Academic literature on the topic 'Pervasive computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Pervasive computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Pervasive computing"

1

Kaye, J. "Making pervasive computing pervasive." Gerontechnology 17, s (April 24, 2018): 3. http://dx.doi.org/10.4017/gt.2018.17.s.003.00.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ebling, Maria R., and Roy Want. "Pervasive Computing Revisited." IEEE Pervasive Computing 16, no. 3 (2017): 17–19. http://dx.doi.org/10.1109/mprv.2017.2940959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Girouard, Audrey, Andrew L. Kun, Anne Roudaut, Orit Shaer, and Andrew L. Kun. "Pervasive Computing Education." IEEE Pervasive Computing 17, no. 4 (October 1, 2018): 9–12. http://dx.doi.org/10.1109/mprv.2018.2878999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bacon, J. "Toward pervasive computing." IEEE Pervasive Computing 1, no. 2 (April 2002): 84. http://dx.doi.org/10.1109/mprv.2002.1012341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schmidt, Albrecht, Joseph Paradiso, and Brian Noble. "Automotive pervasive computing." IEEE Pervasive Computing 10, no. 3 (2011): 12–13. http://dx.doi.org/10.1109/mprv.2011.45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mattern, Friedemann. "Pervasive/Ubiquitous Computing." Informatik-Spektrum 24, no. 3 (June 1, 2001): 145–47. http://dx.doi.org/10.1007/s002870100158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Farooq, Muhammad Shoaib, Taha Mubbashar Rabbani, Atif Alvi, and Muhammad Athar Naem. "Pervasive Computing Issues, Vision an Exclusive Relationship Of Pervasive And Cloud Computing." VFAST Transactions on Software Engineering 10, no. 2 (May 13, 2022): 09–16. http://dx.doi.org/10.21015/vtse.v10i2.970.

Full text
Abstract:
Abstract Pervasive computing also known by the name of ubiquitous computing is a computer paradigm which focuses the integration of self-communicating and intelligent devices into user’s environment and daily life. Its major principle is to infuse computing into real world environment in such way that user cannot even realize it is existing. One of the best available source is mobile devices which can help with everything happening in real life. Mobile devices are not the only sources but they can be use to perform all the operations like downloading, uploading, computing the data, processing any type of data including audio video formats. The major issue could be the storage of such devices and the load taking to perform complex tasks. To tackle such issues, there is a need of cloud computing. Virtual Cloud computing could be the helpful as it provides the environment in which the larger data can be access pervasively. In this paper we will discuss how pervasive computing and cloud computing are associated with each other and how they can be beneficial to each other.
APA, Harvard, Vancouver, ISO, and other styles
8

Bratton, Benjamin H. "Accounting for Pervasive Computing." Afterimage 30, no. 1 (July 2002): 13–14. http://dx.doi.org/10.1525/aft.2002.30.1.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ortmeier, Frank. "Dependability in Pervasive Computing." Journal of Information Technology Research 5, no. 1 (January 2012): 1–17. http://dx.doi.org/10.4018/jitr.2012010101.

Full text
Abstract:
In 1988, Marc Weiser was one of the first computer scientists who envisioned that computers would become invisible; that computing power and communication technology would become part of many objects of society’s daily life. Many modern systems would not be able without pervasive technology. Today, most such systems might be invisible or wearable, but society is either still aware of them or they only communicate to a limited extent with each other. In the near future many objects of day to day life will be equipped with some kind of computing and communication capability and people won’t be aware of it anymore. The great benefit is that they will offer citizens support and guidance in everyday life. For example, most people do not know that nice features like jam prediction and avoidance rely on feedback of the navigation system to some centralized server clusters. These analyze the data and thus predict possible traffic jams. Although, dependability issues most often form rigid limits. Because the systems are so smoothly integrated into normal life, they are expected to be robust against intended manipulations to guarantee functional requirements and/or to be traceable and understandable for the human user. In addition, the adaptive nature of many Pervasive Computing systems makes them very difficult to analyze and predict.
APA, Harvard, Vancouver, ISO, and other styles
10

Agha, Gul. "Computing in pervasive cyberspace." Communications of the ACM 51, no. 1 (January 2008): 68–70. http://dx.doi.org/10.1145/1327452.1327484.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Pervasive computing"

1

Long, Nguyen Hoang. "Authentication protocols in pervasive computing." Thesis, University of Oxford, 2009. https://ora.ox.ac.uk/objects/uuid:d21c0ce6-5dd6-43ef-b6c6-01346d02031b.

Full text
Abstract:
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably identity theft, and creates new requirements for secure communication. A recently proposed approach to creating secure communication is to use human trust and human interactions. These approaches potentially eliminate the need for passwords as in Bluetooth, shared secrets or trusted parties, which are often too complex and expensive to use in portable devices. In this new technology, handheld devices exchange data (e.g. payment, heart rates or public keys) over some medium (e.g. WiFi) and then display a short and non-secret digest of the protocol's run that the devices' human owners manually compare to ensure they agree on the same data, i.e. human interactions are used to prevent fraud. In this thesis, we present several new protocols of this type which are designed to optimise the work required of humans to achieve a given level of security. We discover that the design of these protocols is influenced by several principles, including the ideas of commitment without knowledge and separation of security concerns, where random and cryptographic attacks should be tackled separately. Underpinning the technology is a new cryptographic function, termed a keyed digest function, which produces a short number for humans to compare. This is similar to the notion of a universal hash function, but its output length is shorter (e.g. 16 bits). Hence, it should be faster to compute. We propose several digest constructions using Toeplitz matrices, integer multiplication and pseudorandom numbers. The application of digest functions leads us to develop more efficient alternatives to standard digital signatures. Our protocol security analysis leads to a new bound on the key length for an almost universal hash function, which can be derived by the pigeon-hole principle. The new bound turns out to be tighter than another similar bound derived from the combination of the Singleton bound in coding theory and an equivalence between error-correcting codes and almost universal hash functions.
APA, Harvard, Vancouver, ISO, and other styles
2

Abukmail, Ahmed Ahed. "Pervasive computing approach to energy management." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0013060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Malik, Yasir. "Towards Evaluation of Pervasive Computing System." Thèse, Université de Sherbrooke, 2014. http://hdl.handle.net/11143/6020.

Full text
Abstract:
Résumé : L’informatique diffuse est le passage du paradigme informatique vers l’informatique partout. L’émergence couvre principalement l’informatique mobile et distribuée, les réseaux de capteurs, l’interaction homme-machine et l’intelligence artificielle sous l’égide de l’informatique diffuse. Des efforts considérables ont été mis sur les recherches dans ce domaine, mais il n’existe pas de normes ou des méthodologies communément acceptées pour évaluer ces systèmes et de définir des nouvelles orientations de recherche dans le futur. Cette thèse s’attaque au problème d’évaluation des systèmes informatiques ubiquitaires. La question de recherche notamment le quoi et comment évaluer n’a pas encore été résolue. Dans l’objectif de trouver une réponse à cette question et d’élaborer un cadre général d’évaluation, nous avons procédé comme suit. Pour répondre à la première partie de la question, “Quoi évaluer”, nous avons tout d’abord classè les systèmes en se basant sur certains critères, et nous avons défini ensuite les principaux paramètres pour évaluer ces systèmes. Pour ce faire, nous avons étudié différents aspects de l’informatique diffuse et nous les avons classés en onze différents aspects d’évaluation. Pour chaque aspect, nous avons identifiè les principaux paramètres qui peuvent être caractérisés et mesurés. Cette taxonomie n’est pas assez exhaustive, mais elle reflète le schéma de classification le mieux adaptè pour des évaluations effectives. Cependant, pour que l’évaluation soit la plus complète possible, nous avons jugé nécessaire d’incorporer l’utilisateur dans le processus d’évaluation. À cet effet, nous avons proposè un modèle d’évaluation qui prend en compte les besoins de l’utilisateur, le contexte dans lequel la technologie sera utilisée, et l’environnement d’exploitation dans lequel le système va être déployé. Le modèle proposè constitue une première étape vers le développement des directives et standards d’évaluation qui peuvent être utilisés peuvent être utilisées pendant les évaluations formatives et sommatives. Une autre question complémentaire à l’évaluation des performances est la validation fonctionnelle d’un système en cours d’exécution, qui confirme que le système est conforme aux exigences fonctionnelles et ne contient pas de failles. Pour répondre à la deuxième partie de la question à savoir “comment évaluer”, nous avons adoptè les techniques formelles de vérification et de validation. Comme le champ d’application du projet est très large, nous sommes concentrés sur l’évaluation au premier stade de la conception afin de vérifier et de valider l’exactitude fonctionnelle de la conception de systèmes. Pour la preuve de concept, nous avons appliqué deux méthodes, dans la première méthode, nous avons étudié les approches de vérification automatique et nous avons choisi la technique la plus connue qu’est le “model checking” pour vérifier les exigences fonctionnelles d’un système de gestion des médicaments basé sur le contexte pour des personnes âgées dans une maison Intelligente. Cette approche est complémentaire aux tests et à l’évaluation et permet aux concepteurs de vérifier le comportement de leurs systèmes par rapport aux exigences fonctionnelles avant le développement du prototype de système. Certaines propriétés de base, telles que la disponibilité ou la vivacité, l’interblocage, la comparaison des spécifications et implémentations et l’analyse d’accessibilité, sont également vérifiées à ce stade. Dans la deuxième méthode, nous avons étudié les approches de vérification d’exécution et nous avons adoptè la technique de conception par le contrat pour modéliser et vérifier la sémantique et exigences de l’interopérabilité des services dans les environnements intelligents. L’avantage de cette approche réside dans la vérification automatique en temps réel de l’interopérabilité des services dans les environnements intelligents. // Abstract : Summary performance evaluations. The proposed model is a step towards forming standard evaluation guidelines that can be used during formative and summative evaluations. A complementary issue to performance evaluation is functional correctness of a running system, which confirms that the system fulfills its functional requirements and does not contain any flaws. To address the second part of the question that is “ how to evaluate ”, we have adopted the well-known formal verification and validation techniques. As the scope of the project is very big, the focus of this thesis is on early design stage evaluation to verify and validate the functional correctness of the systems design. For the proof-of-concept, we applied two methods: In the first method, we studied automatic verification approaches and used a well-known model checking approach to model and verify the functional requirements of a context aware medication management system for the elderly in a Smart House. This approach is complementary to testing and evaluation, it allows designers to verify their system behavior against its functional requirements before developing the system prototype. Some basic properties like the availability or liveliness, deadlock checking, matching of specification and implementation, and reachability analysis are verified. In the second method, we studied the runtime verification approaches and used design by contract technique to model and verify the semantic and pragmatic service interoperability requirements in smart environments. The analysis of this technique and results are presented. The benefit of the approach is automatic verification of services interoperability in smart environments on the fly.
APA, Harvard, Vancouver, ISO, and other styles
4

Thompson, Michael Stewart. "Service Discovery in Pervasive Computing Environments." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/29133.

Full text
Abstract:
Service discovery is a driving force in realizing pervasive computing. It provides a way for users and services to locate and interact with other services in a pervasive computing environment. Unfortunately, current service discovery solutions do not capture the effects of the human or physical world and do not deal well with diverse device populations; both of which are characteristics of pervasive computing environments. This research concentrates on the examination and fulfillment of the goals of two of the four components of service discovery, service description and dissemination. It begins with a review of and commentary on current service discovery solutions. Following this review, is the formulation of the problem statement, including a full explanation of the problems mentioned above. The problem formulation is followed by an explanation of the process followed to design and build solutions to these problems. These solutions include the Pervasive Service Description Language (PSDL), the Pervasive Service Query Language (PSQL), and the Multi-Assurance Delivery Protocol (MADEP). Prototype implementations of the components are used to validate feasibility and evaluate performance. Experimental results are presented and analyzed. This work concludes with a discussion of overall conclusions, directions for future work, and a list of contributions.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
5

Schiele, Gregor Alexander. "System support for spontaneous pervasive computing environments." kostenfrei, 2007. http://deposit.d-nb.de/cgi-bin/dokserv?idn=985989661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nigam, Atish 1981. "Analytical techniques for debugging pervasive computing environments." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/17962.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.
Includes bibliographical references (p. 63-65).
User level debugging of pervasive environments is important as it provides the ability to observe changes that occur in a pervasive environment and fix problems that result from these changes, especially since pervasive environments may from time to time exhibit unexpected behavior. Simple keepalive messages can not always uncover the source of this behavior because systems can be in an incorrect state while continuing to output information or respond to basic queries. The traditional approach to debugging distributed systems is to instrument the entire environment. This does not work when the environments are cobbled together from systems built around different operating systems, programming languages or platforms. With systems from such disparate backgrounds, it is hard to create a stable pervasive environment. We propose to solve this problem by requiring each system and component to provide a health metric that gives an indication of its current status. Our work has shown that, when monitored at a reasonable rate, simple and cheap metrics can reveal the cause of many problems within pervasive environments. The two metrics that will be focused on in this thesis are transmission rate and transmission data analysis. Algorithms for implementing these metrics, within the stated assumptions of pervasive environments, will be explored along with an analysis of these implementations and the results they provided. Furthermore, a system design will be described in which the tools used to analyze the metrics compose an out of bound monitoring system that retains a level of autonomy from the pervasive environment. The described system provides many advantages and additionally operates under the given assumptions regarding the resources available
(cont.) within a pervasive environment.
by Atish Nigam.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
7

O'Keeffe, Daniel Brendan. "Distributed complex event detection for pervasive computing." Thesis, University of Cambridge, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Millard, Ian C. "Contextually aware pervasive computing : a semantic approach." Thesis, University of Southampton, 2008. https://eprints.soton.ac.uk/266002/.

Full text
Abstract:
We live in a world which is becoming increasingly rich in technology, with a wide array of portable and embedded devices being readily available and surrounding us in everyday use. Similarly, advances in communications technologies and the explosive growth of data being published on the Internet have provided access to information on an unparalleled scale. However, device interoperability is often poor at best, and accessing data which is relevant to any given situation can be difficult due to the sheer quantity of information which is available. A contextually aware environment is envisioned as one in which integrated computer systems have an understanding or representation of not only the physical space and the resources within it, but also the activities, interests, actions and intent of the human occupants at any given time. Given such knowledge, a contextually aware and technology rich pervasive environment may offer services and applications which attempt to adapt the surroundings in a manner which assists its users, such as by configuring devices or assimilating information which is relevant to activities currently being undertaken. The research presented in this thesis combines the fields of knowledge management, semantic technologies, logic and reasoning with those from the predominantly hardware and communications oriented field of pervasive computing, in order to facilitate the creation of contextually aware environments. Requirements for such a system are discussed in detail, resulting in the development of a generic framework of components and data representations from which domain specific deployments can be created. To demonstrate and test the proposed framework, experimentation has been conducted in the example domain of an academic environment, including the development of two contextually aware applications. The experiences and lessons learned during this research are documented throughout, and have influenced the proposed avenues for future related research in this area.
APA, Harvard, Vancouver, ISO, and other styles
9

Schiele, Gregor. "System support for spontaneous pervasive computing environments." [S.l. : s.n.], 2007. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-32709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kostakos, Vassilis. "A design framework for pervasive computing systems." Thesis, University of Bath, 2004. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.409882.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Pervasive computing"

1

Fishkin, Kenneth P., Bernt Schiele, Paddy Nixon, and Aaron Quigley, eds. Pervasive Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11748625.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Floréen, Patrik, Antonio Krüger, and Mirjana Spasojevic, eds. Pervasive Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12654-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mattern, Friedemann, and Mahmoud Naghshineh, eds. Pervasive Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45866-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Silvis-Cividjian, Natalia. Pervasive Computing. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-51655-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lyons, Kent, Jeffrey Hightower, and Elaine M. Huang, eds. Pervasive Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21726-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Indulska, Jadwiga, Donald J. Patterson, Tom Rodden, and Max Ott, eds. Pervasive Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-79576-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

LaMarca, Anthony, Marc Langheinrich, and Khai N. Truong, eds. Pervasive Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72037-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hassanien, Aboul-Ella, Jemal H. Abawajy, Ajith Abraham, and Hani Hagras, eds. Pervasive Computing. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84882-599-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gellersen, Hans W., Roy Want, and Albrecht Schmidt, eds. Pervasive Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/b136550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tokuda, Hideyuki, Michael Beigl, Adrian Friday, A. J. Bernheim Brush, and Yoshito Tobe, eds. Pervasive Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01516-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Pervasive computing"

1

Ferscha, Alois, Clemens Holzmann, Manfred Hechinger, Bernadette Emsenhuber, Stefan Resmerita, Simon Vogl, and Bernhard Wally. "Pervasive Computing." In Hagenberg Research, 379–431. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-02127-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Czernohous, Christoph. "Pervasive Computing." In Pervasive Linux, 3–7. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-540-68426-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saha, Debashis, Amitava Mukherjee, and Somprakash Bandyopadhyay. "Pervasive Computing." In Networking Infrastructure for Pervasive Computing, 1–37. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-1143-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schiele, Gregor, Marcus Handte, and Christian Becker. "Pervasive Computing Middleware." In Handbook of Ambient Intelligence and Smart Environments, 201–27. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-93808-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ross, Joel. "Pervasive Human Computing." In Handbook of Human Computation, 333–45. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8806-4_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Varshney, Upkar. "Pervasive Computing and Healthcare." In Pervasive Healthcare Computing, 39–62. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-0215-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Oppermann, Leif, and Michaela Slussareff. "Pervasive Games." In Entertainment Computing and Serious Games, 475–520. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46152-6_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Saha, Debashis, Amitava Mukherjee, and Somprakash Bandyopadhyay. "Pervasive Networking." In Networking Infrastructure for Pervasive Computing, 39–57. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-1143-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Van Laerhoven, Kristof. "The Pervasive Sensor." In Ubiquitous Computing Systems, 1–9. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11526858_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chalmers, Dan. "Hardware for Pervasive Computing." In Undergraduate Topics in Computer Science, 29–40. London: Springer London, 2011. http://dx.doi.org/10.1007/978-0-85729-841-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Pervasive computing"

1

Huang, Andrew C., Benjamin C. Ling, and Shankar Ponnekanti. "Pervasive computing." In the 1st ACM international workshop. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/313300.313414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hui Lei. "Smarter pervasive computing." In 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, 2017. http://dx.doi.org/10.1109/percom.2017.7917844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Woodcock, Andrée, John Burns, Sarah Mount, Robert Newman, and Elena Gaura. "Animating pervasive computing." In the 23rd annual international conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1085313.1085341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chien, Andrew A. "Pervasive parallel computing." In the 12th ACM SIGPLAN symposium. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1229428.1229467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Pervasive computing [breaker page]." In 2013 Fifth International Conference on Advanced Computing (ICoAC). IEEE, 2013. http://dx.doi.org/10.1109/icoac.2013.6921913.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bakhouya, Mohamed. "Ubiquitous and pervasive computing." In the 3rd workshop. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1568181.1568183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Briggs, Pam, and Linda Little. "Pervasive computing and disability." In the 2nd International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1579114.1579154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Camara, António S. "Innovations in pervasive computing." In the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1081706.1081708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gouin-Vallerand, Charles, Bessam Abdulrazak, Sylvain Giroux, and Mounir Mokhtari. "Toward autonomic pervasive computing." In the 10th International Conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1497308.1497440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lalanda, Philippe, Julie A. McCann, and Ada Diaconescu. "Self-Managing Pervasive Computing." In 2014 IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW). IEEE, 2014. http://dx.doi.org/10.1109/sasow.2014.42.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Pervasive computing"

1

Mills, Kevin L. Networking for pervasive computing. Gaithersburg, MD: National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.sp.500-259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Harry, Tim Finin, and Anupam Joshi. Using OWL in a Pervasive Computing Broker. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada439512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Perich, Filip, Anupam Joshi, Yelena Yesha, and Tim Finin. Collaborative Joins in a Pervasive Computing Environment. Fort Belvoir, VA: Defense Technical Information Center, July 2003. http://dx.doi.org/10.21236/ada440602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ray, Indrakshi, and Indrajit Ray. Addressing Security Challenges in Pervasive Computing Applications. Fort Belvoir, VA: Defense Technical Information Center, October 2010. http://dx.doi.org/10.21236/ada567481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kagal, Lalana, Tim Finin, and Anupam Joshi. A Policy Language for a Pervasive Computing Environment. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada439609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Harry, Tim Finin, and Anupam Joshi. An Ontology for Context-Aware Pervasive Computing Environments. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada439610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Perich, Filip, Anupam Joshi, Yelena Yesha, and Timothy Finin. Neighborhood-Consistent Transaction Management for Pervasive Computing Environments. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada439639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chakraborty, Dipanjan, Anupam Joshi, Yelena Yesha, and Tim Finin. Towards Distributed Service Discovery in Pervasive Computing Environments. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada439642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mislove, Michael W. Probabilistic Models and Interoperability, Pervasive Computing and Security. Fort Belvoir, VA: Defense Technical Information Center, June 2010. http://dx.doi.org/10.21236/ada552469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Judd, Glenn, and Peter Steenkiste. An Integrated Contextual Information Service for Pervasive Computing Applications. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada461190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography