112 Hits in 4.3 sec

Introduction to the special issue on PerCom 2005

Klara Nahrstedt, Philip McKinley, Mukesh Singhal
2005 Pervasive and Mobile Computing  
Introduction to the special issue on PerCom 2005 We would like to welcome you to the Special Issue on Pervasive Computing and Communications.  ...  This issue contains extended versions of four papers presented at the Third IEEE International Conference on Pervasive Computing and Communications (PerCom 2005) , held March 8-12, 2005 in Kauai, Hawaii  ... 
doi:10.1016/j.pmcj.2005.10.001 fatcat:j2tbumsotzbjhlgq2tfpwjttga

A Picture of Present Ubicomp Research Exploring Publications from Important Events in the Field

Thiago Henrique Silva, Clayson S. F. de S. Celes, Vinicius Fernandes Soares Mota, Antonio Alfredo Ferreira Loureiro
2012 Journal of Applied Computing Research  
In this work we use a dataset of papers published in top conferences focused on ubiquitous computing (ubicomp) to provide an overview and analysis of recent ubiquitous computing research performed internationally  ...  This study is useful to guide novices in the field and it also provides experienced researchers with facts enabling the discussion of ubicomp research.  ...  They were created when we identified at least three papers related to a "specialization" of the category.  ... 
doi:10.4013/jacr.2012.21.04 fatcat:g2d7qzteo5b5hdbzhdpcagout4

Special Issue on Companion Technologies

Susanne Biundo, Daniel Höller, Pascal Bercher
2015 Künstliche Intelligenz  
Content This issue starts with an introduction to Companion-Technology [48] ; it reviews relevant research areas; possible fields of application of the technology; and related research projects including  ...  In the community part of this issue, there is also a conference report on the first International Symposium on Companion-Technology [59] .  ... 
doi:10.1007/s13218-015-0421-9 fatcat:xsqhcswlirbt3itqsw4fmvdji4

Electronic - Medicine Monitoring System

2011 International Journal of Computer Science and Informatics  
The number of deaths has been quite increasing because of lack of adequate knowledge about solving these issues.  ...  Pharmaceuticals are one of the most profitable business today, being unsatisfied with this profit, many of them have involved in sale of fake and expired medicines.  ...  INTRODUCTION At present the growth rate of various countries are increasing, due to globalization.  ... 
doi:10.47893/ijcsi.2011.1013 fatcat:vjzdwvwojbasricoqfnjeb5he4

Lower level relationships in the mushroom genus Cortinarius (Basidiomycota, Agaricales): A comparison of RPB1, RPB2, and ITS phylogenies

T.G. Frøslev, P.B. Matheny, D.S. Hibbett
2005 Molecular Phylogenetics and Evolution  
combination with and compared to the widely used ribosomal marker ITS.  ...  have proven very diYcult to resolve with the ribosomal markers, nLSU and ITS.  ...  This work was partially supported by the Assembling the Fungal Tree of Life project (National Science Foundation award DEB-0228657) to DSH.  ... 
doi:10.1016/j.ympev.2005.06.016 pmid:16085431 fatcat:c4vpup63ibc27hbksrxhhhewwy

Traffic management for mobile broadband networks

David Soldani, Sajal K. Das, Mahbub Hassan, Jahan A. Hassan, Giridhar D. Mandyam
2011 IEEE Communications Magazine  
to the main traffic management issues in mobile broadband networks.  ...  He is the founder of IEEE WoWMoM symposium and co-founder of IEEE PerCom conference.  ... 
doi:10.1109/mcom.2011.6035822 fatcat:hymmpyqwjnb3fe2muuw2bvp7hi

Research Intuitions of Asymmetric Crypto System

Rojasree V. Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
This paper highlights issues and challenges to be faced from quantum computing and draws the attention of network researchers to march towards researching on quantum-safe algorithms.  ...  The encryption on the communication channel can implement either public or private key algorithms based on the area of applications.  ...  /PERCOM.2005.18.  ... 
doi:10.17762/turcomat.v12i3.2016 fatcat:wtuw4sszjrhcnk6tyowpm27xr4

Energy-Efficient Data Caching and Prefetching for Mobile Devices Based on Utility

Huaping Shen, Mohan Kumar, Sajal K. Das, Zhijun Wang
2005 Journal on spesial topics in mobile networks and applications  
Based on the utility function derived from the analytical model, we propose algorithms for cache replacement and passive prefetching of data objects.  ...  to improve cache hit ratio and re-44 duce access latency.  ...  Kumar is on the editorial board of The Computer Journal and he has 800 guest edited special issues of several leading international journals including 801 MONET and WINET issues and the IEEE Transactions  ... 
doi:10.1007/s11036-005-1559-8 fatcat:ek6rjvadtzdgtjdmc6c7xvupfi


Raffaele Bruno, Marco Conti, Maddalena Nurchis
2012 International Journal of Adaptive, Resilient and Autonomic Systems  
Most of the existing opportunistic approaches base the forwarder selection on end-to-end principles.  ...  quality distributions one from the other.  ...  He served as guest editor for a Special Issue of the Pervasive and Mobile Computing (PMC) Journal as editor of two Fast Track sections on Computer Communication Journal.  ... 
doi:10.4018/jaras.2012070104 fatcat:udl4fmaspzb7haqdytbyyhpxci

CoPTUA: Consistent Policy Table Update Algorithm for TCAM without locking

Z. Wang, H. Che, Mohan Kumar, S.K. Das
2004 IEEE transactions on computers  
To avoid erroneous and inconsistent rule matching, the traditional approach is to lock the PF table during the rule update period, but table locking has a negative impact on data path processing.  ...  Instead of minimizing the number of rule moves to reduce the locking time, CoPTUA maintains a consistent PF table throughout the update process, thus eliminating the need for locking the PF table while  ...  (PerCom) and served as the program chair for PerCom 2003 and is the general chair for PerCom 2005.  ... 
doi:10.1109/tc.2004.108 fatcat:ogx77kokardmvjqhkl4libtwe4

Privacy preservation in wireless sensor networks: A state-of-the-art survey

Na Li, Nan Zhang, Sajal K. Das, Bhavani Thuraisingham
2009 Ad hoc networks  
Much of the existing work on wireless sensor networks (WSNs) has focused on addressing the power and computational resource constraints of WSNs by the design of specific routing, MAC, and cross-layer protocols  ...  Our hope is that this paper sheds some light on a fruitful direction of future research for privacy preservation in WSNs.  ...  Any opinion, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1016/j.adhoc.2009.04.009 fatcat:v2daasfks5dijhqnledvfjdcgy

Severless Search and Authentication Protocols for RFID

Chiu C. Tan, Bo Sheng, Qun Li
2007 Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07)  
Singapore, May 2005.  ...  The first problem is fundamental issue in RFID research, 2 Related Work the ability to distinguish a real RFID tag from a fake RFID tag, to differentiate a tag that belongs to one owner from  ... 
doi:10.1109/percom.2007.30 dblp:conf/percom/TanSL07 fatcat:wtmn4t2rhbb3lgxkz5lg2vvizq

Implementing the draft W3C semantic sensor network ontology

Daniel O'Byrne, Rob Brennan, Declan O'Sullivan
2010 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
This paper examines the feasibility of using ontologies to model generic sensor networks, based on the capabilities of the current generation of ontology tools.  ...  The creation of such an ontology, the current tool's capacity to adequately maintain it, and its potential functionality, as part of a larger semantic system are addressed here.  ...  We go on to describe the architecture of our prototype and the specialized version of the draft W3C sensor network ontology we developed.  ... 
doi:10.1109/percomw.2010.5470668 dblp:conf/percom/OByrneBO10 fatcat:vinv4ug22fempersveframo44q

Hierarchical Role-based Data Dissemination for large-scale wireless sensor networks with mobile sinks

Guo-He Ye, Lo-Yao Yeh, Jiun-Long Huang
2010 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
The simulation results justify that HRDD has the capability to reduce the energy consumption in the wireless sensor networks and to prolong network lifetime.  ...  In HRDD, we use a hierarchical cluster-based structure to discover and maintain the routing paths for distributing data to the mobile sink.  ...  HRDD assigns the special roles, index agent and gateway Agent, to some nodes to greatly improve overall system scalability and lifetime. HRDD settles the data dissemination challenges in WSNs : S1.  ... 
doi:10.1109/percomw.2010.5470615 dblp:conf/percom/YeYH10 fatcat:a2a3hhu4zvc4tmkeb2jj5fywka

Elderly medication adherence monitoring with the Internet of Things

Xiaoping Toh, Hwee-Xian Tan, Huiguang Liang, Hwee-Pink Tan
2016 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)  
Non-adherence among the elderly is a common issue that leads to adverse health complications, particularly among those with chronic conditions.  ...  In this paper, we use the Internet of Things to monitor medication adherence and detect changes in medication consumption patterns among the elderly, thus enabling timely interventions by caregivers to  ...  ACKNOWLEDGMENT This paper is based on the research project 'SHINESeniors' at the SMU-TCS iCity Lab.  ... 
doi:10.1109/percomw.2016.7457133 dblp:conf/percom/TohTLT16 fatcat:nfocow3qazadvaxnnaurricvei
« Previous Showing results 1 — 15 out of 112 results