The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Tag scanning is an important issue to dynamically manage tag IDs in radio frequency identification (RFID) systems. Different from tag identification that collects IDs of all the tags, tag scanning first verifies whether or not a responding tag has already been identified and retrieves its ID when the answer is yes, and collects the tag's ID only when it is unidentified. In this paper, we present the...
As TETRA and Critical Communication Association (TCCA) actively promote the interoperability of automatic testing technology, this paper introduced TETRA Communication system interoperability testing specification and proposed an automatic testing system design proposal based on TTCN-3 TETRA standard test language. This model can be used for automatic test of TETRA communication system interoperability.
The advancement in wireless networking technologies and portable devices has motivated the explosive interests in heterogeneous wireless environments. However, the mobility and diversity of both devices and users bring new challenges for the design of mobile Internet applications. Seamless mobility support has always been one of the key problems. In this paper, we study context-aware adaptation for...
The co-existence and integration of different wireless networks will significantly advance the provision of ubiquitous and high-performance Internet services to mobile users. In this paper, we present HAWK, a real-world implementation of high performance heterogeneous wireless networks for ubiquitous Internet access. We have built a fully featured testbed comprised of different wireless networks,...
Satisfying the varied privacy preferences of individuals, while exposing context data to authorized applications and individuals, remains a major challenge for context-aware computing. This paper describes our experiences in building a middleware component, the context privacy engine (CPE), that enforces a role-based, context-dependent privacy model for enterprise domains. While fundamentally an ACL-based...
Mobile agent technologies have been widely used in distributed computing to take care of the task execution for the user. However, pervasive computing presents new challenges to existing mobile agent systems, especially the need for the context-aware self-configuring collaboration with the services provided by the physical objects. In order to address the problem, this paper presents a self-configuring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.