default search action
Pervasive and Mobile Computing, Volume 4
Volume 4, Number 1, February 2008
- Sajal K. Das, Marco Conti:
Editorial. 1-2
- Marcel Busse, Thomas Haenselmann, Wolfgang Effelsberg:
Energy-efficient forwarding in wireless sensor networks. 3-32 - Swaroop Venkatesh, R. Michael Buehrer:
Multiple-access insights from bounds on sensor localization. 33-61 - Franca Delmastro, Andrea Passarella, Marco Conti:
P2P multicast for pervasive ad hoc networks. 62-91
- Abraham George, Anup Kumar, Dave Cavalcanti, Dharma P. Agrawal:
Protocols for mobility management in heterogeneous multi-hop wireless networks. 92-116 - Paolo Bellavista, Cesare Stefanelli, Mauro Tortonesi:
QoS management middleware solutions for Bluetooth audio distribution. 117-138 - Weigang Wu, Jiannong Cao, Jin Yang:
A fault tolerant mutual exclusion algorithm for mobile ad hoc networks. 139-160
Volume 4, Number 2, April 2008
- Enrico Rukzio, Chie Noda, Alexander De Luca, John Hamard, Fatih Coskun:
Automatic form filling on mobile devices. 161-181 - Amir Padovitz, Seng Wai Loke, Arkady B. Zaslavsky:
The ECORA framework: A hybrid architecture for context-oriented pervasive computing. 182-215 - Guanling Chen, Ming Li, David Kotz:
Data-centric middleware for context-aware pervasive computing. 216-253 - Sandeep Gupta, Jinfeng Ni, Chinya V. Ravishankar:
Efficient data dissemination using locale covers. 254-275
Volume 4, Number 3, June 2008
- Sajal K. Das, Marco Conti:
Editorial. 277 - Dipankar Raychaudhuri, Xiangpeng Jing, Ivan Seskar, Khanh Le, Joseph B. Evans:
Cognitive radio technology: From distributed spectrum coordination to adaptive network collaboration. 278-302 - Amitabha Amitava Ghosh, Sajal K. Das:
Coverage and connectivity issues in wireless sensor networks: A survey. 303-334
- Danyu Zhu, Matt W. Mutka:
Cooperation among peers in an ad hoc network to support an energy efficient IM service. 335-359 - Dionysis Athanasopoulos, Apostolos V. Zarras, Valérie Issarny, Evaggelia Pitoura, Panos Vassiliadis:
CoWSAMI: Interface-aware context gathering in ambient intelligence environments. 360-389 - Dave Cavalcanti, Nagesh Nandiraju, Deepti S. Nandiraju, Dharma P. Agrawal, Anup Kumar:
Connectivity opportunity selection in heterogeneous wireless multi-hop networks. 390-420 - Christian Frank, Philipp Bolliger, Friedemann Mattern, Wolfgang Kellerer:
The sensor internet at work: Locating everyday items using mobile phones. 421-447 - Alois Ferscha, Manfred Hechinger, Andreas Riener, Marcos dos Santos Rocha, Andreas Zeidler, Marquart Franz, René Mayrhofer:
Peer-it: Stick-on solutions for networks of things. 448-479
Volume 4, Number 4, August 2008
- Jon Robinson, Ian Wakeman, Dan Chalmers:
Composing software services in the pervasive computing environment: Languages or APIs? 481-505 - Marco Aiello, Schahram Dustdar:
Are our homes ready for services? A domotic infrastructure based on the Web service stack. 506-525 - Javed I. Khan, Sandeep Davu, Raid Zaghal:
High performance mobility without agent infrastructure for connection oriented service. 526-545 - Tarek Hassan, Ayman I. Kayssi, Ali Chehab:
Ring of Masters (ROM): A new ring structure for Bluetooth scatternets with dynamic routing and adaptive scheduling schemes. 546-561 - Anindo Mukherjee, Anurag Gupta, Dharma P. Agrawal:
Distributed key management for dynamic groups in MANETs. 562-578
Volume 4, Number 5, October 2008
- Mikko Juhani Pitkänen, Jörg Ott:
Enabling opportunistic storage for mobile DTNs. 579-594 - Giuseppe Bianchi, Sunghyun Choi:
Preface. 595-596 - Furuzan Atay Onat, Ivan Stojmenovic, Halim Yanikomeroglu:
Generating random graphs for the simulation of wireless ad hoc, actuator, sensor, and internet networks. 597-615 - M. S. Sricharan, Vaidehi V.:
A pragmatic analysis of user mobility patterns in macrocellular wireless networks. 616-632 - Chiara Boldrini, Marco Conti, Andrea Passarella:
Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution. 633-657 - Wei Zhang, Yonghe Liu, Sajal K. Das, Pradip De:
Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach. 658-680 - Sasu Tarkoma:
Dynamic filter merging and mergeability detection for publish/subscribe. 681-696 - Claudio Bettini, Linda Pareschi, Daniele Riboni:
Efficient profile aggregation and policy evaluation in a middleware for adaptive mobile applications. 697-718 - Cormac Driver, Siobhán Clarke:
An application framework for mobile, context-aware trails. 719-736 - Christos Doulkeridis, Michalis Vazirgiannis:
CASD: Management of a context-aware service directory. 737-754 - Vasileios Baousis, Miltiadis Kyriakakos, Stathes Hadjiefthymiades, Lazaros F. Merakos:
Performance evaluation of a mobile agent-based platform for ubiquitous service provision. 755-774 - Wei-Shinn Ku, Roger Zimmermann:
Nearest neighbor queries with peer-to-peer data sharing in mobile environments. 775-788
Volume 4, Number 6, December 2008
- Matt W. Mutka, Christian Becker, Anind K. Dey, Francis Chi-Moon Lau, Gergely V. Záruba:
PerCom 2008 special issue. 789-790 - Justin Mazzola Paluska, Hubert Pham, Umar Saif, Grace Chau, Chris Terman, Steve Ward:
Structured decomposition of adaptive applications. 791-806 - Ghaith Hammouri, Erdinç Öztürk, Berk Sunar:
A tamper-proof and lightweight authentication scheme. 807-818 - Daniele Riboni, Linda Pareschi, Claudio Bettini:
Shadow attacks on users' anonymity in pervasive computing environments. 819-835 - Nattapong Swangmuang, Prashant Krishnamurthy:
An effective location fingerprint model for wireless indoor localization. 836-850 - David J. Yates, Erich M. Nahum, James F. Kurose, Prashant J. Shenoy:
Data quality and query cost in pervasive sensing systems. 851-870 - Alan Messer, Anugeetha Kunjithapatham, Phuong Nguyen, Priyang Rathod, Mithun Sheshagiri, Doreen Cheng, Simon Gibbs:
SeeNSearch: A context directed search facilitator for home entertainment devices. 871-888 - Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo:
A cross-layer framework for privacy enhancement in RFID systems. 889-905
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.