default search action
Pervasive and Mobile Computing, Volume 3
Volume 3, Number 1, January 2007
- Mohamad Badra, Pascal Urien, Ibrahim Hajjeh:
Flexible and fast security solution for wireless LAN. 1-14 - Piyush Naik, Karthikeyan Ravichandran, Krishna M. Sivalingam:
Cryptographic key exchange based on locationing information. 15-35 - Daniel Augot, Raghav Bhaskar, Valérie Issarny, Daniele Sacchetti:
A three round authenticated group key agreement protocol for ad hoc networks. 36-52
Volume 3, Number 2, March 2007
- Diane J. Cook, Sajal K. Das:
How smart are our environments? An updated look at the state of the art. 53-73 - Simon Moncrieff, Svetha Venkatesh, Geoff A. W. West, Stewart Greenhill:
Multi-modal emotive computing in a smart house environment. 74-94 - Sebastian Lühr, Geoff A. W. West, Svetha Venkatesh:
Recognition of emergent human behaviour in a smart home: A data mining approach. 95-116 - Hakan Duman, Hani Hagras, Victor Callaghan:
Intelligent association selection of embedded agents in intelligent inhabited environments. 117-157 - Ichiro Satoh:
A location model for smart environments. 158-179 - Viet Thang Pham, Qiang Qiu, Aung Aung Phyo Wai, Jit Biswas:
Application of ultrasonic sensors in a smart environment. 180-207
Volume 3, Number 3, June 2007
- Keunho Yun, Daijin Kim:
Robust location tracking using a dual layer particle filter. 209-232 - Jian Li, Prasant Mohapatra:
Analytical modeling and mitigation techniques for the energy hole problem in sensor networks. 233-254 - Yu Jiao, Ali R. Hurson, Behrooz A. Shirazi:
Adaptive application-driven WLAN power management. 255-275 - Peter Rigole, Tim Clerckx, Yolande Berbers, Karin Coninx:
Task-driven automated component deployment for ambient intelligence environments. 276-299 - Mathias Stäger, Paul Lukowicz, Gerhard Tröster:
Power and accuracy trade-offs in sound-based context recognition systems. 300-327
Volume 3, Number 4, August 2007
- Mohan Kumar, Franco Zambonelli:
Middleware for pervasive computing. 329-331 - Erwin Aitenbichler, Jussi Kangasharju, Max Mühlhäuser:
MundoCore: A light-weight infrastructure for pervasive computing. 332-361 - Shumao Ou, Kun Yang, Jie Zhang:
An effective offloading middleware for pervasive services on mobile devices. 362-385 - Athanassios Boulis, Chih-Chieh Han, Roy Shea, Mani B. Srivastava:
SensorWare: Programming sensor networks beyond code update and querying. 386-412 - Marco Avvenuti, Paolo Corsini, Paolo Masci, Alessio Vecchio:
An application adaptation layer for wireless sensor networks. 413-438 - Paolo Bellavista, Antonio Corradi, Luca Foschini:
Context-aware handoff middleware for transparent service continuity in wireless networks. 439-466 - Klaus Herrmann, Gero Mühl, Michael A. Jaeger:
MESHMdl event spaces - A coordination middleware for self-organizing applications in ad hoc networks. 467-487
Volume 3, Number 5, October 2007
- Arnon Amir, Alon Efrat, Jussi Myllymaki, Lingeshwaran Palaniappan, Kevin Wampler:
Buddy tracking - efficient proximity detection among mobile friends. 489-511 - Alexandros Karypidis, Spyros Lalis:
OmniStore: Automating data management in a personal system comprising several portable devices. 512-536 - Yongwei Wang, Mukesh Singhal:
On improving the efficiency of truthful routing in MANETs with selfish nodes. 537-559 - Michael Wallbaum:
A priori error estimates for wireless local area network positioning systems. 560-580 - Zahi Nakad, Mark T. Jones, Thomas Martin, Ravi Shenoy:
Using electronic textiles to implement an acoustic beamforming array: A case study. 581-606
Volume 3, Number 6, December 2007
- Thomas La Porta, Matt W. Mutka, Claudio S. Pinhanez, Peter Steenkiste:
Editorial PerCom 2007 special issue. 607-608 - Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki Cho, Mario Gerla:
BlueTorrent: Cooperative content sharing for Bluetooth users. 609-634 - Sanem Kabadayi, Christine Julien:
Scenes: Abstracting interaction in immersive sensor networks. 635-658 - Nalin Subramanian, Chanjun Yang, Wensheng Zhang:
Securing distributed data storage and retrieval in sensor networks. 659-676 - Enrique Soriano, Francisco J. Ballesteros, Gorka Guardiola:
Human-to-Human authorization for resource sharing in SHAD: Roles and protocols. 677-697 - Alex Varshavsky, Eyal de Lara, Jeffrey Hightower, Anthony LaMarca, Veljo Otsason:
GSM indoor localization. 698-720 - Albrecht Schmidt, Lucia Terrenghi, Paul Holleis:
Methods and guidelines for the design and development of domestic ubiquitous computing applications. 721-738
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.