Journal articles on the topic 'Pervasive computing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Pervasive computing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kaye, J. "Making pervasive computing pervasive." Gerontechnology 17, s (April 24, 2018): 3. http://dx.doi.org/10.4017/gt.2018.17.s.003.00.
Full textEbling, Maria R., and Roy Want. "Pervasive Computing Revisited." IEEE Pervasive Computing 16, no. 3 (2017): 17–19. http://dx.doi.org/10.1109/mprv.2017.2940959.
Full textGirouard, Audrey, Andrew L. Kun, Anne Roudaut, Orit Shaer, and Andrew L. Kun. "Pervasive Computing Education." IEEE Pervasive Computing 17, no. 4 (October 1, 2018): 9–12. http://dx.doi.org/10.1109/mprv.2018.2878999.
Full textBacon, J. "Toward pervasive computing." IEEE Pervasive Computing 1, no. 2 (April 2002): 84. http://dx.doi.org/10.1109/mprv.2002.1012341.
Full textSchmidt, Albrecht, Joseph Paradiso, and Brian Noble. "Automotive pervasive computing." IEEE Pervasive Computing 10, no. 3 (2011): 12–13. http://dx.doi.org/10.1109/mprv.2011.45.
Full textMattern, Friedemann. "Pervasive/Ubiquitous Computing." Informatik-Spektrum 24, no. 3 (June 1, 2001): 145–47. http://dx.doi.org/10.1007/s002870100158.
Full textFarooq, Muhammad Shoaib, Taha Mubbashar Rabbani, Atif Alvi, and Muhammad Athar Naem. "Pervasive Computing Issues, Vision an Exclusive Relationship Of Pervasive And Cloud Computing." VFAST Transactions on Software Engineering 10, no. 2 (May 13, 2022): 09–16. http://dx.doi.org/10.21015/vtse.v10i2.970.
Full textBratton, Benjamin H. "Accounting for Pervasive Computing." Afterimage 30, no. 1 (July 2002): 13–14. http://dx.doi.org/10.1525/aft.2002.30.1.13.
Full textOrtmeier, Frank. "Dependability in Pervasive Computing." Journal of Information Technology Research 5, no. 1 (January 2012): 1–17. http://dx.doi.org/10.4018/jitr.2012010101.
Full textAgha, Gul. "Computing in pervasive cyberspace." Communications of the ACM 51, no. 1 (January 2008): 68–70. http://dx.doi.org/10.1145/1327452.1327484.
Full textCamara, António S. "Innovations in pervasive computing." ACM SIGSOFT Software Engineering Notes 30, no. 5 (September 2005): 176. http://dx.doi.org/10.1145/1095430.1081708.
Full textBrush, A. J., Jason Hong, and James Scott. "Pervasive Computing Moves In." IEEE Pervasive Computing 15, no. 2 (April 2016): 14–15. http://dx.doi.org/10.1109/mprv.2016.40.
Full textPatel, Shwetak N., and Joshua R. Smith. "Powering Pervasive Computing Systems." IEEE Pervasive Computing 16, no. 3 (2017): 32–38. http://dx.doi.org/10.1109/mprv.2017.2940955.
Full textAmft, Oliver, Mary Baker, and Jennifer Mankoff. "Fabricating Pervasive Computing Systems." IEEE Pervasive Computing 18, no. 4 (October 1, 2019): 18–19. http://dx.doi.org/10.1109/mprv.2019.2949824.
Full textAbawajy, J. H. "Advances in pervasive computing." International Journal of Pervasive Computing and Communications 5, no. 1 (April 3, 2009): 4–8. http://dx.doi.org/10.1108/17427370910950276.
Full textBohlen, M., J. Fabian, D. Pfeifer, and J. T. Rinker. "Prototypes in pervasive computing." IEEE Pervasive Computing 4, no. 4 (October 2005): 78–80. http://dx.doi.org/10.1109/mprv.2005.86.
Full textTaylor, Nicholas, Patrick Robertson, Babak Farshchian, Kevin Doolin, Ioanna Roussaki, Liam Marshall, Robert Mullins, Steffen Druesedow, and Kajetan Dolinar. "Pervasive Computing in Daidalos." IEEE Pervasive Computing 10, no. 1 (January 2011): 74–81. http://dx.doi.org/10.1109/mprv.2010.24.
Full textKumar, Mohan, and Franco Zambonelli. "Middleware for pervasive computing." Pervasive and Mobile Computing 3, no. 4 (August 2007): 329–31. http://dx.doi.org/10.1016/j.pmcj.2007.04.005.
Full textShiqun, Li, Shane Balfe, Zhou Jianying, and Chen Kefei. "Trust based pervasive computing." Wuhan University Journal of Natural Sciences 11, no. 6 (November 2006): 1477–80. http://dx.doi.org/10.1007/bf02831801.
Full textWölk, Michaela, Michaela Scheermesser, H. Kosow, and V. Neuhäuser. "Pervasive Computing als Zukunftsmodell?" TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis 17, no. 1 (April 1, 2008): 34–42. http://dx.doi.org/10.14512/tatup.17.1.34.
Full textDiaz-Artiles, Ana, Ariel Ekblaw, Gregory Falco, Jeremy D. Frank, and Joseph A. Paradiso. "Pervasive Computing in Space." IEEE Pervasive Computing 22, no. 2 (April 1, 2023): 4–6. http://dx.doi.org/10.1109/mprv.2023.3263366.
Full textLiu, Fei. "Applied Technology for Usage Control Model in Pervasive Computing." Advanced Materials Research 886 (January 2014): 605–8. http://dx.doi.org/10.4028/www.scientific.net/amr.886.605.
Full textXu, Kang, Wen Jun Li, Yong Ma, and Heng Liu. "Trust Transfer in Pervasive Computing." Applied Mechanics and Materials 427-429 (September 2013): 2268–72. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2268.
Full textPradhan, Kiran Mangesh. "Pervasive Computing A New Horizons." International Journal of Computer Sciences and Engineering 7, no. 3 (March 31, 2019): 1137–40. http://dx.doi.org/10.26438/ijcse/v7i3.11371140.
Full textPanjaitan, Erwin S., Rahmat Budiarto, and Abdul Wadud Ismail. "Pervasive Computing for Collaborative Education." Jurnal SIFO Mikroskil 12, no. 2 (October 20, 2011): 115–22. http://dx.doi.org/10.55601/jsm.v12i2.39.
Full textR, Sriram, Madhusudanan J, Prasanna Venkatesan V, and Geetha S. "Computing Pattern in Pervasive Healthcare." International Journal of Computer Applications 116, no. 17 (April 22, 2015): 23–26. http://dx.doi.org/10.5120/20429-2758.
Full textBlack, Darren, Nils Jakob Clemmensen, and Mikael B. Skov. "Pervasive Computing in the Supermarket." International Journal of Mobile Human Computer Interaction 2, no. 3 (July 2010): 31–43. http://dx.doi.org/10.4018/jmhci.2010070103.
Full textHunter, P. "Out there...somewhere [pervasive computing]." Engineering & Technology 3, no. 5 (March 22, 2008): 58–61. http://dx.doi.org/10.1049/et:20080509.
Full textDavies, Nigel. "Ethics in Pervasive Computing Research." IEEE Pervasive Computing 12, no. 3 (July 2013): 2–4. http://dx.doi.org/10.1109/mprv.2013.48.
Full textEbling, Maria R. "Could Pervasive Computing Influence Democracy?" IEEE Pervasive Computing 16, no. 3 (2017): 4–6. http://dx.doi.org/10.1109/mprv.2017.2940964.
Full textKostakos, Vassilis, Bran Knowles, Panos Markopoulos, and Koji Yatani. "Growing Up With Pervasive Computing." IEEE Pervasive Computing 19, no. 1 (January 2020): 8–9. http://dx.doi.org/10.1109/mprv.2020.2971286.
Full textBahl, Paramvir Victor, Ramon Caceres, Nigel Davies, and Roy Want. "Pervasive Computing at the Edge." IEEE Pervasive Computing 19, no. 4 (October 1, 2020): 8–9. http://dx.doi.org/10.1109/mprv.2020.3032205.
Full textSatyanarayanan, M. "Pervasive computing: vision and challenges." IEEE Personal Communications 8, no. 4 (2001): 10–17. http://dx.doi.org/10.1109/98.943998.
Full textLu Yan. "Enable Pervasive Computing with Java." IEEE Distributed Systems Online 6, no. 6 (June 2005): 4. http://dx.doi.org/10.1109/mdso.2005.30.
Full textHild, S. G., C. Binding, D. Bourges-Waldegg, and C. Steenkeste. "Application hosting for pervasive computing." IBM Systems Journal 40, no. 1 (2001): 193–219. http://dx.doi.org/10.1147/sj.401.0193.
Full textChetan, S., A. Ranganathan, and R. Campbell. "Towards fault tolerant pervasive computing." IEEE Technology and Society Magazine 24, no. 1 (2005): 38–44. http://dx.doi.org/10.1109/mtas.2005.1407746.
Full textFelkey, Bill G., and Brent I. Fox. "Pervasive Computing and the PDA." Hospital Pharmacy 38, no. 11 (November 2003): 1090–93. http://dx.doi.org/10.1177/001857870303801112.
Full textDay, Charles. "Pervasive Computing on Fictional Farms." Computing in Science & Engineering 19, no. 1 (January 2017): 88. http://dx.doi.org/10.1109/mcse.2017.5.
Full textBeresford, A. R., and F. Stajano. "Location privacy in pervasive computing." IEEE Pervasive Computing 2, no. 1 (January 2003): 46–55. http://dx.doi.org/10.1109/mprv.2003.1186725.
Full textXiaohui Gu, A. Messer, I. Greenberg, D. Milojicic, and K. Nahrstedt. "Adaptive Offloading for Pervasive Computing." IEEE Pervasive Computing 03, no. 03 (July 2004): 66–73. http://dx.doi.org/10.1109/mprv.2004.1321031.
Full textHey, J., and S. Carter. "Pervasive computing in sports training." IEEE Pervasive Computing 4, no. 3 (July 2005): 54. http://dx.doi.org/10.1109/mprv.2005.63.
Full textRukzio, Enrico, Paul Holleis, and Hans Gellersen. "Personal Projectors for Pervasive Computing." IEEE Pervasive Computing 11, no. 2 (February 2012): 30–37. http://dx.doi.org/10.1109/mprv.2011.17.
Full textLukowicz, Paul, and Stephen Intille. "Experimental Methodology in Pervasive Computing." IEEE Pervasive Computing 10, no. 2 (April 2011): 94–96. http://dx.doi.org/10.1109/mprv.2011.25.
Full textMichelfelder, Diane P. "Philosophy, privacy, and pervasive computing." AI & SOCIETY 25, no. 1 (November 18, 2009): 61–70. http://dx.doi.org/10.1007/s00146-009-0233-2.
Full textMasuoka, R., Y. Labrou, B. Parsia, and E. Sirin. "Ontology-enabled pervasive computing applications." IEEE Intelligent Systems 18, no. 5 (September 2003): 68–72. http://dx.doi.org/10.1109/mis.2003.1234773.
Full textGupta, S. K. S., Wang-Chien Lee, A. Purakayastha, and P. K. Srimani. "An overview of pervasive computing." IEEE Personal Communications 8, no. 4 (August 2001): 8–9. http://dx.doi.org/10.1109/mpc.2001.943997.
Full textBütschi, D., and A. Köhler. "Pervasive Computing: Vorsicht ist geboten." TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis 14, no. 1 (April 1, 2005): 100–102. http://dx.doi.org/10.14512/tatup.14.1.100.
Full textRashid, Asarnusch. "Intelligentes Heilen durch Pervasive Computing." TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis 17, no. 1 (April 1, 2008): 132–35. http://dx.doi.org/10.14512/tatup.17.1.132.
Full textLi, Shiqun, Shane Balfe, Jianying Zhou, and Kefei Chen. "Enforcing trust in pervasive computing." International Journal of System of Systems Engineering 1, no. 1/2 (2008): 96. http://dx.doi.org/10.1504/ijsse.2008.018133.
Full textO'Grady, Michael, Gregory O'Hare, and John O'Donoghue. "Pervasive computing technologies for healthcare." ACM SIGHIT Record 1, no. 2 (September 2011): 27–28. http://dx.doi.org/10.1145/2047478.2047482.
Full text