Abstract is missing.
- A Path-Based RDF Query Language for CC/PP and UAProf Keita Matsuyama, Michael Kraus, Kazuhiro Kitagawa, Nobuo Saito. 3-7 [doi]
- Context Aware Retrieval in Web-Based CollaborationsHarish Kammanahalli, Srividya Gopalan, V. Sridhar, Krithi Ramamritham. 8-12 [doi]
- Contextual ConcurTaskTrees: Integrating dynamic contexts in task based designJan Van den Bergh, Karin Coninx. 13-17 [doi]
- Ontology Based Context Modeling and Reasoning using OWLXiaohang Wang, Daqing Zhang, Tao Gu, Hung Keng Pung. 18-22 [doi]
- Towards a Better Understanding of Context AttributesTobias Zimmer. 23-27 [doi]
- Modeling Context-Based Security Policies with Contextual GraphsGhita Kouadri Mostéfaoui, Patrick Brézillon. 28-32 [doi]
- Modelling and Using Imperfect Context InformationKaren Henricksen, Jadwiga Indulska. 33-37 [doi]
- Towards a Theory of Context SpacesAmir Padovitz, Seng Wai Loke, Arkady B. Zaslavsky. 38-42 [doi]
- Comprehensive Structured Context Profiles (CSCP): Design and ExperiencesSven Buchholz, Thomas Hamann, Gerald Hübsch. 43-47 [doi]
- A Library for Managing Spatial Context Using Arbitrary Coordinate SystemsThomas Schwarz, Nicola Hönle, Matthias Großmann, Daniela Nicklas. 48-54 [doi]
- Instant Messaging & Presence Management in Mobile Ad-Hoc NetworksDerek Greene, Donal O Mahony. 55-59 [doi]
- MPDG - Mobile Profile based Distributed GroupingChristian Seitz, Michael Berger, Bernhard Bauer. 60-64 [doi]
- A Dynamic Adaptive Replica Allocation Algorithm in Mobile Ad Hoc NetworksJing Zheng, Yijie Wang, Xicheng Lu, Kan Yang. 65-69 [doi]
- Peer-to-Peer Determination of Proximity Using Wireless Network DataJean-Luc Meunier. 70-74 [doi]
- Efficient End System Multicast for Mobile Ad Hoc NetworksSteffen Blödt. 75-80 [doi]
- Virtual Paths Routing: A Highly Dynamic Routing Protocol for Ad Hoc Wireless NetworksAbdulrahman H. Altalhi, Golden G. Richard III. 81-86 [doi]
- A Transport Layer Load Sharing Mechanism for Mobile Wireless HostsAhmed Abd El Al, Tarek N. Saadawi, Myung J. Lee. 87-91 [doi]
- An Adaptive Approach to Content-Based Subscription in Mobile Ad Hoc NetworksEiko Yoneki, Jean Bacon. 92-97 [doi]
- Fieldcast2: Flexible P2P architecture for presence information sharingAkira Kanamaru, Yoshitsugu Tsuchiya, Tomohiro Fujisaki, Kenji Takahashi. 98-103 [doi]
- Peer-to-peer File-sharing over Mobile Ad hoc NetworksGang Ding, Bharat K. Bhargava. 104-108 [doi]
- Towards Scalable P2P Computing for Mobile Ad Hoc NetworksMarco Conti, Enrico Gregori, Giovanni Turi. 109-116 [doi]
- Trustworthy Pervasive Computing: The Hard Security ProblemsKumar Ranganathan. 117-121 [doi]
- Untraceable Secret Credentials: Trust Establishment with PrivacyLaurent Bussard, Yves Roudier, Refik Molva. 122-126 [doi]
- Mix Zones: User Privacy in Location-aware ServicesAlastair R. Beresford, Frank Stajano. 127-131 [doi]
- Towards Context-aware Security: An Authorization Architecture for Intranet EnvironmentsChris Wullems, Mark Looi, Andrew Clark. 132-137 [doi]
- Yoking-Proofs for RFID TagsAri Juels. 138-143 [doi]
- Pervasive Authentication Domains for Automatic Pervasive Device AuthorizationReiner Sailer, James Giles. 144-148 [doi]
- Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying IdentifiersDirk Henrici, Paul Müller. 149-153 [doi]
- Context-Based Security Policies: A New Modeling ApproachPatrick Brézillon, Ghita Kouadri Mostéfaoui. 154-158 [doi]
- Context-Based Secure Resource Access in Pervasive Computing EnvironmentsAnand R. Tripathi, Tanvir Ahmed, Devdatta Kulkarni, Richa Kumar, Komal Kashiramka. 159-163 [doi]
- Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research DirectionsRoshan K. Thomas, Ravi S. Sandhu. 164-170 [doi]
- A Toolkit To Design Adaptable User Interfaces in Ubiquitous Computing EnvironmentsPhilippe Debaty. 171-175 [doi]
- MICA: Pervasive Middleware for Learning, Sharing and TalkingMohammed Waleed Kadous, Claude Sammut. 176-180 [doi]
- XML Language Binding Support for Pervasive Communication in Distributed Virtual Shared Information SpacesNorbert Luttenberger, Florian Reuter, Jochen Koberstein. 181-186 [doi]
- A Middleware for Supporting Disconnections and Multi-Network Access in Mobile EnvironmentsMejdi Kaddour, Laurent Pautet. 187-191 [doi]
- Agile Middleware of Pervasive Computing EnvironmentsEila Niemelä, Teemu Vaskivuo. 192-197 [doi]
- Super Spaces: A Middleware for Large-Scale Pervasive Computing EnvironmentsJalal Al-Muhtadi, Shiva Chetan, Anand Ranganathan, Roy H. Campbell. 198-202 [doi]
- AmbientDB: P2P Data Management Middleware for Ambient IntelligenceWillem Fontijn, Peter A. Boncz. 203-207 [doi]
- A Synchronization Framework for Personal Mobile ServersAlexander Sinitsyn. 208-212 [doi]
- On Negotiating Automatic Device Configuration in Smart EnvironmentsKay Connelly, Ashraf Khalil. 213-218 [doi]
- Automatic Resource and Service Management for Ubiquitous Computing EnvironmentsS. Maffioletti, Soraya Kouadri Mostéfaoui, Béat Hirsbrunner. 219-226 [doi]
- Ubicomp Education: Current Status and Future DirectionsGregory D. Abowd, Gaetano Borriello, Gerd Kortuem. 227-230 [doi]
- Escape from the Computer Lab: Education in Mobile Wireless NetworksElizabeth M. Belding-Royer. 231-235 [doi]
- Expanding Education through Active Space CollaborationChad Peiper, Ellick Chan, Roy H. Campbell, Jim Bresler, Jalal Al-Muhtadi. 236-240 [doi]
- A Hands-on Course on Wireless and Mobile Systems DesignLuiz A. DaSilva, Scott F. Midkiff, Ing-Ray Chen. 241-246 [doi]
- Anatomy of a Graduate Ubiquitous/Pervasive Computing CourseS. K. S. Gupta. 247-251 [doi]
- Experiences Teaching a Course on Wearable and Ubiquitous ComputingThomas L. Martin. 252-256 [doi]
- Proselytizing Pervasive Computing Education: A Strategy and Approach Influenced by Human-Computer InteractionD. Scott McCrickard, Christa M. Chewar. 257-262 [doi]