Journal: Pervasive and Mobile Computing

Volume 2, Issue 4

369 -- 371Marco Conti, Chatschik Bisdikian, Jadwiga Indulska, Franco Zambonelli. PerCom 2006 special issue
372 -- 404Sajal K. Das, Nirmalya Roy, Abhishek Roy. Context-aware resource management in multi-inhabitant smart homes: A framework based on Nash H
405 -- 426Melanie R. Rieback, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum. RFID malware: Design principles and examples
427 -- 452Urs Hengartner, Peter Steenkiste. Avoiding privacy violations caused by context-sensitive services
453 -- 471Andrew C. Rice, Robert K. Harle, Alastair R. Beresford. Analysing fundamental properties of marker-based vision system designs
472 -- 488Francisco J. Ballesteros, Enrique Soriano, Gorka Guardiola, Katia Leal. The Plan B OS for ubiquitous computing. Voice control, security, and terminals as case studies

Volume 2, Issue 3

233 -- 261Nicolas Montavont, Thomas Noël. Stronger interaction between link layer and network layer for an optimized mobility management in heterogeneous IPv6 networks
262 -- 285Venkata C. Giruka, Mukesh Singhal. Two scalable location service protocols for wireless ad hoc networks
286 -- 299Yuan-Ying Hsu, Yu-Chee Tseng, Chien-Chao Tseng, Chi-Fu Huang, Jung-Hsuan Fan, Hsiao-Lu Wu. Design and implementation of two-tier MANETs with seamless roaming and load-balancing routing capability
300 -- 312An-Pin Chen, Tien-Hwa Ho. Location Aided Mobile Peer-to-Peer system
313 -- 343Mijeom Kim, Mohan Kumar, Behrooz Shirazi. Service discovery using volunteer nodes in heterogeneous pervasive computing environments
344 -- 367Urs Hengartner, Peter Steenkiste. Exploiting information relationships for access control in pervasive computing

Volume 2, Issue 2

109 -- 110Mukesh Singhal, Ali R. Hurson. Guest Editors Note
111 -- 136Bin Xie, Anup Kumar, Dharma P. Agrawal, S. Srinivasan. Secured macro/micro-mobility protocol for multi-hop cellular IP
137 -- 158Afrand Agah, Kalyan Basu, Sajal K. Das. Security enforcement in wireless sensor networks: A framework based on non-cooperative games
159 -- 186Jing Deng, Richard Han, Shivakant Mishra. Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
187 -- 203Jiannong Cao, Lin Liao, Guojun Wang. Scalable key management for secure multicast communication in the mobile environment
204 -- 231Phongsak Keeratiwintakorn, Prashant Krishnamurthy. An energy efficient security protocol for IEEE 802.11 WLANs

Volume 2, Issue 1

1 -- 36Jeff Burke, Jonathan Friedman, Eitan Mendelowitz, Heemin Park, Mani B. Srivastava. Embedding expression: Pervasive computing architecture for art and entertainment
37 -- 64Karen Henricksen, Jadwiga Indulska. Developing context-aware pervasive computing applications: Models and approach
65 -- 84Atul Verma, Hemjit Sawant, Jindong Tan. Selection and navigation of mobile sensor nodes using a sensor network
85 -- 107Ali R. Hurson, Angela Maria Muñoz-Avila, Neil Orchowski, Behrooz Shirazi, Yu Jiao. Power-aware data retrieval protocols for indexed broadcast parallel channels