Dissertations / Theses on the topic 'Pervasive computing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Pervasive computing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Long, Nguyen Hoang. "Authentication protocols in pervasive computing." Thesis, University of Oxford, 2009. https://ora.ox.ac.uk/objects/uuid:d21c0ce6-5dd6-43ef-b6c6-01346d02031b.
Full textAbukmail, Ahmed Ahed. "Pervasive computing approach to energy management." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0013060.
Full textMalik, Yasir. "Towards Evaluation of Pervasive Computing System." Thèse, Université de Sherbrooke, 2014. http://hdl.handle.net/11143/6020.
Full textThompson, Michael Stewart. "Service Discovery in Pervasive Computing Environments." Diss., Virginia Tech, 2006. http://hdl.handle.net/10919/29133.
Full textPh. D.
Schiele, Gregor Alexander. "System support for spontaneous pervasive computing environments." kostenfrei, 2007. http://deposit.d-nb.de/cgi-bin/dokserv?idn=985989661.
Full textNigam, Atish 1981. "Analytical techniques for debugging pervasive computing environments." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/17962.
Full textIncludes bibliographical references (p. 63-65).
User level debugging of pervasive environments is important as it provides the ability to observe changes that occur in a pervasive environment and fix problems that result from these changes, especially since pervasive environments may from time to time exhibit unexpected behavior. Simple keepalive messages can not always uncover the source of this behavior because systems can be in an incorrect state while continuing to output information or respond to basic queries. The traditional approach to debugging distributed systems is to instrument the entire environment. This does not work when the environments are cobbled together from systems built around different operating systems, programming languages or platforms. With systems from such disparate backgrounds, it is hard to create a stable pervasive environment. We propose to solve this problem by requiring each system and component to provide a health metric that gives an indication of its current status. Our work has shown that, when monitored at a reasonable rate, simple and cheap metrics can reveal the cause of many problems within pervasive environments. The two metrics that will be focused on in this thesis are transmission rate and transmission data analysis. Algorithms for implementing these metrics, within the stated assumptions of pervasive environments, will be explored along with an analysis of these implementations and the results they provided. Furthermore, a system design will be described in which the tools used to analyze the metrics compose an out of bound monitoring system that retains a level of autonomy from the pervasive environment. The described system provides many advantages and additionally operates under the given assumptions regarding the resources available
(cont.) within a pervasive environment.
by Atish Nigam.
M.Eng.
O'Keeffe, Daniel Brendan. "Distributed complex event detection for pervasive computing." Thesis, University of Cambridge, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609012.
Full textMillard, Ian C. "Contextually aware pervasive computing : a semantic approach." Thesis, University of Southampton, 2008. https://eprints.soton.ac.uk/266002/.
Full textSchiele, Gregor. "System support for spontaneous pervasive computing environments." [S.l. : s.n.], 2007. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-32709.
Full textKostakos, Vassilis. "A design framework for pervasive computing systems." Thesis, University of Bath, 2004. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.409882.
Full textGrimm, Robert. "System support for pervasive applications /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6972.
Full textZeidler, Andreas. "A Distributed Publish/Subscribe Notification Service for Pervasive Environments." Phd thesis, [S.l.] : [s.n.], 2005. http://elib.tu-darmstadt.de/diss/000519.
Full textQuintela, Daniel H. "Pervasive sensing and computing for natural disaster mitigation." [Tampa, Fla.] : University of South Florida, 2005. http://purl.fcla.edu/fcla/etd/SFE0001160.
Full textDragovic, Boris. "CASPEr : containment-aware security for pervasive computing environments." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.614043.
Full textThompson, Mark Kenneth. "Hypermedia link service architectures for pervasive computing environments." Thesis, University of Southampton, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418954.
Full textBevan, Christopher. "Human to computer trust in urban pervasive computing." Thesis, University of Bath, 2011. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.541528.
Full textNogueras, Jorge Rafael 1976. "A stream redirection architecture for pervasive computing environments." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86718.
Full textIncludes bibliographical references (p. 69-70).
by Jorge Rafael Nogueras.
S.M.
Pham, Hubert. "A distributed object framework for pervasive computing applications." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33330.
Full textIncludes bibliographical references (p. 79-81).
This thesis presents a new architectural abstraction for developing dynamic and adaptive software. Separating application logic from implementation mechanism provides developers with a simple API for constructing new application functionality by connecting together a set of generic, distributed software modules. Developers codify adaptive application structure and logic in a simple, synchronous environment, and use the API to control and monitor the resulting implementation of highly parallel and asynchronous module networks. The design and implementation for this architectural abstraction is embodied in the Resources framework, a language- and platform independent software component platform geared for pervasive computing application development.
by Hubert Pham.
M.Eng.
Michalakis, Nikolaos 1978. "Location-aware access control for pervasive computing environments." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/29698.
Full textIncludes bibliographical references (p. 69-73).
In pervasive computing environments certain applications are interested in a user's location in order to provide a service. Such applications would benefit from an architecture that enables users to prove their location prior to requesting a service. We present PA C, an architecture for location-aware access control in pervasive computing environments, where users authenticate their location in order to gain access to resources. PAC preserves user anonymity and uses lightweight security. We evaluate our architecture with respect to its security and its scalability as the number of resources and users increase.
by Nikolaos Michalakis.
M.Eng.
Tseng, Erick N. (Erick Neal) 1979. "Personal health benefits of pervasive computing and feedback." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86732.
Full textIncludes bibliographical references (leaves 227-230).
by Erick N. Tseng.
M.Eng.and S.B.
Covington, Michael J. "A flexible security architecture for pervasive computing environments." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-06072004-131113/unrestricted/covington%5Fmichael%5Fj%5F200405%5Fphd.pdf.
Full textNguyen, Tammy. "Context-aware access control in pervasive computing environments." Online access for everyone, 2005. http://www.dissertations.wsu.edu/Thesis/Summer2005/t%5Fnguyen%5F061005.pdf.
Full textSheng, Bo. "Building efficient wireless infrastructures for pervasive computing environments." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623557.
Full textHu, Haoyu, and 胡昊宇. "ContextTorrent: a context provisioning framewrok for pervasive applications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47028488.
Full textGauger, Matthias. "Integration of wireless sensor networks in pervasive computing scenarios." Berlin Logos-Verl, 2010. http://d-nb.info/1002361559/04.
Full textKong, Choi-yu. "Effective partial ontology mapping in a pervasive computing environment." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B32002737.
Full textAdhikari, Sameer. "Programming Idioms and Runtime Mechanisms for Distributed Pervasive Computing." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/4820.
Full text周彧 and Yuk Chow. "A light-weight mobile code system for pervasive computing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B31227296.
Full textKong, Choi-yu, and 江采如. "Effective partial ontology mapping in a pervasive computing environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B32002737.
Full textAlsiyami, Aeshah Abdulkarim Dammad. "A policy language definition for provenance in pervasive computing." Thesis, University of Sussex, 2012. http://sro.sussex.ac.uk/id/eprint/39401/.
Full textLeon, Orlando (Orlando Wing) 1979. "An extensible communication-oriented routing environment for pervasive computing." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/16848.
Full textIncludes bibliographical references (p. 59-60).
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
The realm of pervasive computing is expanding at a fast pace, and the need for more generalized protocols and systems is in high demand. Bluetooth is a technology with great potential, but it runs over specific protocols standardized only for other Bluetooth devices. This limits connectivity and control of these devices. CORE, the communication-oriented routing environment, is a generalized message-based routing and inter-connect system that provides an implementation and framework for platform-independent, device-independent services and applications over TCP/IP. More importantly, CORE exposes a routing mechanism that allows extensions and abstractions through levels of indirection. Our implementation of CORE allows us to design an extension that will allow Bluetooth and non- Bluetooth devices to communicate, use, and control Bluetooth devices through CORE.
by Orlando Leon.
M.Eng.
Carboni, Davide. "Services in pervasive computing environments : from design to delivery." Thèse, Université de Sherbrooke, 2005. http://savoirs.usherbrooke.ca/handle/11143/5047.
Full textXu, Chang. "Inconsistency detection and resolution for context-aware pervasive computing /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?CSED%202008%20XU.
Full textXu, Fengyuan. "Improving Energy Efficiency and Security for Pervasive Computing Systems." W&M ScholarWorks, 2013. https://scholarworks.wm.edu/etd/1539623629.
Full textArabi, Agha Ihab. "Distributed and adaptive approaches for ubiquitous and pervasive computing." Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCA025.
Full textService Emergence Paradigm (SEP), based on a pervasive computing approach, consists of providing services to users within intended applications, transparently from their intentions, relatively to their needs, and regardless of the time and devices used. This considered paradigm has been proved sufficiently in applications that have context awareness schemes and various working threads. This research focuses on two aspects for providing SEP services. This first aspect is to implement a Physiological Pedestrian Dead Reckoning Approach (PPDR) that corrects position errors in pedestrian dead reckoning systems based on the heart rate parameter. This approach uses specific stochastic models that rely on probability distributions of previously collected heart rate values with respect to their velocities of a user during a treadmill walk. The reason behind this collection is to form a pattern that contributes in adjusting currently read velocities in any future PDR system. The second aspect of this research is the Social Relationship Detection framework (SRD). This approach proposes a mean for exploring the level of relationship between people by observing the network connection pattern of each person over several conditions. These connections, with respect to each condition, are consolidated to form a set that holds different probability distributions. These distributions are formed based on the users’ Wireless Access Point (WAP) connection establishment routine. Afterwards, the distributions of the probabilities are fed into a trained back propagation neural network to detect the level of relationship between candidate users for forthcoming friendship recommendations. This approach is elaborated in a technique that achieves intelligent decision-making whenever the connection pattern to the WAP and the user behavior are changing with time. It is also distinguished from other classical approaches that rely solely on prior knowledge of the convergence of the users’ attributes
Gassen, Jonas Bulegon. "UMA METODOLOGIA PARA O USO DE ONTOLOGIAS APLICADAS À DESCRIÇÃO DE CONTEXTO EM AMBIENTES HOSPITALARES PERVASIVOS." Universidade Franciscana, 2010. http://tede.universidadefranciscana.edu.br:8080/handle/UFN-BDTD/245.
Full textCoordenação de Aperfeiçoamento de Pessoal de Nível Superior
For a hospital environment can be called as "pervasive", it requires that all the entities that are present in this context (like people and equipment) are sinchronized to perform the daily common tasks. Inside these environments, the computational devices should be considered tools to access information and, therefore, they shouldn't be the focus of attention of the professional. Thus, they should be used naturally. For the system to behave in such a way, it is necessary that it adapts itself to the users contexts. One of the most indicated ways to represent these contexts is through ontologies, due to the great expressivity that they allow. However, environments such as proposed require an extremely dynamic system to represent the context in a coherent manner with the changes in this environment, because their professionals encounter a frequent changing of shifts and tasks in which they work with diferent patients and information from diferent sources. To this end, this dissertation proposes an architecture for a hospital pervasive that seeks to provide all the features mentioned above.
Para que um ambiente hospitalar possa vir a tornar-se pervasivo, necessita-se que as entidades presentes neste contexto (como pessoas e equipamentos) estejam em perfeita sincronia para a realização das tarefas comuns do dia-a-dia. Dentro destes ambientes, os dispositivos computacionais devem ser considerados ferramentas para o acesso à informação e, portanto, não devem ser foco de atenção dos profissionais. Desta forma, os mesmos devem ser utilizados de forma natural. Para que o sistema possa se comportar de tal forma, é necessário que o mesmo se adapte ao contexto dos usuários. Uma das maneiras mais indicadas para efetuar a representação destes contextos é através de ontologias, devido a grande expressividade que estas permitem. Entretanto, ambientes como o proposto necessitam de um sistema extremamente dinâmico para representar o contexto de forma coerente com as modificações ocorridas neste ambiente, pois seus profissionais contam com uma freqüente modificação de turnos e tarefas, onde os mesmos trabalham com diferentes pacientes e informações provenientes de diferentes fontes. Para tal, esta dissertação propõe uma arquitetura para um ambiente hospitalar pervasivo que busca prover todas as funcionalidades acima citadas.
Siu, Po-lam Pauline. "Context-aware state management for supporting mobility in a pervasive environment." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B3147858X.
Full textPoschmann, Axel York. "Lightweight cryptography cryptographic engineering for a pervasive world." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/996578153/04.
Full textSiu, Po-lam Pauline, and 蕭寶琳. "Context-aware state management for supporting mobility in a pervasive environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B3147858X.
Full textLu, Heng. "A software testing framework for context-aware applications in pervasive computing." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B41758067.
Full textNordstedt, David Roger. "MicroJini a service discovery and delivery infrastructure for pervasive computing /." [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000338.
Full textTitle from title page of source document. Document formatted into pages; contains xi, 76 p.; also contains graphics. Includes vita. Includes bibliographical references.
Bruneau, Julien. "Developing and Testing Pervasive Computing Applications: A Tool-Based Methodology." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2012. http://tel.archives-ouvertes.fr/tel-00767395.
Full textJakob, Henner. "Towards securing pervasive computing systems by design: a language approach." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2011. http://tel.archives-ouvertes.fr/tel-00719170.
Full textKhedr, Mohamed Essam. "An infrastructure for managing context information in pervasive computing environments." Thesis, University of Ottawa (Canada), 2004. http://hdl.handle.net/10393/29125.
Full textVilleda, Enrique Edgar LeoÌn. "Towards affective pervasive computing : emotion detection in intelligent inhabited environments." Thesis, University of Essex, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.438154.
Full textWong, Ford Long. "Protocols and technologies for security in pervasive computing and communications." Thesis, University of Cambridge, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.611992.
Full textCho, Jihoon. "Cryptographic approaches to security and privacy issues in pervasive computing." Thesis, Royal Holloway, University of London, 2014. http://repository.royalholloway.ac.uk/items/7272f105-8c80-462d-95eb-36f3de8ddaad/1/.
Full textForsyth, Jason Brinkley. "Exploring Electronic Storyboards as Interdisciplinary Design Tools for Pervasive Computing." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/73538.
Full textPh. D.
Shojanoori, Reza. "Towards formalisation of situation-specific computations in pervasive computing environments." Thesis, University of Westminster, 2013. https://westminsterresearch.westminster.ac.uk/item/8z17x/towards-formalisation-of-situation-specific-computations-in-pervasive-computing-environments.
Full textGünalp, Ozan Necati. "Continuous deployment of pervasive applications in dynamic environments." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM052/document.
Full textDriven by the emergence of new computing environments, dynamically evolving software systems makes it impossible for developers to deploy software with human-centric processes. Instead, there is an increasing need for automation tools that continuously deploy software into execution, in order to push updates or adapt existing software regarding contextual and business changes. Existing solutions fall short on providing fault-tolerant, reproducible deployments that would scale on heterogeneous environments. This thesis focuses especially on enabling continuous deployment solutions for dynamic execution platforms, such as would be found in Pervasive Computing environments. It adopts an approach based on a transactional, idempotent process for coordinating deployment actions. The thesis proposes a set of deployment tools, including a deployment manager capable of conducting deployments and continuously adapting applications according to the changes in the current state of the target platform. The implementation of these tools, Rondo, also allows developers and administrators to code application deployments thanks to a deployment descriptor DSL. Using the implementation of Rondo, the propositions of this thesis are validated in several industrial and academic projects by provisioning frameworks as well as on installing application and continuous reconfigurations