default search action
2nd PerCom Workshops 2004: Orlando, Florida, USA
- 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, USA. IEEE Computer Society 2004, ISBN 0-7695-2106-1
Workshop on Context Modeling and Reasoning - CoMoRea'04
- Keita Matsuyama, Michael Kraus, Kazuhiro Kitagawa, Nobuo Saito:
A Path-Based RDF Query Language for CC/PP and UAProf . 3-7 - Harish Kammanahalli, Srividya Gopalan, V. Sridhar, Krithi Ramamritham:
Context Aware Retrieval in Web-Based Collaborations. 8-12 - Jan Van den Bergh, Karin Coninx:
Contextual ConcurTaskTrees: Integrating dynamic contexts in task based design. 13-17 - Xiaohang Wang, Daqing Zhang, Tao Gu, Hung Keng Pung:
Ontology Based Context Modeling and Reasoning using OWL. 18-22 - Tobias Zimmer:
Towards a Better Understanding of Context Attributes. 23-27 - Ghita Kouadri Mostéfaoui, Patrick Brézillon:
Modeling Context-Based Security Policies with Contextual Graphs. 28-32 - Karen Henricksen, Jadwiga Indulska:
Modelling and Using Imperfect Context Information. 33-37 - Amir Padovitz, Seng Wai Loke, Arkady B. Zaslavsky:
Towards a Theory of Context Spaces. 38-42 - Sven Buchholz, Thomas Hamann, Gerald Hübsch:
Comprehensive Structured Context Profiles (CSCP): Design and Experiences. 43-47 - Thomas Schwarz, Nicola Hönle, Matthias Großmann, Daniela Nicklas:
A Library for Managing Spatial Context Using Arbitrary Coordinate Systems. 48-54
Workshop on Mobile Peer-to-Peer Computing - MP2P'04
- Derek Greene, Donal O'Mahony:
Instant Messaging & Presence Management in Mobile Ad-Hoc Networks. 55-59 - Christian Seitz, Michael Berger, Bernhard Bauer:
MPDG - Mobile Profile based Distributed Grouping. 60-64 - Jing Zheng, Yijie Wang, Xicheng Lu, Kan Yang:
A Dynamic Adaptive Replica Allocation Algorithm in Mobile Ad Hoc Networks. 65-69 - Jean-Luc Meunier:
Peer-to-Peer Determination of Proximity Using Wireless Network Data. 70-74 - Steffen Blödt:
Efficient End System Multicast for Mobile Ad Hoc Networks. 75-80 - Abdulrahman H. Altalhi, Golden G. Richard III:
Virtual Paths Routing: A Highly Dynamic Routing Protocol for Ad Hoc Wireless Networks. 81-86 - Ahmed Abd El Al, Tarek N. Saadawi, Myung J. Lee:
A Transport Layer Load Sharing Mechanism for Mobile Wireless Hosts. 87-91 - Eiko Yoneki, Jean Bacon:
An Adaptive Approach to Content-Based Subscription in Mobile Ad Hoc Networks. 92-97 - Akira Kanamaru, Yoshitsugu Tsuchiya, Tomohiro Fujisaki, Kenji Takahashi:
Fieldcast2: Flexible P2P architecture for presence information sharing. 98-103 - Gang Ding, Bharat K. Bhargava:
Peer-to-peer File-sharing over Mobile Ad hoc Networks. 104-108 - Marco Conti, Enrico Gregori, Giovanni Turi:
Towards Scalable P2P Computing for Mobile Ad Hoc Networks. 109-116
Workshop on Pervasive Computing and Communications Security - PerSec'04
- Kumar Ranganathan:
Trustworthy Pervasive Computing: The Hard Security Problems. 117-121 - Laurent Bussard, Yves Roudier, Refik Molva:
Untraceable Secret Credentials: Trust Establishment with Privacy. 122-126 - Alastair R. Beresford, Frank Stajano:
Mix Zones: User Privacy in Location-aware Services. 127-131 - Chris Wullems, Mark Looi, Andrew J. Clark:
Towards Context-aware Security: An Authorization Architecture for Intranet Environments. 132-137 - Ari Juels:
"Yoking-Proofs" for RFID Tags. 138-143 - Reiner Sailer, James Giles:
Pervasive Authentication Domains for Automatic Pervasive Device Authorization. 144-148 - Dirk Henrici, Paul Müller:
Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. 149-153 - Patrick Brézillon, Ghita Kouadri Mostéfaoui:
Context-Based Security Policies: A New Modeling Approach. 154-158 - Anand R. Tripathi, Tanvir Ahmed, Devdatta Kulkarni, Richa Kumar, Komal Kashiramka:
Context-Based Secure Resource Access in Pervasive Computing Environments. 159-163 - Roshan K. Thomas, Ravi S. Sandhu:
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions. 164-170
Workshop on Middleware Support for Pervasive Computing - PerWare'04
- Philippe Debaty:
A Toolkit To Design Adaptable User Interfaces in Ubiquitous Computing Environments. 171-175 - Mohammed Waleed Kadous, Claude Sammut:
MICA: Pervasive Middleware for Learning, Sharing and Talking. 176-180 - Norbert Luttenberger, Florian Reuter, Jochen Koberstein:
XML Language Binding Support for Pervasive Communication in Distributed Virtual Shared Information Spaces. 181-186 - Mejdi Kaddour, Laurent Pautet:
A Middleware for Supporting Disconnections and Multi-Network Access in Mobile Environments. 187-191 - Eila Niemelä, Teemu Vaskivuo:
Agile Middleware of Pervasive Computing Environments. 192-197 - Jalal Al-Muhtadi, Shiva Chetan, Anand Ranganathan, Roy H. Campbell:
Super Spaces: A Middleware for Large-Scale Pervasive Computing Environments. 198-202 - Willem Fontijn, Peter A. Boncz:
AmbientDB: P2P Data Management Middleware for Ambient Intelligence. 203-207 - Alexander Sinitsyn:
A Synchronization Framework for Personal Mobile Servers. 208-212 - Kay Connelly, Ashraf Khalil:
On Negotiating Automatic Device Configuration in Smart Environments. 213-218 - Sergio Maffioletti, Soraya Kouadri Mostéfaoui, Béat Hirsbrunner:
Automatic Resource and Service Management for Ubiquitous Computing Environments. 219-226
Workshop on Pervasive Computing Education - PerEd'04
- Gregory D. Abowd, Gaetano Borriello, Gerd Kortuem:
Ubicomp Education: Current Status and Future Directions. 227-230 - Elizabeth M. Belding-Royer:
Escape from the Computer Lab: Education in Mobile Wireless Networks. 231-235 - Chad Peiper, Ellick Chan, Roy H. Campbell, Jim Bresler, Jalal Al-Muhtadi:
Expanding Education through Active Space Collaboration. 236-240 - Luiz A. DaSilva, Scott F. Midkiff, Ing-Ray Chen:
A Hands-on Course on Wireless and Mobile Systems Design. 241-246 - Sandeep K. S. Gupta:
Anatomy of a Graduate Ubiquitous/Pervasive Computing Course. 247-251 - Thomas L. Martin:
Experiences Teaching a Course on Wearable and Ubiquitous Computing. 252-256 - D. Scott McCrickard, Christa M. Chewar:
Proselytizing Pervasive Computing Education: A Strategy and Approach Influenced by Human-Computer Interaction. 257-262
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.