Search Results - "ICPS '05. Proceedings. International Conference on Pervasive Services, 2005"

Refine Results
  1. 1

    An anonymous communication technique using dummies for location-based services by Kido, H., Yanagisawa, Y., Satoh, T.

    “…Recently, highly accurate positioning devices enable us to provide various types of location-based services. On the other hand, because such position data…”
    Get full text
    Conference Proceeding
  2. 2

    Structure-less content-based routing in mobile ad hoc networks by Baldoni, R., Beraldi, R., Cugola, G., Migliavacca, M., Querzoni, L.

    “…The decoupling and asynchrony properties of the content-based publish-subscribe paradigm makes it very appealing for dynamic wireless networks, like those that…”
    Get full text
    Conference Proceeding
  3. 3

    APC: access pass certificate distrust certification model for large access in pervasive environment by Saadi, R., Pierson, J.M., Brunie, L.

    “…The main future challenge of pervasive computing consists in offering access anywhere and anytime with any devices. However, before it becomes a reality, the…”
    Get full text
    Conference Proceeding
  4. 4

    Implementing Kilo-Instruction Multiprocessors by Vallejo, E., Galluzzi, M., Cristal, A., Vallejo, F., Beivide, R., Stenstrom, P., Smith, J.E., Valero, M.

    “…Multiprocessors are coming into wide-spread use in many application areas, yet there are a number of challenges to achieving a good tradeoff between complexity…”
    Get full text
    Conference Proceeding Publication
  5. 5

    A human-centered semantic navigation system for indoor environments by Tsetsos, V., Anagnostopoulos, C., Kikiras, P., Hasiotis, P., Hadjiefthymiades, S.

    “…In this paper we discuss the very important issue of indoor location services. Location services have been in use, and studied, for a long time in mobile…”
    Get full text
    Conference Proceeding
  6. 6

    Q-CAD: QoS and context aware discovery framework for mobile systems by Capra, L., Zachariadis, S., Mascolo, C.

    “…This paper presents Q-CAD, a resource discovery framework that enables pervasive computing applications to discover and select the resource(s) best satisfying…”
    Get full text
    Conference Proceeding
  7. 7

    Welcome

    “…Presents the welcome message from the conference proceedings…”
    Get full text
    Conference Proceeding
  8. 8

    Service-oriented architecture for a scalable videoconferencing system by Uyar, A., Wu, W., Bulut, H., Fox, G.

    “…The availability of increasing network bandwidth and computing power provides new opportunities for videoconferencing systems over Internet. Multimedia capable…”
    Get full text
    Conference Proceeding
  9. 9

    A fault localized scheme for false report filtering in sensor networks by Zhou, L., Ravishankar, C.V.

    “…Sensor networks frequently deploy many tiny and inexpensive devices over large regions to detect events of interest. It can be easy to compromise sensors,…”
    Get full text
    Conference Proceeding
  10. 10

    Efficient dynamic load balancing for multiple home agents in Mobile IPv6 based networks by Faizan, J., El-Rewini, H., Khalil, M.

    “…The current specification of Mobile IPv6 does not provide load balancing among multiple home agents on the home link. In this paper, we introduce a load…”
    Get full text
    Conference Proceeding
  11. 11

    A power-aware multimedia streaming protocol for mobile users by Anastasi, G., Passarella, A., Conti, M., Gregori, E., Pelusi, L.

    “…Smart environments are becoming popular and even more users are approaching their services through portable devices like PDAs, laptops, and mobile phones…”
    Get full text
    Conference Proceeding
  12. 12

    DJess - a context-sharing middleware to deploy distributed inference systems in pervasive computing domains by Cabitza, F., Sarini, M., Dal Seno, B.

    “…In this paper DJess is presented, a Java package that provides programmers with a lightweight middleware by which inference systems implemented in Jess and…”
    Get full text
    Conference Proceeding
  13. 13

    Context-awareness and personalisation in the Daidalos pervasive environment by Williams, M.H., Roussaki, I., Strimpakou, M., Yang, Y., MacKinnon, L., Dewar, R., Milyaev, N., Pils, C., Anagnostou, M.

    “…Context-awareness and personalisation are important concepts that are essential cornerstones in future systems providing pervasive services. These two concepts…”
    Get full text
    Conference Proceeding
  14. 14

    Resource allocation on the grid: the GRAPPA approach by Vassiliadis, S., Bertels, K.

    “…GRID of heterogeneous computing units is increasingly used to perform distributed computing operations where local resources are globally shared to perform…”
    Get full text
    Conference Proceeding
  15. 15

    Peer-based automatic configuration of pervasive applications by Handte, M., Becker, C., Rothermel, K.

    “…Pervasive computing envisions seamless support for user tasks through cooperating devices that are present in an environment. Fluctuating availability of…”
    Get full text
    Conference Proceeding
  16. 16

    BlueBot: asset tracking via robotic location crawling by Abhishek Patil, Munson, J., Wood, D., Cole, A.

    “…From manufacturers, distributors, and retailers of consumer goods to government departments, enterprises of all kinds are gearing up to use RFID technology to…”
    Get full text
    Conference Proceeding
  17. 17

    Dynamic deployment of pervasive services by Satoh, I.

    “…This paper presents a self-organizing approach to developing and managing distributed software in pervasive computing environments. In such environments,…”
    Get full text
    Conference Proceeding
  18. 18

    Trust and authorization in the grid: a recommendation model by Tran, H., Watters, P., Hitchens, M., Vijay Varadharajan

    “…Grids are popular mechanisms for resource exchange, but their pervasive, decentralized and loosely coupled characteristics make protecting services and…”
    Get full text
    Conference Proceeding
  19. 19

    Enabling attack behavior prediction in ubiquitous environments by Anagnostopoulos, T., Anagnostopoulos, C., Hadjiefthymiades, S.

    “…The pervasive computing paradigm has raised issues such as conceptual semantic descriptions and ambient management of information resources. The probabilistic…”
    Get full text
    Conference Proceeding
  20. 20

    Reliable file sharing scheme for mobile peer-to-peer users using epidemic selective caching by Mavromoustakis, C.X., Karatza, H.D.

    “…In the recent years, mobility is gaining popularity for non critical civilian applications. Hybrid and pervasive computing environments with billions of users,…”
    Get full text
    Conference Proceeding