Abstract is missing.
- Structured Decomposition of Adaptive ApplicationsJustin Mazzola Paluska, Hubert Pham, Umar Saif, Grace Chau, Chris Terman, Steve Ward. 1-10 [doi]
- Protecting Users Anonymity in Pervasive Computing EnvironmentsLinda Pareschi, Daniele Riboni, Claudio Bettini. 11-19 [doi]
- SeeNSearch: A Context Directed Search Facilitator for Home Entertainment DevicesAlan Messer, Anugeetha Kunjithapatham, Phuong Nguyen, Priyang Rathod, Mithun Sheshagiri, Doreen Cheng, Simon Gibbs. 20-29 [doi]
- Cardinality Estimation for Large-scale RFID SystemsChen Qian, Hoilun Ngan, Yunhao Liu. 30-39 [doi]
- Randomized Bit Encoding for Stronger Backward Channel Protection in RFID SystemsTong-Lee Lim, Tieyan Li, Sze-Ling Yeo. 40-49 [doi]
- Providing Security and Privacy in RFID Systems Using Triggered Hash ChainsDirk Henrici, Paul Müller. 50-59 [doi]
- ReMo : An Energy Efficient Reprogramming Protocol for Mobile Sensor NetworksPradip De, Yonghe Liu, Sajal K. Das. 60-69 [doi]
- IP Address Passing for VANETsTodd Arnold, Wyatt Lloyd, Jing Zhao, Guohong Cao. 70-79 [doi]
- On-demand Video Streaming in Mobile Opportunistic NetworksHayoung Yoon, JongWon Kim, Feiselia Tan, Robert Hsieh. 80-89 [doi]
- Exploiting Environmental Properties for Wireless Localization and Location Aware ApplicationsShu Chen, Yingying Chen, Wade Trappe. 90-99 [doi]
- Location Fingerprint Analyses Toward Efficient Indoor PositioningNattapong Swangmuang, Prashant Krishnamurthy. 100-109 [doi]
- Hyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength (concise contribution)Mikkel Baun Kjærgaard, Carsten Valdemar Munk. 110-116 [doi]
- An Off-line Algorithm to Estimate Trajectories of Mobile Nodes Using Ad-hoc Communication (concise contribution)Sae Fujii, Akira Uchiyama, Takaaki Umedu, Hirozumi Yamaguchi, Teruo Higashino. 117-124 [doi]
- Efficient Retargeting of Generated Device User-InterfacesOlufisayo Omojokun, Prasun Dewan. 125-134 [doi]
- MyNet: A Platform for Secure P2P Personal and Social Networking ServicesDimitris N. Kalofonos, Zoe Antoniou, Franklin Reynolds, Max Van Kleek, Jacob Strauss, Paul Wisner. 135-146 [doi]
- Speech Siglet Detection for Business Microscope (concise contribution)Jun Nishimura, Nobuo Sato, Tadahiro Kuroda. 147-152 [doi]
- An Approach towards Real-Time Data Exchange Platform System Architecture (concise contribution)Bernd Resch, Francesco Calabrese, Assaf Biderman, Carlo Ratti. 153-159 [doi]
- Provably Correct Pervasive Computing EnvironmentsAnand Ranganathan, Roy H. Campbell. 160-169 [doi]
- Towards Robust Low Cost Authentication for Pervasive DevicesErdinç Öztürk, Ghaith Hammouri, Berk Sunar. 170-178 [doi]
- GP^2S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data (concise contribution)Wensheng Zhang, Chuang Wang, Taiming Feng. 179-184 [doi]
- Catch Me (If You Can): Data Survival in Unattended Sensor NetworksRoberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik. 185-194 [doi]
- Data Quality and Query Cost in Pervasive Sensing SystemsDavid J. Yates, Erich M. Nahum, James F. Kurose, Prashant J. Shenoy. 195-205 [doi]
- MeshChord: A Location-Aware, Cross-Layer Specialization of Chord for Wireless Mesh Networks (concise contribution)Simone Burresi, Claudia Canali, M. Elena Renda, Paolo Santi. 206-212 [doi]
- An Autonomic Context Management System for Pervasive ComputingPeizhao Hu, Jadwiga Indulska, Ricky Robinson. 213-223 [doi]
- Context-aware Battery Management for Mobile PhonesNishkam Ravi, James Scott, Lu Han, Liviu Iftode. 224-233 [doi]
- Busy Tone Multi Channel (BTMC): A New Multi Channel MAC protocol for Ad Hoc NetworksMohamed Farid Elhawary, Zygmunt J. Haas. 234-238 [doi]
- Context Integration for Smart WorkflowsMatthias Wieland, Peter Kaczmarczyk, Daniela Nicklas. 239-242 [doi]
- Estimating the Energy Consumption in Pervasive Java-Based SystemsChiyoung Seo, Sam Malek, Nenad Medvidovic. 243-247 [doi]
- HARMONI: Context-aware Filtering of Sensor Data for Continuous Remote Health MonitoringIqbal Mohomed, Archan Misra, Maria Ebling, William F. Jerome. 248-251 [doi]
- High-level Programming Support for Robust Pervasive Computing ApplicationsWilfried Jouve, Julien Lancia, Nicolas Palix, Charles Consel, Julia L. Lawall. 252-255 [doi]
- Improving Emergency Response to Mass Casualty IncidentsMarcus Lucas da Silva, Vassilis Kostakos, Mitsuji Matsumoto. 256-259 [doi]
- Non-anchored Unified Naming for Ubiquitous Computing EnvironmentsYoo Chul Chung, Dongman Lee. 260-263 [doi]
- TIGRA: Timely Sensor Data Collection Using Distributed Graph ColoringLilia Paradis, Qi Han. 264-268 [doi]
- Distributed Interactions with Wireless Sensors Using TinySIP for Hospital AutomationSudha Krishnamurthy, Lajos Lange. 269-275 [doi]
- Topology Formation in IEEE 802.15.4: Cluster-Tree CharacterizationFrancesca Cuomo, Sara Della Luna, Petia Todorova, Tapio Suihko. 276-281 [doi]
- PERLA: A Data Language for Pervasive SystemsFabio A. Schreiber, Romolo Camplani, Marco Fortunato, Marco Marelli, Filippo Pacifici. 282-287 [doi]
- A Lightweight Sensor Network Management System DesignFenghua Yuan, Wen-Zhan Song, Nina Peterson, Yang Peng, Lei Wang, Behrooz Shirazi, Richard LaHusen. 288-293 [doi]
- Information Agents for Pervasive Sensor NetworksAlex Rogers, Mike Osborne, Sarvapali D. Ramchurn, Stephen Roberts, Nicholas R. Jennings. 294-299 [doi]
- Analysis of On-off policies in Sensor Networks Using Interacting Markovian AgentsMarco Gribaudo, Davide Cerotti, Andrea Bobbio. 300-305 [doi]
- Budget-Based Clustering with Context-awareness for Sensor NetworksJiaxi You, Dominik Lieckfeldt, Matthias Handy, Dirk Timmermann. 306-311 [doi]
- Stability and Delay Analysis for Multi-Hop Single-Sink Wireless Sensor NetworksMuhammad Farukh Munir, Arzad Alam Kherani, Fethi Filali. 312-317 [doi]
- An Algorithm for Distributed Beacon SelectionDominik Lieckfeldt, Jiaxi You, Dirk Timmermann. 318-323 [doi]
- A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor NetworksLinchun Li, Jianhua Li, Yue Wu, Ping Yi. 324-329 [doi]
- An Interference-aware and Power Efficient Topology Control Algorithm for Wireless Multi-hop NetworksChuanhe Huang, Yong Cheng, Yuan Li, Wenming Shi, Hao Zhou. 330-335 [doi]
- Performance Analysis of Dynamic Spectrum Access NetworksZhong Fan. 336-341 [doi]
- Implementation of Flow Binding MechanismTanguy Ropitault, Nicolas Montavont. 342-347 [doi]
- A MAC Layer Multicasting Approach for WiMAX Access NetworksKyu Seol Lee, Sang Won Rhee, Hee Yong Youn. 348-353 [doi]
- Resource Optimization for 60 GHz Indoor Networks Using Dynamic Extended Cell FormationBao Linh Dang, R. Venkatesha Prasad, Ignas G. Niemegeers, M. Garcia Larrode, A. M. J. Koonen. 354-359 [doi]
- SGR: A Shared Generic Routing Support for Ad Hoc Ubiquitous Computing EnvironmentsYangwoo Ko, Dongman Lee. 360-365 [doi]
- An Approach to Load Balancing and Network Longevity using Dynamic Adaptive Routing in Wireless Sensor NetworksR. Sumathi, M. G. Srinivasa, R. Srinivasan. 366-371 [doi]
- Enabling Pervasiveness by Seamless Inter-domain Handover: Performance Study of PANA Pre-authenticationPatryk Chamuczynski, Omar Alfandi, Henrik Brosenne, Constantin Werner, Dieter Hogrefe. 372-376 [doi]
- Implementing Scenarios in a Smart Learning EnvironmentChristoph Burghardt, Christiane Reisse, Thomas Heider, Martin Giersich, Thomas Kirste. 377-382 [doi]
- ArCoMo-An Artefact-based Collaborative Mobile Learning EnvironmentChristian Hoff, Ulf Wehling, Steffen Rothkugel. 383-388 [doi]
- An Infrastructure for Developing Pervasive Learning EnvironmentsSabine Graf, Kathryn MacCallum, Tzu-Chien Liu, Maiga Chang, Dunwei Wen, Qing Tan, Jon Dron, Fuhua Lin, Nian-Shing Chen, Rory McGreal, Kinshuk. 389-394 [doi]
- HyLearn: A Mobile Learning System for Hybrid NetworksMatthias R. Brust, Adrian Andronache, Steffen Rothkugel. 395-399 [doi]
- Meta-Service Organization for a Pervasive UniversityRaphael Zender, Enrico Dressler, Ulrike Lucke, Djamshid Tavangarian. 400-405 [doi]
- Peer-to-Peer Context Reasoning in Pervasive Computing EnvironmentsTao Gu, Hung Keng Pung, Daqing Zhang. 406-411 [doi]
- Collision Avoidance in VANETs - An Application for Ontological Context ModelsRobert Eigner, Georg Lutz. 412-416 [doi]
- Ontology and ContextIsabel Cafezeiro, Edward Hermann Haeusler, Alexandre Rademaker. 417-422 [doi]
- Environment-Awareness: Quantitative Processing of Context ChangesAndreas Heil, Martin Gaedke. 423-428 [doi]
- Composition and Generalization of Context Data for Privacy PreservationLinda Pareschi, Daniele Riboni, Alessandra Agostini, Claudio Bettini. 429-433 [doi]
- A Context Query Language for Pervasive Computing EnvironmentsRoland Reichle, Michael Wagner, Mohammad Ullah Khan, Kurt Geihs, Massimo Valla, Cristina Fra, Nearchos Paspallis, George A. Papadopoulos. 434-440 [doi]
- Kinds of Contexts and their Impact on Semantic Similarity MeasurementKrzysztof Janowicz. 441-446 [doi]
- Adding High-level Reasoning to Efficient Low-level Context Management: A Hybrid ApproachDaniela Nicklas, Matthias Großmann, Jorge Mínguez, Matthias Wieland. 447-452 [doi]
- Mobile P2P Networks for Highly Dynamic EnvironmentsKei Takeshita, Masahiro Sasabe, Hirotaka Nakano. 453-457 [doi]
- An Architecture for Mobile P2P File Sharing in Marine DomainHuafeng Wu, Chaojian Shi, Haiguang Chen, Xi Zhou, Chuanshan Gao. 458-462 [doi]
- Evaluation of Peer-to-Peer Overlays for First ResponseDirk Bradler, Jussi Kangasharju, Max Mühlhäuser. 463-467 [doi]
- Load Sharing and Bandwidth Control in Mobile P2P Wireless Sensor NetworksElisa Rondini, Stephen Hailes, Li Li. 468-473 [doi]
- Prototyping a P2P SIP User Agent with Support for Multiple OverlaysMosiuoa Tsietsi, Alfredo Terzoli, George Wells. 474-479 [doi]
- P2PNS: A Secure Distributed Name Service for P2PSIPIngmar Baumgart. 480-485 [doi]
- A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P SystemsBrent Lagesse, Mohan Kumar. 486-491 [doi]
- Distributed Video Adaptation and Streaming for Heterogeneous DevicesRazib Iqbal, Dewan Tanvir Ahmed, Shervin Shirmohammadi. 492-497 [doi]
- A Scalable Approach for Application Layer Multicast in P2P NetworksMourad Amad, Ahmed Meddahi. 498-503 [doi]
- Experiences in Designing an Energy-Aware Middleware for Pervasive ComputingGregor Schiele, Marcus Handte, Christian Becker. 504-508 [doi]
- MAGIC Broker: A Middleware Toolkit for Interactive Public DisplaysAiman Erbad, Michael Blackstock, Adrian Friday, Rodger Lea, Jalal Al-Muhtadi. 509-514 [doi]
- Middleware Services for Multimodal Interactions in Smart EnvironmentsAntonio Coronato, Giuseppe De Pietro. 515-519 [doi]
- Enabling Deliberate Design for Energy Management in Pervasive SystemsAngela Dalton, Carla Schlatter Ellis, Christine Julien. 520-524 [doi]
- Safety Enhancing Mechanisms for Pervasive Computing Systems in Intelligent EnvironmentsHen-I Yang, Abdelsalam Helal. 525-530 [doi]
- A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer ApplicationsFlorina Almenárez Mendoza, Andrés Marín López, Daniel Diaz, Alberto Cortes, Celeste Campo, Carlos García-Rubio. 531-536 [doi]
- An Adapter Chaining Scheme for Service Continuity in Ubiquitous Environments with Adapter EvaluationByoungoh Kim, Kyungmin Lee, Dongman Lee. 537-542 [doi]
- Design of Software Architecture for Smart Meeting SpaceNamgon Kim, Sangwoo Han, JongWon Kim. 543-547 [doi]
- A Survey of Current Directions in Service Placement in Mobile Ad-hoc NetworksGeorg Wittenburg, Jochen H. Schiller. 548-553 [doi]
- On the Automated Creation of Understandable Positive Security Models for Web ApplicationsChristian Bockermann, Ingo Mierswa, Katharina Morik. 554-559 [doi]
- Building an Open Toolkit of Digital Certificate Validation for Mobile Web ServicesFlorina Almenárez Mendoza, Andrés Marín López, Daniel Diaz, Alberto Cortes, Celeste Campo, Carlos García-Rubio. 560-565 [doi]
- Entropy-Based Collaborative Detection of DDOS Attacks on Community NetworksShui Yu, Wanlei Zhou. 566-571 [doi]
- A Key Distribution Scheme for Wireless Sensor NetworksYong Ho Kim, Hwaseong Lee, Dong-Hoon Lee. 572-577 [doi]
- Detecting and Tracing DDoS Attacks by Intelligent Decision PrototypeAshley Chonka, Wanlei Zhou, Jaipal Singh, Yang Xiang. 578-583 [doi]
- Extraction of Residual Information in the Microsoft PowerPoint file from the Viewpoint of Digital Forensics considering PerCom EnvironmentJungheum Park, Bora Park, Sangjin Lee, Seokhie Hong, Jong Hyuk Park. 584-589 [doi]
- A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive ComputingSheikh Iqbal Ahamed, Moushumi Sharmin, Shameem Ahmed. 590-595 [doi]
- Spatial Distribution Patterns, Power Law, and the Agent-based Directed Diffusion Sensor NetworksZhanshan (Sam) Ma, Axel W. Krings. 596-601 [doi]
- Multiagent Place-Based Virtual Communities for Pervasive ComputingTuan Nguyen, Seng Wai Loke, Torab Torabi, Hongen Lu. 602-608 [doi]
- A Flexible Protocol Composition for Multi-party Coordination Protocols in Multi-agent SystemsRyuichi Takahashi, Kenji Tei, Fuyuki Ishikawa, Yoshiaki Fukazawa, Shinichi Honiden. 609-614 [doi]
- A Geographical Observation System based on P2P AgentsYuuichi Teranishi, Hirokazu Tanaka, Yoshimasa Ishi, Mikio Yoshida. 615-620 [doi]
- Road Intersections as Pervasive Computing Environments: Towards a Multiagent Real-Time Collision Warning SystemFlora Dilys Salim, Licheng Cai, Maria Indrawan, Seng Wai Loke. 621-626 [doi]
- Power-Aware Code Restructuring for Embedded Parallel Storing DeviceBin Xie, Qingsong Shi, Liangliang Tong, Jiangwei Huang, Xinliang Wu, Tianzhou Chen. 627-632 [doi]
- PZSPTF: Parallelism-aware and Zone-based Shortest Positioning TimeFirst Scheduling for MEMS-based Storage DevicesLike Yan, Qingsong Shi, Zhang Tiefei, Tianzhou Chen. 633-638 [doi]
- Establishing a Trusted Architecture on Pervasive Terminals for Securing Context ProcessingChen Li, Ye Zhang, Lijuan Duan. 639-644 [doi]
- Digital Wall: A Power-efficient Solution for Location-based Data SharingJeffrey Junfeng Pan, Sinno Jialin Pan, Vincent Wenchen Zheng, Qiang Yang. 645-650 [doi]
- A Distributed Energy-Efficient Flow Protocol for Mobile Ad Hoc Wireless NetworksHaiYang Hu, Hua Hu. 651-656 [doi]
- An Advanced Save-Energy Mechanism of Ad hoc NetworksFeng Zhenxin, Li Layuan. 657-662 [doi]
- A Power Management mechanism for Handheld Systems having a Multimedia AcceleratorJunho Ahn, Jung-Hi Min, Hojung Cha, Rhan Ha. 663-668 [doi]
- WiFi-Based Power Aware Pervasive DeviceYiqiang Chen, Mingqing Hu, Qingsheng Yuan, Junfa Liu. 669-674 [doi]
- Applying Dynamic Buffer Tuning to Help Pervasive Medical Consultation SucceedWilfred Lin, Jackei Wong, Allan Wong. 675-679 [doi]
- WAITER: A Wearable Personal Healthcare and Emergency Aid SystemWanhong Wu, Jiannong Cao, Yuan Zheng, Yong-Ping Zheng. 680-685 [doi]
- Enforcing Patient Privacy in Healthcare WSNs Using ECC Implemented on 802.15.4 Beacon Enabled ClustersJelena Mitic. 686-691 [doi]
- Assisting Elders with Mild Dementia Staying at HomeDaqing Zhang, Mossaab Hariz, Mounir Mokhtari. 692-697 [doi]
- Wireless Networked Chinese Telemedicine System: Method and Apparatus for Remote Pulse Information Retrieval and DiagnosisShilong Lu, Rui Wang, Li Cui, Ze Zhao, Youhua Yu, Zengyu Shan. 698-703 [doi]
- Pervasive Digital Monitoring and Transmission of Pre-Care Patient Biostatics with an OSGi, MOM and SOA Based Remote Health Care SystemIng-Yi Chen, Chen-Hsin Tsai. 704-709 [doi]
- Wireless Patient Information Provision and Sharing at the Point of Care using a Virtual Organization Framework in Clinical WorkMohyuddin, W. A. Gray, Hazel Bailey, Carol Jordan, David Morrey. 710-714 [doi]
- Towards an Implementation of Smart Hospital: A Localization System for Mobile Users and DevicesAntonio Coronato, Massimo Esposito. 715-719 [doi]
- Optimal Routing in Sensor Networks for In-home Health Monitoring with Multi-factor ConsiderationsXiaoling Wu, Brian J. d Auriol, Jinsung Cho, Sungyoung Lee. 720-725 [doi]