To see the other types of publications on this topic, follow the link: Ubiquitous Computing Environments.

Journal articles on the topic 'Ubiquitous Computing Environments'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Ubiquitous Computing Environments.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Barbosa, Jorge Luis Victória, Débora Nice Ferrari Barbosa, and André Wagner. "Learning in Ubiquitous Computing Environments." International Journal of Information and Communication Technology Education 8, no. 3 (July 2012): 64–77. http://dx.doi.org/10.4018/jicte.2012070108.

Full text
Abstract:
The application of ubiquitous technologies in the improvement of education strategies is called Ubiquitous Learning. GlobalEdu is a model created to support ubiquitous learning. The model has the necessary support to implement learning-related functionalities in ubiquitous environments. The basic ubiquitous computing support must be supplied by a middleware where GlobalEdu lays atop. This article proposes the GlobalEdu model and its integration with two ubiquitous middlewares: ISAM and LOCAL. ISAM supports the creation of large-scale ubiquitous systems. As such, its integration with GlobalEdu results in large-scale ubiquitous learning environments. LOCAL is dedicated to create small-scale ubiquitous learning environments. The integration GlobalEdu/LOCAL results in a local ubiquitous learning environment. Based on this small-scale environment, the authors’ created a system and applied it in a practical scenario involving the community of a Computer Engineering undergraduate course. The system was positively evaluated by 20 individuals and the initial results attest the system’s usefulness.
APA, Harvard, Vancouver, ISO, and other styles
2

SATOH, I. "Mobile Applications in Ubiquitous Computing Environments." IEICE Transactions on Communications E88-B, no. 3 (March 1, 2005): 1026–33. http://dx.doi.org/10.1093/ietcom/e88-b.3.1026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Park, Min-Ho, Ju-Hyung Son, and Seung-Woo Seo. "Anonymous Communication in Ubiquitous Computing Environments." Wireless Personal Communications 56, no. 1 (November 28, 2009): 21–36. http://dx.doi.org/10.1007/s11277-009-9884-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Al-Roubaiey, Anas, and M. AL-Rhman Alkhiaty. "QoS-Aware Middleware for Ubiquitous Environment: A Review and Proposed Solution." Journal of Computational Engineering 2014 (March 19, 2014): 1–7. http://dx.doi.org/10.1155/2014/725960.

Full text
Abstract:
Ubiquitous computing has introduced a new era of computing. Compared to traditional distributed systems, ubiquitous computing systems feature increased dynamism and heterogeneity. In traditional computing environments (mainframe and PC), users actively choose to interact with computers. Ubiquitous computing applications are likely to be different, where computing systems are available anywhere but not visible. The underlying ubiquitous computing infrastructures are more complex and bring up many issues. In this work we survey the literature to demonstrate, in detail, the characteristics and the challenges of the ubiquitous computing as well as the requirements for building ubiquitous software that brings these characteristics into reality. Furthermore we present some existing middleware solutions for ubiquitous environments, and propose our middleware-based architecture to facilitate the user interaction in such environment. To the best of our knowledge this is the first work proposing DDS-based solution for ubiquitous computing as a unified middleware.
APA, Harvard, Vancouver, ISO, and other styles
5

Satoh, Ichiro. "Location-based services in ubiquitous computing environments." International Journal on Digital Libraries 6, no. 3 (April 7, 2006): 280–91. http://dx.doi.org/10.1007/s00799-006-0006-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Park, Kyung-Lang, Uram H. Yoon, and Shin-Dug Kim. "Personalized Service Discovery in Ubiquitous Computing Environments." IEEE Pervasive Computing 8, no. 1 (January 2009): 58–65. http://dx.doi.org/10.1109/mprv.2009.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Abawajy, J. H. "Human‐computer interaction in ubiquitous computing environments." International Journal of Pervasive Computing and Communications 5, no. 1 (April 3, 2009): 61–77. http://dx.doi.org/10.1108/17427370910950311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hansen, Kai. "Designing responsive environments through User Experience research." International Journal of Architectural Computing 14, no. 4 (September 26, 2016): 372–85. http://dx.doi.org/10.1177/1478077116670745.

Full text
Abstract:
Ubiquitous computing systems are changing the way retail environments are being designed. With increasing frequency, User Experience designers leveraging ubiquitous computing systems that observe and respond to user behaviors are assuming roles once held exclusively by architects. As these systems continue their growth, designers of environments will need to acknowledge the underlying role of experience designer and embrace User Experience methodologies. We will discuss how ubiquitous computing has been leveraged in our research, and our position on how these systems are impacting the design of retail environments, illustrated by several examples of User Experience research projects, informing the experience design of retail environments.
APA, Harvard, Vancouver, ISO, and other styles
9

Moon, Aekyung, Hyoungsun Kim, Hyun Kim, and Soowoo Lee. "Context-Aware Active Services in Ubiquitous Computing Environments." ETRI Journal 29, no. 2 (April 9, 2007): 169–78. http://dx.doi.org/10.4218/etrij.07.0106.0075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tacconi, David, Daniele Miorandi, Iacopo Carreras, Francesco De Pellegrini, and Imrich Chlamtac. "Cooperative evolution of services in ubiquitous computing environments." ACM Transactions on Autonomous and Adaptive Systems 6, no. 3 (September 2011): 1–24. http://dx.doi.org/10.1145/2019583.2019587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

El-Khatib, K., Zhen E. Zhang, N. Hadibi, and G. v. Bochmann. "Personal and service mobility in ubiquitous computing environments." Wireless Communications and Mobile Computing 4, no. 6 (September 2004): 595–607. http://dx.doi.org/10.1002/wcm.231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Schmidt, A., F. Alt, D. Wilhelm, J. Niggemann, and H. Feussner. "Experimenting with ubiquitous computing technologies in productive environments." e & i Elektrotechnik und Informationstechnik 123, no. 4 (April 2006): 135–39. http://dx.doi.org/10.1007/s00502-006-0328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Daqiang, Zhijun Yang, Hongyu Huang, and Qin Zou. "Decentralized Checking Context Inconsistency in Ubiquitous Mobile Computing Environments." Physics Procedia 25 (2012): 700–707. http://dx.doi.org/10.1016/j.phpro.2012.03.146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Cousins, Karlene C., and Upkar Varshney. "Designing ubiquitous computing environments to support work life balance." Communications of the ACM 52, no. 5 (May 2009): 117–23. http://dx.doi.org/10.1145/1506409.1506438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Jessup, Leonard M., and Daniel Robey. "The relevance of social issues in ubiquitous computing environments." Communications of the ACM 45, no. 12 (December 2002): 88–91. http://dx.doi.org/10.1145/585597.585621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Chang, Chin-Chen, Iuon-Chang Lin, and Chia-Chi Wu. "A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments." Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/934716.

Full text
Abstract:
Due to the rapid advancement of cryptographic techniques, the smart card has recently become a popular device because it is capable of storing and computing essential information with such properties as tamper resistance. However, many service providers must satisfy the user’s desire to be able to access services anytime and anywhere with the smart card computing devices. Therefore, multipurpose smart cards have become very popular identification tokens. In 2011, Wang et al. proposed an authentication and key agreement scheme for smart card use. Even so, two drawbacks still exist; that is, (1) the security requirement of mutual authentication has not been satisfied and (2) the authentication scheme cannot be used for multipurpose smart cards. In this paper, we propose an efficient and secure multipurpose, authenticated, key agreement scheme in which the user is required to register only once and can be authenticated without any registration center. Furthermore, the proposed scheme can be used in ubiquitous environments because of its low computation and communication overhead.
APA, Harvard, Vancouver, ISO, and other styles
17

Silva, José Luís, José Creissac Campos, and Michael D. Harrison. "Prototyping and analysing ubiquitous computing environments using multiple layers." International Journal of Human-Computer Studies 72, no. 5 (May 2014): 488–506. http://dx.doi.org/10.1016/j.ijhcs.2014.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Al-Muhtadi, Jalal, Raquel Hill, and Sumayah Al-Rwais. "Access control using threshold cryptography for ubiquitous computing environments." Journal of King Saud University - Computer and Information Sciences 23, no. 2 (July 2011): 71–78. http://dx.doi.org/10.1016/j.jksuci.2011.05.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Liu, Jinshan, and Valérie Issarny. "An incentive compatible reputation mechanism for ubiquitous computing environments." International Journal of Information Security 6, no. 5 (June 29, 2007): 297–311. http://dx.doi.org/10.1007/s10207-007-0029-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Lyytinen, Kalle, and Youngjin Yoo. "Designing and implementing effectively high impact ubiquitous computing environments." Information Systems and e-Business Management 4, no. 4 (March 29, 2006): 395–97. http://dx.doi.org/10.1007/s10257-005-0001-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Nakata, Keiichi, and Stuart Moran. "A Semiotic Analysis of a Model for Understanding User Behaviours in Ubiquitously Monitored Environments." International Journal of Information Systems and Social Change 2, no. 3 (July 2011): 36–47. http://dx.doi.org/10.4018/jissc.2011070103.

Full text
Abstract:
Improvements in electronics and computing have increased the potential of monitoring and surveillance technologies. Although now widely used, these technologies have been known to cause unintended effects, such as increases in stress in those being observed. Further advancements in technology lead people towards the ‘pervasive era’ of computing, where a new means of monitoring ubiquitously becomes possible. This monitoring differs from existing methods in its distinct lack of physical boundaries. To address the effects of this kind of monitoring, this paper proposes a model consisting of a series of factors identified in the monitoring and pervasive literature believed to influence behaviour. The model aims to understand and predict behaviour, thereby preventing any potential undesirable effects, but also to provide a means to analyse the problem. Various socio-technical frameworks have been proposed to guide research within ubiquitous computing; this paper uses the semiotic framework to analyse the model in order to better understand and explain the behavioural impact of ubiquitous monitoring.
APA, Harvard, Vancouver, ISO, and other styles
22

El Khaddar, Mehdia Ajana, Mhammed Chraibi, Hamid Harroud, Mohammed Boulmalf, Mohammed Elkoutbi, and Abdelilah Maach. "A policy-based middleware for context-aware pervasive computing." International Journal of Pervasive Computing and Communications 11, no. 1 (April 7, 2015): 43–68. http://dx.doi.org/10.1108/ijpcc-07-2014-0039.

Full text
Abstract:
Purpose – This paper aims to demonstrate that a policy-based middleware solution which facilitates the development of context-aware applications and the integration of the heterogeneous devices should be provided for ubiquitous computing environments. Ubiquitous computing targets the provision of seamless services and applications by providing an environment that involves a variety of devices having different capabilities. These applications help transforming the physical spaces into computationally active and smart environments. The design of applications in these environments needs to consider the heterogeneous devices, applications preferences and rapidly changing contexts. The applications, therefore, need to be context-aware so that they can adapt to different situations in real-time. Design/methodology/approach – In this paper, we argue that a policy-based middleware solution that facilitates the development of context-aware applications and the integration of the heterogeneous devices should be provided for ubiquitous computing environments. The middleware allows applications to track items and acquire contextual information about them easily, reason about this information captured using different logics and then adapt to changing contexts. A key issue in these environments is to allow heterogeneous applications to express their business rules once, and get the preferred data once they are captured by the middleware without any intervention from the application side. Findings – Our middleware tackles this problem by using policies to define the different applications’ rules and preferences. These policies can specify rules about the middleware services to be used, type of data captured, devices used, user roles, context information and any other type of conditions. Originality/value – In this paper, we propose the design of a flexible and performant ubiquitous computing, and context-aware middleware called FlexRFID along with its evaluation results.
APA, Harvard, Vancouver, ISO, and other styles
23

Andersson, Magnus, and Rikard Lindgren. "Inscribing Interpretive Flexibility of Context Data in Ubiquitous Computing Environments." International Journal of Advanced Pervasive and Ubiquitous Computing 1, no. 2 (April 2009): 1–18. http://dx.doi.org/10.4018/japuc.2009040101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Malkani, Yasir Arfat. "A Generic Framework for Device Pairing in Ubiquitous Computing Environments." International Journal of Network Security & Its Applications 4, no. 2 (March 31, 2012): 1–20. http://dx.doi.org/10.5121/ijnsa.2012.4201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

YAMADA, S. "Access Control for Security and Privacy in Ubiquitous Computing Environments." IEICE Transactions on Communications E88-B, no. 3 (March 1, 2005): 846–56. http://dx.doi.org/10.1093/ietcom/e88-b.3.846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Mowafi, Yaser A., and Guisseppi Forgionne. "Determining Decision Values of Context Awareness in Ubiquitous Computing Environments." Journal of Multi-Criteria Decision Analysis 18, no. 3-4 (May 2011): 203–18. http://dx.doi.org/10.1002/mcda.466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Anderson, Christoph, Isabel Hübener, Ann-Kathrin Seipp, Sandra Ohly, Klaus David, and Veljko Pejovic. "A Survey of Attention Management Systems in Ubiquitous Computing Environments." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, no. 2 (July 5, 2018): 1–27. http://dx.doi.org/10.1145/3214261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Friday, Adrian, Nigel Davies, Nat Wallbank, Elaine Catterall, and Stephen Pink. "Supporting Service Discovery, Querying and Interaction in Ubiquitous Computing Environments." Wireless Networks 10, no. 6 (November 2004): 631–41. http://dx.doi.org/10.1023/b:wine.0000044024.54833.cb.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Ogiela, Marek R., Aniello Castiglione, and Ilsun You. "Soft computing for security services in smart and ubiquitous environments." Soft Computing 18, no. 9 (August 7, 2014): 1655–58. http://dx.doi.org/10.1007/s00500-014-1380-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

You, Ilsun, Marek R. Ogiela, Yuh-Shyan Chen, and Qingfeng Huang. "Mobile and internet services in ubiquitous and pervasive computing environments." Information Sciences 230 (May 2013): 1–2. http://dx.doi.org/10.1016/j.ins.2013.01.026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Krüger, Antonio, Albrecht Schmidt, and Jörg Müller. "Technological and Research Perspectives of Old-Age Ubiquitous Computing." GeroPsych 23, no. 2 (June 2010): 99–105. http://dx.doi.org/10.1024/1662-9647/a000012.

Full text
Abstract:
Technological advances allow networked and context-aware computer systems to be integrated into devices, environments, everyday objects, and garments. The idea is that such smart environments and artifacts are able to perceive the users’ context and activity, anticipate their needs, and act to provide proactive support. Old-age ubiquitous computing has the potential to increase the length of time that both individuals and groups are able to lead independent lives, even at an advanced age. Examples of this range from smart reading-glasses that are capable of reading articles to the user, all the way to body implants designed to increase human perceptive, cognitive, and motor capabilities.
APA, Harvard, Vancouver, ISO, and other styles
32

Joshi, Anupam, Tim Finin, Lalana Kagal, Jim Parker, and Anand Patwardhan. "Security policies and trust in ubiquitous computing." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366, no. 1881 (July 31, 2008): 3769–80. http://dx.doi.org/10.1098/rsta.2008.0142.

Full text
Abstract:
Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.
APA, Harvard, Vancouver, ISO, and other styles
33

G.S., Thyagaraju, and U. P. Kulkarni. "Algorithms to Resolve Conflict in Multiuser Context Aware Ubiquitous Environment." International Journal of Advanced Pervasive and Ubiquitous Computing 4, no. 3 (July 2012): 42–62. http://dx.doi.org/10.4018/japuc.2012070103.

Full text
Abstract:
Conflict resolution in context-aware computing is getting more significant attention from researchers as pervasive/ubiquitous computing environments take into account multiple users and multiple applications. In multi-user ubiquitous computing environments, conflicts among user’s contexts need to be detected and resolved. Conflicts arise when multiple users try to access or try to have a control on an application. In this paper, the authors propose a series of algorithms to resolve conflict which can be embedded in different context aware applications like context aware devices (say TV, Mobile, AC, and Fan) and Context Aware Ambient (like Meeting Room, Living Room, Restaurant, Coffee Shop, etc.). The algorithms discussed in this paper make use of different tools like Probability, Fuzzy Logic, Bayesian Network and Rough set theory. In addition the algorithms utilize various factors like social, personal and environmental. The motto of this paper is to enable context aware applications to offer socialized and personalized services to multiple users by resolving service conflicts among users.
APA, Harvard, Vancouver, ISO, and other styles
34

Lee, Jaeseung, Yunsick Sung, and Jong Park. "Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments." Sensors 16, no. 12 (December 1, 2016): 2044. http://dx.doi.org/10.3390/s16122044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

KIM, Jangseong, Joonsang BAEK, Jianying ZHOU, and Taeshik SHON. "An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments." IEICE Transactions on Information and Systems E95-D, no. 1 (2012): 117–25. http://dx.doi.org/10.1587/transinf.e95.d.117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Rosales, Ricardo, Donald Rodriguez, Dora-Luz Flores, Luis Palafox, Manuel Castanon-Puga, and Carelia Gaxiola-Pacheco. "Model of Interaction Among Embedded Fuzzy Agents in Ubiquitous Computing Environments." International Journal for Infonomics Special 1, no. 1 (March 1, 2013): 806–10. http://dx.doi.org/10.20533/iji.1742.4712.2013.0095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kang, Saehoon, Daewong Kim, Younghee Lee, Soon J. Hyun, Dongman Lee, and Ben Lee. "A Semantic Service Discovery Network for Large-Scale Ubiquitous Computing Environments." ETRI Journal 29, no. 5 (October 9, 2007): 545–58. http://dx.doi.org/10.4218/etrij.07.0106.0281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Yakin, Ilker, and Ayse Gunay. "Selection of Ubiquitous Computing Technologies and Environments as Performance Improvement Interventions." Ubiquitous Learning: An International Journal 6, no. 2 (2014): 1–13. http://dx.doi.org/10.18848/1835-9795/cgp/v06i02/40390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Choi, Jong-Sun, Jae-Young Choi, and Yong-Yun Cho. "A Layered Architecture for Robot Automated Services on Ubiquitous Computing Environments." Journal of Korea Robotics Society 6, no. 4 (November 30, 2011): 353–64. http://dx.doi.org/10.7746/jkros.2011.6.4.353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Cai, Haibin, Fang Pu, Runcai Huang, and Qiying Cao. "A novel ANN-based service selection model for ubiquitous computing environments." Journal of Network and Computer Applications 31, no. 4 (November 2008): 944–65. http://dx.doi.org/10.1016/j.jnca.2007.01.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kim, Kyung-Il, Taegu Kim, Nam-Wook Cho, and Minsoo Kim. "Toll Fraud Detection of VoIP Service Networks in Ubiquitous Computing Environments." International Journal of Distributed Sensor Networks 11, no. 9 (January 2015): 276408. http://dx.doi.org/10.1155/2015/276408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Zapater, Marina, Cesar Sanchez, Jose L. Ayala, Jose M. Moya, and José L. Risco-Martín. "Ubiquitous Green Computing Techniques for High Demand Applications in Smart Environments." Sensors 12, no. 8 (August 3, 2012): 10659–77. http://dx.doi.org/10.3390/s120810659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Park, Yoosang, Yongseong Cho, Jongsun Choi, and Jaeyoung Choi. "A Context Classification for Collecting Situational Information on Ubiquitous Computing Environments." KIISE Transactions on Computing Practices 22, no. 8 (August 15, 2016): 387–92. http://dx.doi.org/10.5626/ktcp.2016.22.8.387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Satoh, Ichiro. "SpatialAgents: integrating user mobility and program mobility in ubiquitous computing environments." Wireless Communications and Mobile Computing 3, no. 4 (2003): 411–23. http://dx.doi.org/10.1002/wcm.126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

KIM, J. g., G. S. KIM, and Y. I. EOM. "Design of the Mobile Agent Anonymity Framework in Ubiquitous Computing Environments." IEICE Transactions on Information and Systems E89-D, no. 12 (December 1, 2006): 2990–93. http://dx.doi.org/10.1093/ietisy/e89-d.12.2990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Kim, Jung-Eun, Junghee Han, and Chang-Gun Lee. "Optimal 3-Coverage with Minimum Separation Requirements for Ubiquitous Computing Environments." Mobile Networks and Applications 14, no. 5 (December 9, 2008): 556–70. http://dx.doi.org/10.1007/s11036-008-0122-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Boukerche, Azzedine, and Yonglin Ren. "A trust-based security system for ubiquitous and pervasive computing environments." Computer Communications 31, no. 18 (December 2008): 4343–51. http://dx.doi.org/10.1016/j.comcom.2008.05.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Louta, Malamati, Angelos Michalas, Ioannis Anagnostoupoulos, and Dimitrios Vergados. "Trust management framework for intelligent agent negotiations in ubiquitous computing environments." Telecommunication Systems 41, no. 2 (April 23, 2009): 141–57. http://dx.doi.org/10.1007/s11235-009-9155-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Sarivougioukas, John, Aristides Vagelatos, and Isaac Lagaris. "Administration of Medical Contexts with Denotational Mathematics in Ubiquitous Computing Home Environments." International Journal of Software Science and Computational Intelligence 7, no. 2 (April 2015): 1–30. http://dx.doi.org/10.4018/ijssci.2015040101.

Full text
Abstract:
Home healthcare promises significant advantages over the traditional hospitalization, provided the support of the contemporary scientific and technological achievements. The ubiquitous computing paradigm suits the home healthcare provided that the dispersed computing devices in the home environment can actively participate in the interpretation of the developed, each time, medical context. Large numbers of disseminated sensors and computing devices, wirelessly and ad-hoc connected, present problems related to energy limitations and the patients' mobility introduce systemic complexity, uncertainty, and ambiguity. The formal description of such systems requires the inclusion of extensive details becoming tedious, if not impractical. Denotational Mathematics provides an alternative formal methodology framework capable to formally describe the constituting components, the performed operations, and the static and dynamic behaviors of complex system. Employing the expressive power of Denotational Mathematics, it is attempted to design a system that develops medically valid contextual contents adequate to support patients hospitalized at home. The formally described design provides the contents of the medical context enriched by the rules of the current state of medical knowledge. Denotational Mathematics provides the means to formally present the conceptual comparison between technically obtained medical contexts against predetermined medical contexts to obtain valid interpretations. The presented design has the ambition to formally describe the required cooperation of discrete ubiquitous computing applications to achieve the development of a commonly interpreted medical context at home.
APA, Harvard, Vancouver, ISO, and other styles
50

Ibrahim, Ismail Khalil. "Norms for Modeling Agents' Interaction in Ubiquitous Environments." Mobile Information Systems 4, no. 1 (2008): 69–76. http://dx.doi.org/10.1155/2008/960375.

Full text
Abstract:
In ubiquitous environments a vast amount of mobile human and software entities, each with limited resources and knowledge, needs to interact with each other to achieve common and/or individual goals within a specific context. Due to their autonomy, proactiveness, mobility, social capability, and the successful implementation of agent mediated applications and services over the Web, different scenarios have been proposed in literature for the use of agents in ubiquitous environments for a wide range of applications such as user interfaces, mobile computing, information retrieval and filtering, smart messaging, telecommunication and m-commerce. In this paper, we address the problem of modeling agents' interaction in ubiquitous environments. We argue agents' interactions can be modeled using norms, which are represented mathematically as zero set of n-variate functions. We utilize the barycentic coordinates to show how agents should behave based on established protocols, rules of conduct or accepted social practices.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography