Abstract is missing.
- Severless Search and Authentication Protocols for RFIDChiu Chiang Tan, Bo Sheng, Qun Li. 3-12 [doi]
- Dynamic Key-Updating: Privacy-Preserving Authentication for RFID SystemsLi Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. Ni. 13-22 [doi]
- Energy-Aware Tag Anti-Collision Protocols for RFID SystemsVinod Namboodiri, Lixin Gao. 23-36 [doi]
- Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag ArraysYunhao Liu, Lei Chen 0002, Jian Pei, Qiuxia Chen, Yiyang Zhao. 37-46 [doi]
- BlueTorrent: Cooperative Content Sharing for Bluetooth UsersSewook Jung, Uichin Lee, Alexander Chang, Dae-Ki Cho, Mario Gerla. 47-56 [doi]
- A Local Data Abstraction and Communication Paradigm for Pervasive ComputingSanem Kabadayi, Christine Julien. 57-68 [doi]
- The RUNES Middleware for Networked Embedded Systems and its Application in a Disaster Management ScenarioPaolo Costa, Geoff Coulson, Richard Gold, Manish Lad, Cecilia Mascolo, Luca Mottola, Gian Pietro Picco, Thirunavukkarasu Sivaharan, Nirmal Weerasinghe, Stefanos Zachariadis. 69-78 [doi]
- Designing Ubiquitous Computing Systems for Sports EquipmentMatthias Kranz, Wolfgang Spiessl, Albrecht Schmidt. 79-86 [doi]
- Macro Programming through Bayesian Networks: Distributed Inference and Anomaly DetectionMarco Mamei, Radhika Nagpal. 87-96 [doi]
- Methods and Guidelines for the Design and Development of Domestic Ubiquitous Computing ApplicationsAlbrecht Schmidt, Lucia Terrenghi. 97-107 [doi]
- Supporting Domain Experts in Creating Pervasive ExperiencesMark J. Weal, Don Cruickshank, Danius T. Michaelides, Katherine Howland, Geraldine Fitzpatrick. 108-113 [doi]
- An Aspect-Oriented Approach to the Modularisation of ContextJennifer Munnelly, Serena Fritsch, Siobhán Clarke. 114-124 [doi]
- The SkyLoc Floor Localization SystemAlex Varshavsky, Anthony LaMarca, Jeffrey Hightower, Eyal de Lara. 125-134 [doi]
- An RF-Based System for Tracking Transceiver-Free ObjectsDian Zhang, Jian Ma, Quanbin Chen, Lionel M. Ni. 135-144 [doi]
- Overhearing the Wireless Interface for 802.11-Based Positioning SystemsThomas King, Thomas Haenselmann, Stephan Kopf, Wolfgang Effelsberg. 145-150 [doi]
- A Scalable Geographic Service Provision Framework for Mobile Ad Hoc NetworksXiaojing Xiang, Xin Wang. 151-160 [doi]
- A Wall-Sized Focus Plus Context DisplaySebastian Boring, Otmar Hilliges, Andreas Butz. 161-170 [doi]
- A Capacitive Sensing Toolkit for Pervasive Activity Detection and RecognitionRaphael Wimmer, Matthias Kranz, Sebastian Boring, Albrecht Schmidt. 171-180 [doi]
- Using Digital Cameras for Text Input on Mobile DevicesFrank Siegemund, Muhammad Haroon. 181-190 [doi]
- Securing Distributed Data Storage and Retrieval in Sensor NetworksNalin Subramanian, Chanjun Yang, Wensheng Zhang. 191-200 [doi]
- SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc NetworksWenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee. 201-210 [doi]
- Physically Unclonable Function-Based Security and Privacy in RFID SystemsLeonid Bolotnyy, Gabriel Robins. 211-220 [doi]
- Structural Learning of Activities from Sparse DatasetsFahd Albinali, Nigel Davies, Adrian Friday. 221-228 [doi]
- A Simple Model and Infrastructure for Context-Aware Browsing of the WorldGabriella Castelli, Alberto Rosi, Marco Mamei, Franco Zambonelli. 229-238 [doi]
- Achieving Flexible Cache Consistency for Pervasive Internet AccessYu Huang 0002, Jiannong Cao, Zhijun Wang, Beihong Jin, Yulin Feng. 239-250 [doi]
- Automatic Generation of Device User-Interfaces?Olufisayo Omojokun, Prasun Dewan. 251-261 [doi]
- Supporting Mobile Service Usage through Physical Mobile InteractionGregor Broll, Sven Siorpaes, Enrico Rukzio, Massimo Paolucci, John Hamard, Matthias Wagner, Albrecht Schmidt. 262-271 [doi]
- SHAD: A Human-Centered Security Architecture for the Plan B Operating SystemEnrique Soriano, Francisco J. Ballesteros, Gorka Guardiola Muzquiz. 272-282 [doi]