Filters








47,175 Hits in 3.0 sec

Using unlabeled data in a sparse-coding framework for human activity recognition

Sourav Bhattacharya, Petteri Nurmi, Nils Hammerla, Thomas Plötz
2014 Pervasive and Mobile Computing  
We propose a sparse-coding framework for activity recognition in ubiquitous and mobile computing that alleviates two fundamental problems of current supervised learning approaches.  ...  Primarily we focus on transportation mode analysis task, a popular task in mobile-phone based sensing.  ...  Hoyer for insightful discussions and comments on early versions of this work. The authors also acknowledge Mr. S. Hemminki for providing help and insights with the transportation mode data. S.  ... 
doi:10.1016/j.pmcj.2014.05.006 fatcat:svtf7unst5cpvpvd4mmtwcsfde

Code mobility for pervasive computing

F. Corradini, R. Culmone, M.R. Di Berardini
13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises  
The use of the platform is discussed in the context of pervasive and ubiquitous computing. We also present a calculus for modelling mobile applications.  ...  In this paper we isolate and implement the minimal functionalities for an open platform supporting mobile code.  ...  pervasive and ubiquitous computing.  ... 
doi:10.1109/enabl.2004.17 dblp:conf/wetice/CorradiniCB04 fatcat:czaecvpytjdmnjp2ny3sz4akm4

Fractal: A Mobile Code Based Framework for Dynamic Application Protocol Adaptation in Pervasive Computing

H. Lufei, Weisong Shi
19th IEEE International Parallel and Distributed Processing Symposium  
(CDN) for protocol adaptors (mobile codes) deployment.  ...  In this paper we propose a novel application level protocol adaptation framework, Fractal, which uses the mobile code technology for protocol adaptation and leverages existing content distribution networks  ...  (CDN) for protocol adaptors (mobile codes) deployment.  ... 
doi:10.1109/ipdps.2005.230 dblp:conf/ipps/LufeiS05 fatcat:udhkzlsqwbggfoyancdz6isrg4

Application mobility in pervasive computing: A survey

Ping Yu, Xiaoxing Ma, Jiannong Cao, Jian Lu
2013 Pervasive and Mobile Computing  
This advanced feature, recognized as application mobility, brings many challenges to the pervasive computing community.  ...  Pervasive computing applications often need to maintain uninterrupted computing experiences when users move across devices.  ...  Mobile computing was closely followed by pervasive computing.  ... 
doi:10.1016/j.pmcj.2012.07.009 fatcat:fr3cxacgb5h75clstqtnu4ffc4

Implementing Risk Management in Pervasive and IoT Environments

2019 International journal of recent technology and engineering  
The state of art constructs a strong case for establishing interrelationships between risks management and quality assurance in big computation environments.  ...  The paper has implemented risk management in pervasive applications by providing risky code insights by a smart software.  ...  IMPLEMENTATING RISK MANAGEMENT FOR A PERVASIVE/SMART APPLICATION This section describes how risks may be managed for a pervasive application by smart software after identifying code alerts and risky code  ... 
doi:10.35940/ijrte.c1078.1083s19 fatcat:kdywm4eyq5eczkhshbtsoskywi

Towards an intrusion detection system for pervasive computing environments

P. Kannadiga, M. Zulkernine, S.I. Ahamed
2005 International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II  
The paper also describes the detailed architecture of an intrusion detection system using mobile agents for a network environment made up of infrastructure based network and pervasive computing devices  ...  Hence, there arises the need for intrusion detection systems capable of operating both in infrastructure based networks and the ad-hoc networks of pervasive computing devices.  ...  Therefore, JADE-LEAP is an intuitive choice for mobile agent platform for the pervasive computing devices of our IDS.  ... 
doi:10.1109/itcc.2005.279 dblp:conf/itcc/KannadigaZA05 fatcat:pgzv7fcj6zbrdauch4ugy3tcfa

PerZoovasive

José Rouillard, Mona Laroussi
2008 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology - CSTST '08  
This paper discusses adaptivity and context awareness system as strategies to provide support for learners in mobile pervasive situations.  ...  Which role can be played by QR Codes in a pervasive environment? Can this experimentation be used in other learning situations?  ...  He gives here a first definition of pervasive computing.  ... 
doi:10.1145/1456223.1456332 dblp:conf/wstst/RouillardL08 fatcat:jneeo673yjfxtazihow4zjbmli

A Pervasive Computing Curriculum for Engineering and Science Students

Fei Hu, Ankur Teredesai
2007 IEEE pervasive computing  
T oday, there's an urgent need for welltrained pervasive computing engineers and scientists.  ...  With the support of the US National Science Foundation and Cisco, we implemented a multidisciplinary Pervasive Computing Lab and have developed relevant courses for both CE and CS students.  ...  Please send me your comments and A Pervasive Computing Curriculum for Engineering and Science Students Fei Hu and Ankur Teredesai 88 PERVASIVE computing Published by the IEEE Computer Society  ... 
doi:10.1109/mprv.2007.3 fatcat:cixri4toz5hkte4n3vudpimn5u

A cost-effective approach to software-in-the-loop simulation of pervasive systems and applications

Giacomo Brambilla, Alessandro Grazioli, Marco Picone, Francesco Zanichelli, Michele Amoretti
2014 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS)  
Testing pervasive systems in a controlled environment is not sufficient to find and evaluate the possible properties and issues.  ...  On the other hand, the simulation of largescale systems is usually based on approximated models and simulation-specific code, which are not representative of all system details.  ...  for the simulation of node behavioral models • Definition of best practices for the development of software adapters for the integration of deployment code and simulation packages Over view Mobility  ... 
doi:10.1109/percomw.2014.6815202 dblp:conf/percom/BrambillaGPZA14 fatcat:nodra4bctfaetbqqzsfnbnkmxi

What the heck is this application doing? – A security-by-contract architecture for pervasive services

N. Dragoni, F. Massacci, T. Walter, C. Schaefer
2009 Computers & security  
Future pervasive environments are characterized by non-fixed architectures made of users and ubiquitous computers.  ...  To address the challenges of this paradigm we propose the notion of security-by-contract (S×C ), as in programming-by-contract, based on the notion of a mobile contract that a pervasive download carries  ...  Acknowledgement The author would like to thank the anonymous reviewers for their fruitful comments.  ... 
doi:10.1016/j.cose.2009.06.005 fatcat:u6umd5qg2bf5jg3atvbv3spgai

MiPeG: A middleware infrastructure for pervasive grids

Antonio Coronato, Giuseppe De Pietro
2008 Future generations computer systems  
Grid computing and pervasive computing have affirmed respectively as the paradigm for high performance computing and the paradigm for user-friendly computing.  ...  The conjunction of such paradigms are now generating a new one: the Pervasive Grid Computing. This paper presents a middleware for pervasive grid applications.  ...  In particular, terms like Grid Computing, Pervasive Computing and Utility Computing have become common usage not only in the scientific and academic world, but also in business fields.  ... 
doi:10.1016/j.future.2007.04.007 fatcat:h72eruhftfaixcychwrjko74si

A CRITICAL ANALYSIS OF PERVASIVE COMPUTING IN EMBEDDED SYSTEMS USING INTERNET OF THINGS

Ankita Sharma
2017 International Journal of Advanced Research in Computer Science  
Pervasive computing is completely opposite to the desktop paradigm, which makes use of a single user and a single device for a particular purpose, on the other hand one who uses pervasive computing gets  ...  This paper focuses on the basic concepts of pervasive computing and pervasive computing in embedded systems using internet of things.  ...  This is where pervasive computing come into picture when distributed computing is followed by mobile computing Architecture of Pervasive Computing II.  ... 
doi:10.26483/ijarcs.v8i9.5179 fatcat:6dgcjkjp7fgutlc47qxjxhnhua

Cloud-Enabled Wireless Body Area Network for Pervasive Health Care

Jarubula Priyanka
2016 Asia-pacific Journal of Convergent Research Interchange  
In this project, we tend to primarily finish the support of mobile cloud computing, wireless body space networks may be considerably increased for enormous preparation of pervasive aid applications.  ...  This paper presents a platform supported cloud computing for management of mobile and wearable aid sensors, demonstrating this fashion the cloud paradigm applied on pervasive aid.  ...  The presented system is distinctive as an ardent answer for managing patient-related knowledge on the cloud which utilizes each open hardware and open code resources for developing the hardware and code  ... 
doi:10.21742/apjcri.2016.09.06 fatcat:k6erzqvwjvfddpcyxy5iuxedni

Pervasive 2007: It's about the User

Maria Vicente A. Bonto-Kane, Alvin Chin, Sheila Mc Carthy, Mayuree Srikulwong, Paul J. Timmins
2007 IEEE pervasive computing  
They found advantages to NFC tags for trained users but found 2D bar codes more effective for untrained users.  ...  P ervasive 2007 provided a view of future possibilities, interactions, and applications for pervasive computing.  ... 
doi:10.1109/mprv.2007.79 fatcat:x246kwfo6bda3ethwt3pspxzs4

Environment mobility

Dag Johansen, H�vard Johansen, Robbert van Renesse
2004 Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing -  
In this position paper, we focus on issues related to middleware support for software mobility in ad hoc and pervasive systems.  ...  In particular, we are interested in moving the computational environment of a mobile user following his trajectory.  ...  That is, mobility should be a first order design principle for any pervasive application.  ... 
doi:10.1145/1028509.1028518 dblp:conf/middleware/JohansenJR04 fatcat:tnhyjqoyu5cylinsyz7exeond4
« Previous Showing results 1 — 15 out of 47,175 results