Abstract is missing.
- Message from the Technical Program Chairs [doi]
- Message from the Workshop Co-Chairs [doi]
- Workshop Organization [doi]
- Workshop Organization [doi]
- Workshop Organization [doi]
- Message from the General Chairs [doi]
- Message from the Workshop Co-Chairs [doi]
- Message from the Workshop Chair [doi]
- Workshop Organization [doi]
- Workshop Organization [doi]
- Message from the Workshops Chairs [doi]
- Message from the Workshop Chair [doi]
- Message from the Workshop Co-Chairs [doi]
- Workshop Organization [doi]
- Workshop Organization [doi]
- Message from Workshop Co-Chairs [doi]
- Hybrid Context Model Based on Multilevel Situation Theory and Ontology for Contact CentersAnupama Kalyan, Srividya Gopalan, V. Sridhar. 3-7 [doi]
- A Metamodel Approach to Context InformationFlorian Fuchs, Iris Hochstatter, Michael Krause, Michael Berger. 8-14 [doi]
- RDF-Based Model for Context-Aware Reasoning in Rich Service EnvironmentJari Forstadius, Ora Lassila, Tapio Seppänen. 15-19 [doi]
- Extending Context Models for Privacy in Pervasive Computing EnvironmentsKaren Henricksen, Ryan Wishart, Ted McFadden, Jadwiga Indulska. 20-24 [doi]
- Benefits of Integrating Meta Data into a Context ModelNicola Hönle, Uwe-Philipp Käppeler, Daniela Nicklas, Thomas Schwarz, Matthias Großmann. 25-29 [doi]
- Towards Integrated Design of Context-Sensitive Interactive SystemsJan Van den Bergh, Karin Coninx. 30-34 [doi]
- Automatic Development of an Abstract Context Model for an Intelligent EnvironmentOliver Brdiczka, Patrick Reignier, James L. Crowley. 35-39 [doi]
- Mapping of File-Sharing onto Mobile Environments: Enhancement by UMTSTobias Hoßfeld, Kurt Tutschku, Frank-Uwe Andersen. 43-49 [doi]
- Energy Efficient Data Retrieval and Caching in Mobile Peer-to-Peer NetworksMary Suchitha Joseph, Mohan Kumar, Huaping Shen, Sajal K. Das. 50-54 [doi]
- A Lightweight Service Discovery Mechanism for Mobile Ad Hoc Pervasive Environment Using Cross-Layer DesignLi Li, Louise Lamont. 55-59 [doi]
- From Pastry to CrossROAD: CROSS-Layer Ring Overlay for AD Hoc NetworksFranca Delmastro. 60-64 [doi]
- Enabling Reliable Many-to-Many Communication in Ad-Hoc Pervasive EnvironmentsEinar Vollset, Paul D. Ezhilchelvan. 65-69 [doi]
- Every Node Is Born Equal: Attacking Preferential Attachment in Peer-to-Peer Mobile Multihop NetworksChansu Yu, Seung-Min Park, Heung-Nam Kim. 70-74 [doi]
- Pervasive Communication for Commuters in Public BusesTeck Meng Lim, Boon-Chong Seet, Bu-Sung Lee, Chai Kiat Yeo, Andreas Kassler. 75-79 [doi]
- A Mobile System of Super-Peers Using City BusesBoon-Chong Seet, Chiew Tong Lau, Wen-Jing Hsu, Bu-Sung Lee. 80-85 [doi]
- Mobile Chedar - A Peer-to-Peer Middleware for Mobile DevicesNiko Kotilainen, Matthieu Weber, Mikko Vapa, Juori Vuori. 86-90 [doi]
- Determination of Time and Order for Event-Based Middleware in Mobile Peer-to-Peer EnvironmentsEiko Yoneki, Jean Bacon. 91-96 [doi]
- Applying Active Space Principles to Active ClassroomsChad Peiper, David Warden, Ellick Chan, Roy H. Campbell, Sam Kamin, Tim L. Wentling. 97-102 [doi]
- Security Parallels between People and Pervasive DevicesStephen A. Weis. 105-109 [doi]
- A Scalable and Provably Secure Hash-Based RFID ProtocolGildas Avoine, Philippe Oechslin. 110-114 [doi]
- Toward Unlinkable ID Management for Multi-Service EnvironmentsYasunobu Nohara, Sozo Inoue, Hiroto Yasuura. 115-119 [doi]
- A Learning Model for Trustworthiness of Context-Awareness ServicesMarkus C. Huebscher, Julie A. McCann. 120-124 [doi]
- A Privacy Enhanced Service Architecture for Mobile UsersSandford Bessler, Oliver Jorns. 125-129 [doi]
- Privacy and Anonymity in Personal NetworksMartin Jacobsson, Ignas G. Niemegeers. 130-135 [doi]
- A Capability-Based Privacy-Preserving Scheme for Pervasive Computing EnvironmentsDivyan M. Konidala, Dang Nguyen Duc, Dongman Lee, Kwangjo Kim. 136-140 [doi]
- Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing DevicesDaniel C. Nash, Thomas L. Martin, Dong S. Ha, Michael S. Hsiao. 141-145 [doi]
- State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor NetworksGunnar Gaubatz, Jens-Peter Kaps, Erdinç Öztürk, Berk Sunar. 146-150 [doi]
- DocWeb: A Storage Abstraction for Wireless DevicesS. H. Srinivasan. 153-157 [doi]
- REDMAN: A Decentralized Middleware Solution for Cooperative Replication in Dense MANETsPaolo Bellavista, Antonio Corradi, Eugenio Magistretti. 158-162 [doi]
- A Thin Storage Architecture for WirelessS. H. Srinivasan. 163-167 [doi]
- Experiences with MundoCoreErwin Aitenbichler, Jussi Kangasharju, Max Mühlhäuser. 168-172 [doi]
- Communication Context for Adaptive Mobile ApplicationsArjan J. H. Peddemors, Henk Eertink, Ignas G. Niemegeers. 173-177 [doi]
- PDP and GSDL: A New Service Discovery Middleware to Support Spontaneous Interactions in Pervasive SystemsCeleste Campo, Mario Muñoz, Jose Carlos Perea, Andrés Marín López, Carlos García-Rubio. 178-182 [doi]
- Middleware for User Controlled EnvironmentsBill Keller, Tim Owen, Ian Wakeman, Julie Weeds, David J. Weir. 183-188 [doi]
- Design and Implementation of kubit for Sensing and Control Ubiquitous ApplicationsKiyohito Yoshihara, Shinji Motegi, Hiroki Horiuchi. 189-193 [doi]
- Towards a Pervasive Computing BenchmarkAnand Ranganathan, Jalal Al-Muhtadi, Jacob T. Biehl, Brian Ziebart, Roy H. Campbell, Brian P. Bailey. 194-198 [doi]
- Security Architecture for Service-Based Mobile EnvironmentsHeiko Kopp, Ulrike Lucke, Djamshid Tavangarian. 199-203 [doi]
- Media Distribution in a Pervasive Computing EnvironmentWinfried A. H. Berkvens, Arjan Claassen, Joep P. van Gassel, Alexander Sinitsyn. 204-208 [doi]
- Cascading Policies Provide Fault Tolerance for Pervasive Clinical CommunicationsRose Williams, Srikant Jalan, Edie Stern, Yves A. Lussier. 209-212 [doi]
- The Analysis of the Optimal Contention Period for Broadband Wireless Access NetworkSung-Min Oh, Jae-Hyun Kim. 215-219 [doi]
- Trading Latency for Energy in Wireless Ad Hoc Networks Using Message FerryingHyewon Jun, Wenrui Zhao, Mostafa H. Ammar, Ellen W. Zegura, Chungki Lee. 220-225 [doi]
- A Biologically Inspired Congestion Control Routing Algorithm for MANETsZhenyu Liu, Marta Z. Kwiatkowska, Costas C. Constantinou. 226-231 [doi]
- Experimental Evaluation of Ad Hoc Routing ProtocolsEleonora Borgia. 232-236 [doi]
- Shortcut Detection and Route Repair in Ad Hoc NetworksManel Guerrero Zapata. 237-242 [doi]
- Tunecast - Administratively Scoped Broadcast Received by Tuned ReceiversYang Woo Ko, Dongman Lee, Kyungran Kang. 243-247 [doi]
- Label Switched Multi-path Forwarding in Wireless Ad-Hoc NetworksHang Liu, Dipankar Raychaudhuri. 248-252 [doi]
- D2HT: Directory Federation Using DHT to Support Open Scalability in Ubiquitous NetworkKee-Hyun Choi, Ho-Jin Shin, Dong Ryeol Shin. 253-257 [doi]
- Routing Layer Support for Service Discovery in Mobile Ad Hoc NetworksChristopher N. Ververidis, George C. Polyzos. 258-262 [doi]
- Adaptive Location Management Scheme for Mobile IPHa Won Kim, Sung Je Hong, Jong Kim. 263-267 [doi]
- The Area Graph-Based Mobility Model and Its Impact on Data DisseminationSven Bittner, Wolf-Ulrich Raffel, Manuel Scholz. 268-272 [doi]
- Bayesian Based Location Estimation System Using Wireless LANSeigo Ito, Nobuo Kawaguchi. 273-278 [doi]
- Link Layer Security for SAHN ProtocolsMuhammad Mahmudul Islam, Ronald Pose, Carlo Kopp. 279-283 [doi]
- Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless NetworksDuncan S. Wong. 284-288 [doi]
- 3D Worlds for Edutainment: Educational, Relational and Organizational PrinciplesNicoletta Di Blas, Paolo Paolini, Caterina Poggi. 291-295 [doi]
- Interactive Pathway for Learning Design through Agent and Library Augmented Shared Knowledge Areas (ALASKA)Eric Hamilton, Ronald Cole, Wayne Ward, Chris DiGiano, Dave LaBine. 296-301 [doi]
- Extending LCMS for Remote Accessible Field Trips in RAFTMarcus Specht, Andreas Kaibel, Stefan Apelt. 302-306 [doi]
- Mobile Phones as a Challenge for m-Learning: Examples for Mobile Interactive Learning Objects (MILOs)Andreas Holzinger, Alexander K. Nischelwitzer, Matthias Meisenberger. 307-311 [doi]
- Securing Wireless Networks in a University EnvironmentJochen Eisinger, Peter Winterer, Bernd Becker. 312-316 [doi]
- CanCore: Best Practices for Learning Object Metadata in Ubiquitous Computing EnvironmentsNorm Friesen, Rory McGreal. 317-321 [doi]
- Re-Conceptualizing Learning Environments: A Framework for Pervasive eLearningReinhard Keil-Slawik, Thorsten Hampel, Bernd Eßmann. 322-326 [doi]
- Hoarding Content in M-Learning ContextAnna Trifonova, Marco Ronchetti. 327-331 [doi]
- Pervasive, Persuasive eLearning: Modeling the Pervasive Learning SpaceSiobhan Thomas. 332-336 [doi]
- Modeling Context-Aware e-Learning ScenariosMichael Derntl, Karin Anna Hummel. 337-342 [doi]
- Cooperative Packet Forwarding in Multi-Domain Sensor NetworksMárk Félegyházi, Jean-Pierre Hubaux, Levente Buttyán. 345-349 [doi]
- When Does Opportunistic Routing Make Sense?Rahul C. Shah, Sven Wiethölter, Adam Wolisz, Jan M. Rabaey. 350-356 [doi]
- Evaluating Routing-Related Energy Expenditure in Sensor NetworksStephan Olariu, Qingwen Xu, Ivan Stojmenovic. 357-361 [doi]
- Supporting Topographic Queries in a Class of Networked Sensor SystemsMitali Singh, Viktor K. Prasanna. 362-368 [doi]
- A Distributed System for Answering Range Queries on Sensor Network DataAlfredo Cuzzocrea, Filippo Furfaro, Sergio Greco, Elio Masciari, Giuseppe M. Mazzeo, Domenico Saccà. 369-373 [doi]
- Sensor Data Collection with Expected Reliability GuaranteesQi Han, Iosif Lazaridis, Sharad Mehrotra, Nalini Venkatasubramanian. 374-378 [doi]
- Autonomous Localization Method in Wireless Sensor NetworksYoshikazu Ohta, Masashi Sugano, Masayuki Murata. 379-384 [doi]
- A Framework for Intelligent Sensor Network with Video Camera for Structural Health Monitoring of BridgesArslan Basharat, Necati Catbas, Mubarak Shah. 385-389 [doi]
- MASTAQ: A Middleware Architecture for Sensor Applications with Statistical Quality ConstraintsInseok Hwang, Qi Han, Archan Misra. 390-395 [doi]
- Sentire: A Framework for Building Middleware for Sensor and Actuator NetworksJoel W. Branch, John S. Davis II, Daby M. Sow, Chatschik Bisdikian. 396-400 [doi]
- A Context-Aware Approach to Conserving Energy in Wireless Sensor NetworksSuan Khai Chong, Shonali Krishnaswamy, Seng Wai Loke. 401-405 [doi]
- Energy Efficient Differentiable Coverage Service Protocols for Wireless Sensor NetworksHidayet Ozgur Sanli, Hasan Çam. 406-410 [doi]
- Maneuverable Relays to Improve Energy Efficiency in Sensor NetworksStephan Eidenbenz, Lukas Kroc, James P. Smith. 411-417 [doi]