The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE International Conference on Pervasive Computing and Communications (percom)
2007 (conf/percom/2007)


  1. Severless Search and Authentication Protocols for RFID. [Citation Graph (, )][DBLP]


  2. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. [Citation Graph (, )][DBLP]


  3. Energy-Aware Tag Anti-Collision Protocols for RFID Systems. [Citation Graph (, )][DBLP]


  4. Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays. [Citation Graph (, )][DBLP]


  5. BlueTorrent: Cooperative Content Sharing for Bluetooth Users. [Citation Graph (, )][DBLP]


  6. A Local Data Abstraction and Communication Paradigm for Pervasive Computing. [Citation Graph (, )][DBLP]


  7. The RUNES Middleware for Networked Embedded Systems and its Application in a Disaster Management Scenario. [Citation Graph (, )][DBLP]


  8. Designing Ubiquitous Computing Systems for Sports Equipment. [Citation Graph (, )][DBLP]


  9. Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection. [Citation Graph (, )][DBLP]


  10. Methods and Guidelines for the Design and Development of Domestic Ubiquitous Computing Applications. [Citation Graph (, )][DBLP]


  11. Supporting Domain Experts in Creating Pervasive Experiences. [Citation Graph (, )][DBLP]


  12. An Aspect-Oriented Approach to the Modularisation of Context. [Citation Graph (, )][DBLP]


  13. The SkyLoc Floor Localization System. [Citation Graph (, )][DBLP]


  14. An RF-Based System for Tracking Transceiver-Free Objects. [Citation Graph (, )][DBLP]


  15. Overhearing the Wireless Interface for 802.11-Based Positioning Systems. [Citation Graph (, )][DBLP]


  16. A Scalable Geographic Service Provision Framework for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  17. A Wall-Sized Focus Plus Context Display. [Citation Graph (, )][DBLP]


  18. A Capacitive Sensing Toolkit for Pervasive Activity Detection and Recognition. [Citation Graph (, )][DBLP]


  19. Using Digital Cameras for Text Input on Mobile Devices. [Citation Graph (, )][DBLP]


  20. Securing Distributed Data Storage and Retrieval in Sensor Networks. [Citation Graph (, )][DBLP]


  21. SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  22. Physically Unclonable Function-Based Security and Privacy in RFID Systems. [Citation Graph (, )][DBLP]


  23. Structural Learning of Activities from Sparse Datasets. [Citation Graph (, )][DBLP]


  24. A Simple Model and Infrastructure for Context-Aware Browsing of the World. [Citation Graph (, )][DBLP]


  25. Achieving Flexible Cache Consistency for Pervasive Internet Access. [Citation Graph (, )][DBLP]


  26. Automatic Generation of Device User-Interfaces? [Citation Graph (, )][DBLP]


  27. Supporting Mobile Service Usage through Physical Mobile Interaction. [Citation Graph (, )][DBLP]


  28. SHAD: A Human-Centered Security Architecture for the Plan B Operating System. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002