


default search action
Pervasive and Mobile Computing, Volume 2
Volume 2, Number 1, February 2006
- Jeff Burke, Jonathan Friedman, Eitan Mendelowitz, Heemin Park, Mani B. Srivastava:

Embedding expression: Pervasive computing architecture for art and entertainment. 1-36 - Karen Henricksen, Jadwiga Indulska

:
Developing context-aware pervasive computing applications: Models and approach. 37-64 - Atul Verma, Hemjit Sawant, Jindong Tan

:
Selection and navigation of mobile sensor nodes using a sensor network. 65-84 - Ali R. Hurson

, Angela Maria Muñoz-Avila, Neil Orchowski, Behrooz A. Shirazi, Yu Jiao:
Power-aware data retrieval protocols for indexed broadcast parallel channels. 85-107
Volume 2, Number 2, April 2006
- Mukesh Singhal, Ali R. Hurson

:
Guest Editors' Note. 109-110 - Bin Xie, Anup Kumar, Dharma P. Agrawal, S. Srinivasan:

Secured macro/micro-mobility protocol for multi-hop cellular IP. 111-136 - Afrand Agah, Kalyan Basu, Sajal K. Das

:
Security enforcement in wireless sensor networks: A framework based on non-cooperative games. 137-158 - Jing Deng, Richard Han

, Shivakant Mishra:
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. 159-186 - Jiannong Cao

, Lin Liao, Guojun Wang:
Scalable key management for secure multicast communication in the mobile environment. 187-203 - Phongsak Keeratiwintakorn, Prashant Krishnamurthy:

An energy efficient security protocol for IEEE 802.11 WLANs. 204-231
Volume 2, Number 3, September 2006
- Nicolas Montavont, Thomas Noël:

Stronger interaction between link layer and network layer for an optimized mobility management in heterogeneous IPv6 networks. 233-261 - Venkata C. Giruka, Mukesh Singhal:

Two scalable location service protocols for wireless ad hoc networks. 262-285 - Yuan-Ying Hsu, Yu-Chee Tseng, Chien-Chao Tseng

, Chi-Fu Huang, Jung-Hsuan Fan, Hsiao-Lu Wu:
Design and implementation of two-tier MANETs with seamless roaming and load-balancing routing capability. 286-299 - An-Pin Chen, Tien-Hwa Ho:

Location Aided Mobile Peer-to-Peer system. 300-312 - Mijeom Kim, Mohan Kumar, Behrooz A. Shirazi:

Service discovery using volunteer nodes in heterogeneous pervasive computing environments. 313-343 - Urs Hengartner, Peter Steenkiste

:
Exploiting information relationships for access control in pervasive computing. 344-367
Volume 2, Number 4, November 2006
- Marco Conti

, Chatschik Bisdikian, Jadwiga Indulska
, Franco Zambonelli
:
PerCom 2006 special issue. 369-371 - Sajal K. Das

, Nirmalya Roy, Abhishek Roy:
Context-aware resource management in multi-inhabitant smart homes: A framework based on Nash H. 372-404 - Melanie R. Rieback, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum

:
RFID malware: Design principles and examples. 405-426 - Urs Hengartner, Peter Steenkiste

:
Avoiding privacy violations caused by context-sensitive services. 427-452 - Andrew C. Rice, Robert K. Harle, Alastair R. Beresford:

Analysing fundamental properties of marker-based vision system designs. 453-471 - Francisco J. Ballesteros, Enrique Soriano

, Gorka Guardiola
, Katia Leal
:
The Plan B OS for ubiquitous computing. Voice control, security, and terminals as case studies. 472-488

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














