REFERENCES

  1. William Adjie-Winoto, Elliot Schwartz, Hari Balakrishnan, and Jeremy Lilley,  The design and implementation of an intentional naming system, ACM SIGOPS Operating Systems Review , Proceedings of the seventeenth ACM symposium on Operating systems principles December 1999, Volume 33 Issue 5,  pgs. 186-201.

 

  1. Guruduth Banavar, James Beck, Eugene Gluzberg, Jonathan Munson, Jeremy Sussman, and Deborra Zukowski, Challenges: an application model for pervasive computing, Proceedings of the sixth annual international conference on Mobile computing and networking,  August 2000, pgs. 266-274.

 

  1. Guruduth Banavar, Abraham Bernstein, Software infrastructure and design challenges for ubiquitous computing applications, Communications of the ACM , Volume 45 ,  Issue 12 (December 2002), Pages: 92–96.

 

  1. M. Burnside, D. Clarke, T. Mills, A. Maywah, S. Devadas  and R. Rivest,  Computer security: Proxy-based security protocols in networked mobile devices Proceedings of the 2002 ACM symposium on Applied computing March 2002, pgs. 265-272.

 

  1. Bellavista P. Corradi A. Stefanelli C, Mobile agent middleware for mobile computing. Computer 34(3) 2001, pgs. 73-82.

 

6.      Michael L. Dertouzos, The future of computing, Scientific American, July 1999, pgs. 52-55.

 

7.      Garlan D.; Siewiorek D.P.; Smailagic, A, and Steenkiste, P., Project Aura: toward distraction-free pervasive computing, IEEE Pervasive Computing, 2002, Page(s): 22- 31.

 

  1. Robert Grimm, Tom Anderson, Brian Bershad, and David Wetherall, A system architecture for pervasive computing, Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system September 2000, pgs. 177-182.

 

  1. Sye Loong Keoh, Emil Lupu, Security and Middleware Services: Towards flexible credential verification in mobile ad-hoc networks  Proceedings of the second ACM international workshop on Principles of mobile computing October 2002, pgs. 76-83.

 

  1. M Kumar, B Shirazi, S K Das, M Singhal, B Sung, and D Levine, Pervasive Information Communities Organization PICO: A Middleware Framework for Pervasive Computing IEEE Pervasive Computing, July-September 2003, pgs. 10-17.

 

 

  1. M. Satyanarayanan, M. Pervasive Computing: Vision and Challenges, IEEE Personal Communications 2001, 8(4), pgs. 10-17.

 

  1. David Tennenhouse, Proactive computing, Communications of the ACM, May 2000, Volume 43 Issue 5, pgs. 43-50.

 

Devices and Network Technologies

 

a)      Upkar Varshney and Ron Vetter. 2000. Emerging Mobile and Wireless Networks, Communications of the ACM 43 (6): 73-81.

b)      D. Witherall. 1999. Active Network Vision and Reality: Lessons from a Capsule-based System. ACM SIGOPS Operating Systems Review, Proceedings of the 17th ACM Symposium on Operating Systems Principles 33(5): 64 - 79.

c)      Want, R.; Pering, T.; Borriello, G.; Farkas, K.I., Disappearing hardware, IEEE Pervasive Computing, Volume: 1, Issue: 1, Year: Jan-Mar 2002, Page(s): 36- 47.

Heterogeneity

a)      Helal S., Pervasive Java, IEEE Pervasive Computing 2002, Vol. 1 (1), Jan-Mar. 2002, Page(s): 82- 85

b)      Helal S., Pervasive Java II, IEEE Pervasive Computing 2002, Vol. 1 (2), Jan-Mar. 2002, Page(s): 85- 89.

Proactivity and Invisibility

a)      Hui Lei, Daby M. Sow, John S. Davis, Guruduth Banavar, and Maria R. Ebling, The design and applications of a context service , ACM SIGMOBILE Mobile Computing and Communications Review October 2002, Volume 6 Issue 4, pgs. 45-55.

b)      Anind K. Dey, Understanding and Using Context , Personal and Ubiquitous Computing January 200, Volume 5 Issue 1, pgs.

 

Mobility and Location Awareness

 

a)      Charles E. Perkins,Mobile Networking through Mobile IP

, IEEE Internet Computing 2(1)1998, pgs. 58-69.

b)      András G. Valkó. 1999. Cellular IP: A New Approach to Internet Host Mobility, ACM SIGCOMM Computer Communication Review 29(1): 50-65.

c)      J. Antonio García-Macías et al. 2001. Quality of Service and Mobility for the Wireless Internet, Proceedings of the first workshop on Wireless Mobile Internet, Rome, Italy: 34-42.  

d)      Rajmohan Rajaraman. 2002. Topology Control and Routing in Ad Hoc Networks: a Survey, ACM SIGACT News 33(2): 60-73.

 

Intelligence and Smart Environments

 

a)      The IEEE Pervasive Computing Volume: 1,   Issue: 2,   Year2002 : Apr-Jun

b)      Stanford, V., Pervasive health care applications face tough security challenges, IEEE Pervasive Computing, Page(s): 8- 12.

c)      Gopal Pingali, Claudio Pinhanez, Anthony Levas, Rick Kjeldsen, Mark Podlaseck, Han Chen, and Noi Sukaviriya,  Steerable Interfaces for Pervasive Computing Spaces, First IEEE International Conference on Pervasive Computing and Communications, PerCom 2003, March 23-26, pgs.

d)      R. Curwen, A. Hopper, P. Steggles and A. Ward, “Sentient Computing,” Technical Report 1999.13 (video), AT&T Laboratories Cambridge, 24a Trumpington Street, Cambridge CB2 1QA, England.

 

Security

 

The IEEE Pervasive Computing Volume: 2,   Issue: 1,   Year 2003: Jan-Mar.

 

WWW Resources

 

1.      The Aura  Project http://www-2.cs.cmu.edu/~aura/

2.      The Oxygen Project http://oxygen.lcs.mit.edu/

3.      The PIMA Project  http://www.research.ibm.com/PIMA/

  1. The PICO Project http://cse.uta.edu/cse@Pico

5.      JINI protocol http://www.jini.org/

6.      Service Discovery with Salutation http://www.salutation.org/

7.      The FIPA standard for Agents http://fipa.org

8.      The Masif standard for agents http://sun195.iit.unict.it/MAP/masif.html 

9.      Aglets http://www.trl.ibm.com/aglets/index_e.htm

10.  The Grosshopper project http://www.cordis.lu/infowin/acts/analysys/products/thematic/agents/ch4/ch4.htm

11.   J2ME Standard http://java.sun.com/j2me.

12.   The Berkeley Motes http://www.xbow.com/Products/Wireless_Sensor_Networks.htm

13.   The TinyOS http://tinyos.millennium.berkeley.edu/release/