REFERENCES
- William Adjie-Winoto, Elliot Schwartz, Hari Balakrishnan, and
Jeremy Lilley, The design and implementation of an intentional
naming system, ACM SIGOPS Operating Systems Review ,
Proceedings of the seventeenth ACM symposium on Operating systems principles
December 1999, Volume 33 Issue 5,
pgs. 186-201.
- Guruduth Banavar,
James Beck, Eugene Gluzberg, Jonathan Munson,
Jeremy Sussman, and Deborra
Zukowski, Challenges: an application model for pervasive computing,
Proceedings
of the sixth annual international conference on Mobile computing and
networking, August 2000, pgs. 266-274.
- Guruduth Banavar,
Abraham Bernstein, Software infrastructure and design challenges for ubiquitous
computing applications, Communications of the ACM ,
Volume 45 , Issue
12 (December 2002), Pages: 92–96.
- M. Burnside, D. Clarke, T. Mills, A. Maywah, S. Devadas and R. Rivest, Computer security: Proxy-based security protocols in
networked mobile devices Proceedings of the 2002 ACM symposium on Applied
computing March 2002, pgs. 265-272.
- Bellavista
P. Corradi A. Stefanelli C, Mobile agent middleware for mobile
computing. Computer 34(3) 2001, pgs. 73-82.
6.
Michael
L. Dertouzos, The future of
computing, Scientific American,
July 1999, pgs. 52-55.
7. Garlan D.; Siewiorek
D.P.; Smailagic, A, and Steenkiste,
P., Project Aura:
toward distraction-free pervasive computing, IEEE Pervasive Computing, 2002, Page(s): 22- 31.
- Robert Grimm, Tom Anderson, Brian Bershad,
and David Wetherall, A system architecture for pervasive computing, Proceedings of the 9th
workshop on ACM SIGOPS European workshop: beyond the PC: new challenges
for the operating system September 2000, pgs. 177-182.
- Sye Loong
Keoh, Emil Lupu, Security and Middleware Services: Towards flexible
credential verification in mobile ad-hoc networks Proceedings of the second ACM international workshop
on Principles of mobile computing October 2002, pgs.
76-83.
- M Kumar, B
Shirazi, S K Das, M Singhal,
B Sung, and D Levine, Pervasive Information Communities Organization PICO: A Middleware Framework
for Pervasive Computing IEEE Pervasive Computing,
July-September 2003, pgs. 10-17.
- M. Satyanarayanan, M. Pervasive Computing: Vision and
Challenges, IEEE Personal Communications 2001, 8(4),
pgs. 10-17.
- David Tennenhouse, Proactive computing, Communications of the ACM, May
2000, Volume 43 Issue 5, pgs. 43-50.
Devices and Network Technologies
a)
Upkar Varshney and Ron Vetter. 2000. Emerging
Mobile and Wireless Networks, Communications of the ACM 43 (6):
73-81.
b)
D.
Witherall. 1999. Active
Network Vision and Reality: Lessons from a Capsule-based System. ACM
SIGOPS Operating Systems Review, Proceedings of the 17th ACM Symposium on
Operating Systems Principles 33(5): 64 - 79.
c)
Want,
R.; Pering, T.; Borriello,
G.; Farkas, K.I., Disappearing hardware, IEEE Pervasive Computing, Volume: 1,
Issue: 1, Year: Jan-Mar 2002, Page(s): 36- 47.
Heterogeneity
a) Helal S., Pervasive Java, IEEE Pervasive Computing 2002, Vol. 1
(1), Jan-Mar. 2002, Page(s): 82- 85
b) Helal S., Pervasive Java II, IEEE Pervasive Computing 2002,
Vol. 1 (2), Jan-Mar. 2002, Page(s): 85- 89.
Proactivity and Invisibility
a) Hui Lei, Daby M. Sow, John S. Davis, Guruduth Banavar, and Maria R. Ebling, The design and applications of a context service , ACM
SIGMOBILE Mobile Computing and Communications Review October 2002, Volume 6
Issue 4, pgs. 45-55.
b)
Anind K. Dey, Understanding and Using Context , Personal and Ubiquitous
Computing January 200, Volume 5 Issue 1, pgs.
Mobility and Location Awareness
a) Charles E. Perkins,Mobile
Networking through Mobile IP
, IEEE
Internet Computing 2(1)1998, pgs. 58-69.
b)
András G. Valkó. 1999. Cellular
IP: A New Approach to Internet Host Mobility, ACM SIGCOMM Computer
Communication Review 29(1): 50-65.
c) J. Antonio
García-Macías et al. 2001. Quality
of Service and Mobility for the Wireless Internet, Proceedings of the
first workshop on Wireless Mobile Internet, Rome, Italy: 34-42.
d)
Rajmohan Rajaraman. 2002. Topology
Control and Routing in Ad Hoc Networks: a Survey, ACM SIGACT News 33(2):
60-73.
Intelligence
and Smart Environments
a) The IEEE
Pervasive Computing Volume: 1, Issue: 2,
Year2002 : Apr-Jun
b) Stanford, V., Pervasive
health care applications face tough security challenges, IEEE Pervasive
Computing, Page(s): 8- 12.
c)
Gopal Pingali, Claudio Pinhanez, Anthony
Levas, Rick Kjeldsen, Mark Podlaseck, Han Chen, and Noi Sukaviriya, Steerable Interfaces for Pervasive Computing Spaces,
First IEEE International Conference on Pervasive Computing and Communications, PerCom 2003, March 23-26, pgs.
d) R. Curwen, A. Hopper, P. Steggles
and A. Ward, “Sentient Computing,” Technical Report 1999.13 (video), AT&T Laboratories Cambridge, 24a Trumpington
Street, Cambridge CB2 1QA, England.
Security
The IEEE
Pervasive Computing Volume: 2, Issue: 1,
Year 2003: Jan-Mar.
WWW Resources
1. The Aura Project http://www-2.cs.cmu.edu/~aura/
2. The Oxygen
Project http://oxygen.lcs.mit.edu/
3.
The PIMA Project http://www.research.ibm.com/PIMA/
- The PICO Project http://cse.uta.edu/cse@Pico
5.
JINI protocol http://www.jini.org/
6.
Service Discovery with Salutation http://www.salutation.org/
7.
The FIPA standard for Agents http://fipa.org
8.
The Masif standard for
agents http://sun195.iit.unict.it/MAP/masif.html
9. Aglets http://www.trl.ibm.com/aglets/index_e.htm
10. The
Grosshopper project http://www.cordis.lu/infowin/acts/analysys/products/thematic/agents/ch4/ch4.htm
11.
J2ME Standard http://java.sun.com/j2me.
12. The Berkeley Motes http://www.xbow.com/Products/Wireless_Sensor_Networks.htm
13. The TinyOS http://tinyos.millennium.berkeley.edu/release/