Journal: Int. J. Pervasive Computing and Communications

Volume 12, Issue 4

394 -- 407Yahya M. Tashtoush, Mohammad A. Alsmirat, Tasneem Alghadi. Geometric sequence based multipath routing protocol for multi-hop ad hoc networks
408 -- 420Atish Dipakbhai Nayak, Rajesh Bansode. Performance analysis and evaluation of secure password persuasive cued click points
421 -- 446Hassan Sbeyti, Beatrice El Hage, Ahmad Fadlallah. Mobile user signature extraction based on user behavioural pattern (MUSEP)
447 -- 465Rachana Borawake-Satao, Rajesh Prasad. Comprehensive survey on effect of mobility over routing issues in wireless multimedia sensor networks
466 -- 502Fatma Achour, Anis Jedidi, Faïez Gargouri. Semantic Web service and pervasive information system conceptual adaptation
503 -- 522Nawaf Alharbe, Anthony S. Atkins. Transforming to a smart hospital system: Proposed application in the Medina Maternity and Children's Hospital

Volume 12, Issue 3

290 -- 309Djamel Guessoum, Moeiz Miraoui, Chakib Tadj. Contextual location prediction using spatio-temporal clustering
310 -- 331Harshvardhan Jitendra Pandit, Adrian O'Riordan. A model for contextual data sharing in smartphone applications
332 -- 351Nacha Chondamrongkul. Model-driven framework to support evolution of mobile applications in multi-cloud environments
352 -- 374Chirihane Gherbi, Zibouda Aliouat, Mohamed Benmohammed. Using adaptive clustering scheme with load balancing to enhance energy efficiency and reliability in delay tolerant with QoS in large-scale mobile wireless sensor networks
375 -- 390Aisha Aseeri, Omaimah Bamasag. Achieving protection against man-in-the-middle attack in HB family protocols implemented in RFID tags

Volume 12, Issue 2

174 -- 193Sihem Cherif, Raoudha Ben Djemaa, Ikram Amous. A user-aware approach for describing and publishing context aware composite Web service
194 -- 215Cátia Raminhos, Ana Paula Cláudio, Maria Beatriz Carmo, Augusta Gaspar, Susana Carvalhosa, Maria de Jesus Candeias. A serious game-based solution to prevent bullying
216 -- 259Ema Kusen, Mark Strembeck. A decade of security research in ubiquitous computing: results of a systematic literature review
260 -- 288Hajar Mousannif, Hasna Sabah, Yasmina Douiji, Younes Oulad Sayad. Big data projects: just jump right in!

Volume 12, Issue 1

2 -- 22Dominik Gruntz, Christof Arnosti, Marco Hauri. MOONACS: a mobile on-/offline NFC-based physical access control system
23 -- 48Jungkyu Han, Hayato Yamana. A study on individual mobility patterns based on individuals' familiarity to visited areas
49 -- 65Long Niu, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura. WIF4InL: Web-based integration framework for Indoor location
66 -- 86Maria Torres Vega, Vittorio Sguazzo, Decebal Constantin Mocanu, Antonio Liotta. An experimental survey of no-reference video quality assessment methods
87 -- 106Ruiwei Shen, Tsutomu Terada, Masahiko Tsukamoto. A method for controlling crowd flow by changing recommender information on navigation application
107 -- 126Anneke Soraya Hidayat, Gil-Je Lee, Eun-Jun Yoon, Kee-Young Yoo. An in-depth analysis of strong t-consistency on secret image sharing
127 -- 153Pin Shen Teh, Ning Zhang, Andrew Beng Jin Teoh, Ke Chen. TDAS: a touch dynamics based multi-factor authentication solution for mobile devices
154 -- 172Hiroki Takatsuka, Seiki Tokunaga, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura. KULOCS: unified locating service for efficient development of location-based applications