hung Keng Pung, Daqing Zhang
PERCOM
2008
ACM
14 years 5 months ago
Distributed Video Adaptation and Streaming for Heterogeneous Devices
In this paper, we present a new concept of distributed adaptation and P2P streaming supporting the expansion of context-aware mobile P2P systems. Here, we propose to adapt video c...
Razib Iqbal, Dewan Tanvir Ahmed, Shervin Shirmoham...