default search action
7th PerCom Workshops 2009: Galveston, Texas, USA
- Seventh Annual IEEE International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2009), 9-13 March 2009, Galveston, TX, USA. IEEE Computer Society 2009
PerDev 2009 Second International Workshop on Power-Aware Pervasive Devices
- Yiqiang Chen, Qiang Yang, Moustafa A. Youssef:
Message from the Workshop Co-Organizers. 1-2 - May Moussa, Moustafa Youssef:
Smart Devices for Smart Environments: Device-free Passive Detection in Real Environments. 1-6 - Zhiqiang Zhang, Zheng Wu, Jiang Chen, Jian-Kang Wu:
Ubiquitous Human Body Motion Capture using Micro-sensors. 1-5 - Xun Luo, Robert V. Kenyon:
HAMERA: a Device for Hand Profile Construction in the Pervasive Environment. 1-6 - Wei Hu, Tianzhou Chen, Qingsong Shi, Feng Sha:
Efficient Utilization of Scratch-Pad Memory for Embedded Systems. 1-6 - Yiqiang Chen, Zhuo Sun, Juan Qi, Derek Hao Hu, Qiang Yang:
LoSeCo: Location-based Search Computing for Pervasive Device Augmentation. 1-6 - Clemens Lombriser, Andreas Bulling, Andreas Breitenmoser, Gerhard Tröster:
Speech as a Feedback Modality for Smart Objects. 1-5 - Vincent Wenchen Zheng, Junhui Zhao, Yongcai Wang, Qiang Yang:
HIPS: A Calibration-less Hybrid Indoor Positioning System Using Heterogeneous Sensors. 1-6 - Driss Choujaa, Naranker Dulay:
Aligning Activity Sequences for Continuous Tracking of Cellphone Users. 1-6
IQ2S 2009 First International Workshop on Information Quality and Quality of Service for Pervasive Computing
- Sajal K. Das, Chen-Khong Tham, Wendong Xiao, Habib M. Ammari:
Message from the Workshop Organizers. 1-2 - Chatschik Bisdikian, Joel W. Branch, Kin K. Leung, Robert I. Young:
A Letter Soup for the Quality of Information in Sensor Networks. 1-6 - Lee-Ling S. Ong, Wendong Xiao, Chen-Khong Tham, Marcelo H. Ang:
Resource Constrained Particle Filtering for Real-time Multi-Target Tracking in Sensor Networks. 1-6 - Jing Wang, Yonghe Liu, Sajal K. Das:
Improving Information Quality of Sensory Data through Asynchronous Sampling. 1-6 - Adnan Agbaria, Gidon Gershinsky, Nir Naaman, Konstantin Shagin:
A Bandwidth Management Approach for Quality of Service Support in Mobile Ad Hoc Networks. 1-5 - Petcharat Suriyachai, Utz Roedig, Andrew Scott:
Implementation of a MAC Protocol for QoS Support in Wireless Sensor Networks. 1-6 - Rajgopal Kannan, Shuangqing Wei, Costas Busch, Athanasios V. Vasilakos:
Online Algorithms for Maximizing Quality of Link Transmissions over a Jammed Wireless Channel. 1-6 - Dhadesugoor R. Vaman, Ashwin Ashok:
An Efficient Distributed Synchronization Method for TD/CDMA based Mobile Ad Hoc Networks. 1-6 - Chinh T. Vu, Yingshu Li:
Delaunay-Triangulation Based Complete Coverage in Wireless Sensor Networks. 1-5 - Shaojie Tang, XuFei Mao, Xiang-Yang Li:
Optimal k-support Coverage Paths in Wireless Sensor Networks. 1-6 - Hyun Jung Choe, Preetam Ghosh, Sajal K. Das:
Cross-Layer Design for Adaptive Data Reporting in Wireless Sensor Networks. 1-6 - Mingxing Jiang, Zhongwen Guo, Feng Hong, Yutao Ma, Hanjiang Luo:
OceanSense: A Practical Wireless Sensor Network on the Surface of the Sea. 1-5 - Dario Gallucci, Silvia Giordano:
QoS Enabled Mobility Support for Mesh Networks. 1-6 - Murat Demirbas, Carole Rudra, Atri Rudra, Murat Ali Bayir:
iMAP: Indirect Measurement of Air Pollution with Cellphones. 1-6
PerWare 2009 IEEE Middleware Support for Pervasive Computing Workshop
- Jalal Al-Muhtadi, Roy H. Campbell, Anand Ranganathan, Gregor Schiele:
Message from the Workshop Co-Organizers. 1-2 - Sean Reilly, Mads Haahr:
Extending the Event-Based Programming Model to support Sensor-Driven Ubiquitous Computing Applications. 1-6 - Seth Holloway, Drew Stovall, Jorge Lara-Garduno, Christine Julien:
Opening Pervasive Computing to the Masses Using the SEAP Middleware. 1-5 - Amel Bennaceur, Pushpendra Singh, Pierre-Guillaume Raverdy, Valérie Issarny:
The iBICOOP middleware: Enablers and Services for Emerging Pervasive Computing Environments. 1-6 - Muhammad Haroon, Marcus Handte, Pedro José Marrón:
Generic Role Assignment: A Uniform Middleware Abstraction for Configuration of Pervasive Systems. 1-6 - Sangwoo Han, JongWon Kim, Wolfgang Prinz:
A Multi-Agent-Based Management System for Pervasive Collaborative Computing Environment. 1-6 - Jordan Janeiro, Thomas Springer, Markus Endler:
A Middleware Service for Coordinated Adaptation of Communication Services in Groups of Devices. 1-6 - Huifeng Shen, Yan Lu, Feng Wu, Shipeng Li:
A High-Performance Remote Computing Platform. 1-6 - Holger Schmidt, Florian Flerlage, Franz J. Hauck:
A Generic Context Service for Ubiquitous Environments. 1-6
PerSeNS 2009 Fifth International Workshop on Sensor Networks and Systems for Pervasive Computing
- Silvia Giordano, Damla Turgut, Giuseppe Anastasi, Stephan Olariu:
Message from the Workshop Co-Organizers. 1-2 - Giuseppe Anastasi, Eleonora Borgia, Marco Conti, Enrico Gregori:
HI : An Hybrid Adaptive Interleaved Communication Protocol for Reliable Data Transfer in WSNs with Mobile Sinks. 1-6 - Jiaxi You, Dominik Lieckfeldt, Qi Han, Jakob Salzmann, Dirk Timmermann:
Look-ahead Geographic Routing for Sensor Networks. 1-6 - Trac N. Nguyen, Dung T. Huynh:
Energy-Efficient Connected D-Hop Dominating Sets in Wireless Sensor Networks. 1-6 - Lakshman Kaveti, Sandeep Pulluri, Gurdip Singh:
Event Ordering in Pervasive Sensor Networks. 1-6 - Steven Lai, Jiannong Cao, Yuan Zheng:
PSWare: a Publish / Subscribe Middleware Supporting Composite Event in Wireless Sensor Network. 1-6 - Zaher Merhi, Mohamed A. Elgamel, Magdy A. Bayoumi:
EB-MAC: An Event Based Medium Access Control for Wireless Sensor Networks. 1-6 - Kuan Lun Huang, Salil S. Kanhere, Wen Hu:
Towards Privacy-Sensitive Participatory Sensing. 1-6 - Jun-Won Ho, Donggang Liu, Matthew K. Wright, Sajal K. Das:
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks. 1-6 - Cinzia Cappiello, Fabio Alberto Schreiber:
Quality- and Energy-Aware Data Compression by Aggregation in WSN Data Streams. 1-6
PWN 2009 Fifth IEEE PerCom Workshop on Pervasive Wireless Networking
- Chansu Yu, Bechir Hamdaoui:
Message from the Workshop Co-Chairs. 1-2 - Chittabrata Ghosh, Carlos Cordeiro, Dharma P. Agrawal, M. Bhaskara Rao:
Markov Chain Existence and Hidden Markov Models in Spectrum Sensing. 1-6 - Soumaya Hamouda, Choong Il Yeh, Jihyung Kim, Wooram Shin, Dong Seung Kwon:
Dynamic Hard Fractional Frequency Reuse for Mobile WiMAX. 1-6 - Keiichi Nakamura, Masato Kamio, Tetsushi Watanabe, Shinsuke Kobayashi, Noboru Koshizuka, Ken Sakamura:
Reliable Ranging Technique based on Statistical RSSI Analyses for an Ad-Hoc Proximity Detection System. 1-6 - Hady S. AbdelSalam, Stephan Olariu:
HexNet: Hexagon-Based Localization Technique For Wireless Sensor Networks. 1-6 - Vikram P. Munishwar, Shailendra Singh, Xiaoshuang Wang, Christopher Mitchell, Kartik Gopalan, Nael B. Abu-Ghazaleh:
On the Accuracy of RFID-based Localization in a Mobile Wireless Network Testbed. 1-6 - Xinhua Yang, Tracy Camp:
An Energy-Aware Relay Selection Scheme for ALLIANCES. 1-7 - Ana R. Cavalli, Stéphane Maag, Edgardo Montes de Oca, Fatiha Zaïdi:
A Formal Passive Testing Approach to test a MANET Routing Protocol. 1-6 - Li Ding, Bo Gu, Xiaoyan Hong, Brandon Dixon:
Articulation Node Based Routing in Delay Tolerant Networks. 1-6 - Thomas Claveirole, Mathias Boc, Marcelo Dias de Amorim:
An Empirical Analysis of Wi-Fi Activity in Three Urban Scenarios. 1-6 - Muhammad Niswar, Eigo Horiuchi, Shigeru Kashihara, Kazuya Tsukamoto, Youki Kadobayashi, Suguru Yamaguchi:
Seamless VoWLAN Handoff Management based on Estimation of AP Queue Length and Frame Retries. 1-6 - Hongbo Liu, Wenyuan Xu, Yingying Chen, Zhenhua Liu:
Localizing Jammers in Wireless Networks. 1-6 - Jisun An, Yangwoo Ko, Dongman Lee:
A Social Relation aware Routing Protocol for Mobile Ad-hoc Networks. 1-6
PerEL 2009 Fifth IEEE International Workshop on Pervasive Learning
- Djamshid Tavangarian:
Message from the Workshop Chair. 1-2 - Raphael Zender, Enrico Dressler, Ulrike Lucke, Djamshid Tavangarian:
Pervasive Media and Messaging Services for Immersive Learning Experiences. 1-6 - Steve Hinske, Marc Langheinrich:
An Infrastructure for Interactive and Playful Learning in Augmented Toy Environments. 1-6 - Richard Beckwith, Sharon Greenfield:
Context Aware Education for Agriculture. 1-5 - Mark J. Weal, Danius T. Michaelides, Kevin R. Page, David De Roure, Mary Gobbi, Eloise Monger, Fernando Martinez:
Tracking and Annotation in Skills-Based Learning Environments. 1-6
CoMoRea 2009 Sixth Workshop on Context Modeling and Reasoning
- Jadwiga Indulska, Daniela Nicklas, Anand Ranganathan:
Message from the Workshop Co-Organizers. 1-2 - Daniele Riboni:
Towards the Combination of Statistical and Symbolic Techniques for Activity Recognition. 1-2 - Stephan Urbanski, Eduard Huber, Matthias Wieland, Frank Leymann, Daniela Nicklas:
PerFlows for the Computers of the 21st Century. 1-6 - Jadwiga Indulska, Ricky Robinson:
Modelling Weiser's "Sal" Scenario with CML. 1-6 - Hyun Lee, Jae Sung Choi, Ramez Elmasri:
A Classification and Modeling of the Quality of Contextual Information in Smart Spaces. 1-5 - Alisa Devlic, Roland Reichle, Michael Wagner, Manuele Kirsch-Pinheiro, Yves Vanrompay, Yolande Berbers, Massimo Valla:
Context Inference of Users' Social Relationships and Distributed Policy Management. 1-8 - Ayis Ziotopoulos, Gustavo de Veciana:
Design and Optimization of Spatial Organizations for Context Exchange and Surveillance. 1-8
WPS 2009 Third International Workshop on Web and Pervasive Security
- Jong Hyuk Park, Robert C. Hsu, Sherali Zeadally, Han-Chieh Chao, Mieso K. Denko, Sheikh Iqbal Ahamed:
Message from the Workshop Co-Organizers. 1-2 - Sajid Hussain, Md. Shafayat Rahman, Laurence Tianruo Yang:
Key Predistribution Scheme using Keyed Hash Chain and Multipath Key Reinforcement for Wireless Sensor Networks. 1-6 - Mohammad M. Molla, Praveen Madiraju, Srilaxmi Malladi, Sheikh Iqbal Ahamed:
An XML Based Access Control Architecture for Pervasive Computing. 1-6 - Ashley Chonka, Wanlei Zhou, Yang Xiang:
Defending Grid Web Services from XDoS Attacks by SOTA. 1-6 - Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed:
An Adaptive Initial Trust and Demand Aware Secure Resource Discovery (AID-SRD) Model for Pervasive Environments. 1-6 - Thomas H. Morris, V. S. S. Nair:
Encryption Key Protection for Private Computing on Public Platforms. 1-6 - Przemyslaw Blaskiewicz, Zbigniew Golebiewski, Marek Klonowski, Krzysztof Majcher:
RFID System with Allowers. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.