The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Pervasive computing offers environments in which user needs or tasks are fulfilled without demanding their attention. Context-aware service composition is a central aspect to achieving this, in which services are discovered and composed in response to context to meet user needs. Since pervasive computing environments are inherently dynamic and heterogeneous, context-aware service composition is a...
Security in Wireless Sensor Networks has remained one of the critical and active research realms since last decade. Due to their applications, WSNs are subjective to be deployed in physically hostile environments, where they are vulnerable to various security attacks. The security issue becomes more challenging when sensor nodes are supposed to be mobile. Such types of networks are called Mobile Wireless...
Wireless Sensor Network (WSNs) are commonly deployed in hostile (unattended) and open environments, where it is easy for an attacker to physically capture some of the legitimate nodes, copy credentials, reprogram them and re-deploy them in the WSN. Such type of attack is called Node Replication or Clone Node Attack. With this attack an attacker can easily gain significant control over the WSN. In...
Pervasive Computing Environments are composed of heterogeneous services. Pervasive computing applications need to discover the service(s) based on context (e.g. user preferences, user location, user activity, etc) and interact with them to perform tasks that support us in everyday life with minimal or no user distraction. This makes discovery protocols an essential requirement of Pervasive Computing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.