-
1
-
-
84976653144
-
Some Computer Science Problems in Ubiquitous Computing
-
July
-
M. Weiser, "Some Computer Science Problems in Ubiquitous Computing," Communications of the ACM, Vol. 36, No. 7, July 1993, pp. 75-84.
-
(1993)
Communications of the ACM
, vol.36
, Issue.7
, pp. 75-84
-
-
Weiser, M.1
-
2
-
-
49149111953
-
-
URL
-
Pervasive Computing definition, URL: http://www.parliament.vic.gov.au/ sarc/EDemocracy/Final_Report/Glossary.htm
-
Pervasive Computing definition
-
-
-
3
-
-
49149113467
-
-
URL
-
Pervasive Computing framework, URL: http://ftamework.v2.nl/archive/ archive/node/text/default.xslt/nodenr-156647
-
Pervasive Computing framework
-
-
-
4
-
-
37349111102
-
Some Research challenges in pervasive computing
-
April 18-23, Vienna, Austria, pp
-
P. Robinson, H. Vogt, and W. Wagealla, "Some Research challenges in pervasive computing," Post workshop at the second international conference on pervasive computing, April 18-23, 2004, Vienna, Austria, pp. 1-16.
-
(2004)
Post workshop at the second international conference on pervasive computing
, pp. 1-16
-
-
Robinson, P.1
Vogt, H.2
Wagealla, W.3
-
5
-
-
0001853125
-
The Computer for the Twenty-First Century
-
September
-
M. Weiser, "The Computer for the Twenty-First Century," Scientific American, September 1991, pp. 94-104.
-
(1991)
Scientific American
, pp. 94-104
-
-
Weiser, M.1
-
6
-
-
0010602271
-
System Software for Ubiquitous Computing
-
Jan-Mar
-
T. Kindberg and A. Fox, "System Software for Ubiquitous Computing," IEEE Pervasive Computing, Jan-Mar, 2002, pp. 70-81,
-
(2002)
IEEE Pervasive Computing
, pp. 70-81
-
-
Kindberg, T.1
Fox, A.2
-
7
-
-
0029712060
-
Fundamental Challenges in Mobile Computing
-
Philadelphia, Pennsylvania, USA, May
-
M. Satyanarayanan, "Fundamental Challenges in Mobile Computing," Fifteenth ACM Symposium on Principles of Distributed Computing, Philadelphia, Pennsylvania, USA, May 1996, pp. 1-7.
-
(1996)
Fifteenth ACM Symposium on Principles of Distributed Computing
, pp. 1-7
-
-
Satyanarayanan, M.1
-
8
-
-
33244481057
-
System challenges for ubiquitous & pervasive computing
-
St. Louis, Missouri, USA, May 15-21, pp
-
R. Want and T. Pering, "System challenges for ubiquitous & pervasive computing," 27th International Conference on Software Engineering (ICSE 2005), St. Louis, Missouri, USA, May 15-21, pp. 9-14.
-
27th International Conference on Software Engineering (ICSE 2005)
, pp. 9-14
-
-
Want, R.1
Pering, T.2
-
9
-
-
0013413164
-
Security for Ubiquitous Computing
-
February
-
F. Stajano, "Security for Ubiquitous Computing," Wiley, February 2002, pp. 110-111.
-
(2002)
Wiley
, pp. 110-111
-
-
Stajano, F.1
-
10
-
-
0036999904
-
-
F. Stajano and R. Anderson, The Resurrecting Duckling: security issues for ubiquitous computing, Computer, 35(4), Part Supplement, April 2002, pp. 22-26.
-
F. Stajano and R. Anderson, "The Resurrecting Duckling: security issues for ubiquitous computing," Computer, Vol. 35(4), Part Supplement, April 2002, pp. 22-26.
-
-
-
-
11
-
-
2642537855
-
Improving security for ubiquitous campus applications
-
January
-
K. Matsumiya, S. Tamara, G. Suzuki, J. Nakazawa, K. Takashio, H. Tokuda, "Improving security for ubiquitous campus applications," Symposium on Applications and the Internet Workshops (SAINT 2004), January 2004, pp. 417-422.
-
(2004)
Symposium on Applications and the Internet Workshops (SAINT 2004)
, pp. 417-422
-
-
Matsumiya, K.1
Tamara, S.2
Suzuki, G.3
Nakazawa, J.4
Takashio, K.5
Tokuda, H.6
-
12
-
-
2642573748
-
Moving from Security to Distributed Trust in Ubiquitous Computing Environments
-
December
-
L. Kagal, T. Finin, and A. Joshi, "Moving from Security to Distributed Trust in Ubiquitous Computing Environments," IEEE Computer, December 2001.
-
(2001)
IEEE Computer
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
13
-
-
33645980270
-
-
URL
-
Y. Chen, C. D. Jensen, E. Gray, V. Cahill, and J. Seigneur, "A general risk assessment of security in pervasive computing," URL: https://www.cs.tcd.ie/ publications/techreports/reports.03/TCD-CS-2003-45.pdf.
-
A general risk assessment of security in pervasive computing
-
-
Chen, Y.1
Jensen, C.D.2
Gray, E.3
Cahill, V.4
Seigneur, J.5
-
14
-
-
0035428326
-
Service Discovery in DEAPspace
-
August
-
M. Nidd, "Service Discovery in DEAPspace," IEEE Personal Communications, August 2001, pp. 39-45.
-
(2001)
IEEE Personal Communications
, pp. 39-45
-
-
Nidd, M.1
-
15
-
-
0035672220
-
Home Networking with Universal Plug and Play
-
December
-
B. A. Miller, T. Nixon, C. Tai, and M. D. Wood, "Home Networking with Universal Plug and Play", IEEE Communications Magazine, December 2001, Vol. 39, Issue 12, pp. 104-109.
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.12
, pp. 104-109
-
-
Miller, B.A.1
Nixon, T.2
Tai, C.3
Wood, M.D.4
-
16
-
-
0001749548
-
The design and implementation of an intentional naming system
-
99, Kiawah Island, Scotland
-
W. Winoto, E. Schwartz, H. Balakrishnan, and J. Lilley, "The design and implementation of an intentional naming system," 17th ACM Symposium on Operating Systems Principles (SOSP '99), Kiawah Island, Scotland, 1999, pp. 186-201.
-
(1999)
17th ACM Symposium on Operating Systems Principles (SOSP
, pp. 186-201
-
-
Winoto, W.1
Schwartz, E.2
Balakrishnan, H.3
Lilley, J.4
-
17
-
-
84958951042
-
INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery
-
Zurich, Switzerland, August 26-28
-
M. Balazinska, H. Balakrishnan, and D. Karger, "INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery," International Conference on Pervasive Computing, Zurich, Switzerland, August 26-28, 2002, pp. 195-210.
-
(2002)
International Conference on Pervasive Computing
, pp. 195-210
-
-
Balazinska, M.1
Balakrishnan, H.2
Karger, D.3
-
18
-
-
49149112961
-
-
Microsoft Corporation, Universal Plug and Play Device Architecture, Version 1.0, Microsoft Co, 2000
-
Microsoft Corporation, "Universal Plug and Play Device Architecture," Version 1.0, Microsoft Co., 2000.
-
-
-
-
19
-
-
85094635733
-
An Architecture for a Secure Service Discovery Service
-
99, Seattle, WA
-
S. Czerwinski, B. Y. Zhao, T. Hodes, A. Joseph, and R. Katz, "An Architecture for a Secure Service Discovery Service," Fifth Annual International Conference on Mobile Computing and Networks (MobiCom '99), Seattle, WA, 1999, pp. 24-35,
-
(1999)
Fifth Annual International Conference on Mobile Computing and Networks (MobiCom
, pp. 24-35
-
-
Czerwinski, S.1
Zhao, B.Y.2
Hodes, T.3
Joseph, A.4
Katz, R.5
-
20
-
-
24744450314
-
-
F. Zhu, M. Mutka, and L. Ni, Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services, Pervasive Computing and Communications, 2003 (PerCom 2003), Proceedings of the First IEEE International Conference, 23-26 March 2003, pp. 235-242.
-
F. Zhu, M. Mutka, and L. Ni, "Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services," Pervasive Computing and Communications, 2003 (PerCom 2003), Proceedings of the First IEEE International Conference, 23-26 March 2003, pp. 235-242.
-
-
-
-
21
-
-
2642523653
-
PrudentExposure: A Private and User-centric Service Discovery Protocol
-
March
-
F. Zhu, M. Mutka, and L. Ni, "PrudentExposure: A Private and User-centric Service Discovery Protocol," Proceedings of the 2004 IEEE Annual Conference on Pervasive Computing and Communications (PerCom 2004), March 2004, pp. 329-340.
-
(2004)
Proceedings of the 2004 IEEE Annual Conference on Pervasive Computing and Communications (PerCom 2004)
, pp. 329-340
-
-
Zhu, F.1
Mutka, M.2
Ni, L.3
-
22
-
-
30344444869
-
Security architecture for service-based mobile environment
-
Washington DC, USA, March
-
H. Kopp, U. Lucke, and D. Tavangarian, "Security architecture for service-based mobile environment," Third IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'05), Washington DC, USA, March 2005, pp. 199-203.
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'05)
, pp. 199-203
-
-
Kopp, H.1
Lucke, U.2
Tavangarian, D.3
-
23
-
-
30344471587
-
Expose or not? A progressive exposure approach for service discovery in pervasive computing environments
-
March
-
F. Zhu, M. Mutka, and L. Ni, "Expose or not? A progressive exposure approach for service discovery in pervasive computing environments," Third IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), March 2005, pp. 225-234.
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications (PerCom 2005)
, pp. 225-234
-
-
Zhu, F.1
Mutka, M.2
Ni, L.3
-
25
-
-
9744278382
-
A novel cloud-based trust model for pervasive computing
-
September
-
R. He, J. Niu, M. Yuan, and J. Hu, "A novel cloud-based trust model for pervasive computing," The Fourth International Conference on Computer and Information Technology (CIT '04), September 2004, pp. 693-700.
-
(2004)
The Fourth International Conference on Computer and Information Technology (CIT '04)
, pp. 693-700
-
-
He, R.1
Niu, J.2
Yuan, M.3
Hu, J.4
-
26
-
-
33750809662
-
MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability, and Self Healing) in Pervasive Computing Environments
-
NV, USA, April
-
M. Sharmin, S. Ahmed, and S. I. Ahamed, "MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability, and Self Healing) in Pervasive Computing Environments," Third International Conference on Information Technology: New Generations, NV, USA, April 2006, pp. 306-313.
-
(2006)
Third International Conference on Information Technology: New Generations
, pp. 306-313
-
-
Sharmin, M.1
Ahmed, S.2
Ahamed, S.I.3
-
27
-
-
33646687441
-
Knowledge Usability and Its Characteristics for Pervasive Computing
-
Las Vegas, USA, June
-
S. Ahmed, M. Sharmin, and S. I. Ahamed, "Knowledge Usability and Its Characteristics for Pervasive Computing," The 2005 International Conference on Pervasive Systems and Computing (PSC-05), Las Vegas, USA, June 2005, pp. 206-209.
-
(2005)
The 2005 International Conference on Pervasive Systems and Computing (PSC-05)
, pp. 206-209
-
-
Ahmed, S.1
Sharmin, M.2
Ahamed, S.I.3
-
28
-
-
33646706031
-
-
submitted
-
S. Ahmed, M. Sharmin, and S. I. Ahamed, "GETS (Generic, Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications," submitted.
-
GETS (Generic, Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications
-
-
Ahmed, S.1
Sharmin, M.2
Ahamed, S.I.3
-
29
-
-
33750351218
-
-
S. Ahmed, M. Sharmin, and S. I. Ahamed, PerAd-Service: A Middleware Service for Pervasive Advertisement in M-Business,29th International Computer Software and Applications Conference, Edinburgh, Scotland, July 2005, pp. 17-18
-
S. Ahmed, M. Sharmin, and S. I. Ahamed, "PerAd-Service: A Middleware Service for Pervasive Advertisement in M-Business,"29th International Computer Software and Applications Conference, Edinburgh, Scotland, July 2005, pp. 17-18.
-
-
-
-
31
-
-
36349010768
-
Classification of Service Discovery in Pervasive Computing Environments
-
MSU
-
F. Zhu, M. Mutka, and L. Ni, "Classification of Service Discovery in Pervasive Computing Environments," MSUCSE-02-24, MSU, 2002, pp. 1-17.
-
(2002)
MSUCSE-02-24
, pp. 1-17
-
-
Zhu, F.1
Mutka, M.2
Ni, L.3
-
32
-
-
24644486472
-
PTM: A Pervasive Trust Management Model for dynamic open environments
-
Massachusetts, Accessed May 2006
-
F. Almenarez, A. Marin, C. Campo, and C. Garcia, "PTM: A Pervasive Trust Management Model for dynamic open environments," Pervasive Security, Privacy, and Trust (PSPT 2004), Massachusetts, 2004, Accessed May 2006.
-
(2004)
Pervasive Security, Privacy, and Trust (PSPT 2004)
-
-
Almenarez, F.1
Marin, A.2
Campo, C.3
Garcia, C.4
-
33
-
-
33750328371
-
Developing a Model for Trust Management in Pervasive Devices
-
F. Almenarez, A. Marin, D. Dyaz, and J. Sanchez, "Developing a Model for Trust Management in Pervasive Devices," Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06), 2006, pp. 267-271.
-
(2006)
Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)
, pp. 267-271
-
-
Almenarez, F.1
Marin, A.2
Dyaz, D.3
Sanchez, J.4
-
35
-
-
24744432052
-
SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) in Pervasive Computing Environments
-
Las Vegas, USA, April
-
M. Sharmin, S. Ahmed, and S. I. Ahamed, "SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) in Pervasive Computing Environments," IEEE international Conference on Information Technology (ITCC 2005), Las Vegas, USA, April 2005, pp. 271-276.
-
(2005)
IEEE international Conference on Information Technology (ITCC 2005)
, pp. 271-276
-
-
Sharmin, M.1
Ahmed, S.2
Ahamed, S.I.3
-
36
-
-
33750370876
-
An Adaptive Lightweight Trust Reliant Secure Resource Discovery for Pervasive Computing Environments
-
Pisa, Italy, March
-
M. Sharmin, S. Ahmed, and S. I. Ahamed, "An Adaptive Lightweight Trust Reliant Secure Resource Discovery for Pervasive Computing Environments," Fourth Annual IEEE Int. Conference on Pervasive Computer and Communications (PerCom 2006), Pisa, Italy, March 2006, pp. 258-263.
-
(2006)
Fourth Annual IEEE Int. Conference on Pervasive Computer and Communications (PerCom 2006)
, pp. 258-263
-
-
Sharmin, M.1
Ahmed, S.2
Ahamed, S.I.3
-
37
-
-
34247485438
-
-
M. Sharmin, S. Ahmed, and S. I. Ahamed, SSRD, A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment, Pro. of the 30th Annual International Computer Software and Applications Conference COMPSAC 2006, Chicago, September 17-21, 2006
-
M. Sharmin, S. Ahmed, and S. I. Ahamed, "SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment," Pro. of the 30th Annual International Computer Software and Applications Conference (COMPSAC 2006), Chicago, September 17-21, 2006.
-
-
-
|