|
Conferences in DBLP
Severless Search and Authentication Protocols for RFID. [Citation Graph (, )][DBLP]
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. [Citation Graph (, )][DBLP]
Energy-Aware Tag Anti-Collision Protocols for RFID Systems. [Citation Graph (, )][DBLP]
Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays. [Citation Graph (, )][DBLP]
BlueTorrent: Cooperative Content Sharing for Bluetooth Users. [Citation Graph (, )][DBLP]
A Local Data Abstraction and Communication Paradigm for Pervasive Computing. [Citation Graph (, )][DBLP]
The RUNES Middleware for Networked Embedded Systems and its Application in a Disaster Management Scenario. [Citation Graph (, )][DBLP]
Designing Ubiquitous Computing Systems for Sports Equipment. [Citation Graph (, )][DBLP]
Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection. [Citation Graph (, )][DBLP]
Methods and Guidelines for the Design and Development of Domestic Ubiquitous Computing Applications. [Citation Graph (, )][DBLP]
Supporting Domain Experts in Creating Pervasive Experiences. [Citation Graph (, )][DBLP]
An Aspect-Oriented Approach to the Modularisation of Context. [Citation Graph (, )][DBLP]
The SkyLoc Floor Localization System. [Citation Graph (, )][DBLP]
An RF-Based System for Tracking Transceiver-Free Objects. [Citation Graph (, )][DBLP]
Overhearing the Wireless Interface for 802.11-Based Positioning Systems. [Citation Graph (, )][DBLP]
A Scalable Geographic Service Provision Framework for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
A Wall-Sized Focus Plus Context Display. [Citation Graph (, )][DBLP]
A Capacitive Sensing Toolkit for Pervasive Activity Detection and Recognition. [Citation Graph (, )][DBLP]
Using Digital Cameras for Text Input on Mobile Devices. [Citation Graph (, )][DBLP]
Securing Distributed Data Storage and Retrieval in Sensor Networks. [Citation Graph (, )][DBLP]
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]
Physically Unclonable Function-Based Security and Privacy in RFID Systems. [Citation Graph (, )][DBLP]
Structural Learning of Activities from Sparse Datasets. [Citation Graph (, )][DBLP]
A Simple Model and Infrastructure for Context-Aware Browsing of the World. [Citation Graph (, )][DBLP]
Achieving Flexible Cache Consistency for Pervasive Internet Access. [Citation Graph (, )][DBLP]
Automatic Generation of Device User-Interfaces? [Citation Graph (, )][DBLP]
Supporting Mobile Service Usage through Physical Mobile Interaction. [Citation Graph (, )][DBLP]
SHAD: A Human-Centered Security Architecture for the Plan B Operating System. [Citation Graph (, )][DBLP]
|