The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In wireless mobile networks, because of low bandwidth, long delay, low reliability, disconnecting frequently and differences in many platforms of commercial services etc., it is difficult to get a stable and high quality commercial service. For this case, a flexible interface, context-aware and intelligent mobile E-commerce platform is designed. It connects kinds of commercial services platforms efficiently...
Radio Frequency Identification (RFID) is one of the core technologies which can open the new era of ubiquitous computing history. With the prevalence of RFID technology, RFID middleware become the pivot of RFID application system. However, one major stumbling block of using RFID technology in ubiquitous environment is the lack of security enforcement. In this paper, we put forward a common layer for...
Radio Frequency Identification (RFID) is one of the core technologies which can open the new era of ubiquitous computing history. With the prevalence of RFID technology, RFID middleware become the pivot of RFID application system. However, one major stumbling block of using RFID technology in ubiquitous environment is the lack of security enforcement. In this paper, we put forward a common layer for...
When database resources being integrated into the pervasive environment, the universal key problem to solve is access mechanisms of database security. The database security mechanisms have already been firmed in the database system. When more flexible security schemas to adapt to the pervasive environment are needed, the database system could solve the problem above insufficiently by itself. We could...
Nowadays, there are many useful domain information scattered over the Internet. But domain users need to navigate different Websites or information sources to get domain relevant information. Services mash-up can be used to integrate not only Web content and also services to one portal, therefore improves the user experience. However, some domain users, especially those without IT background, might...
Recent research in the area of ubiquitous computing lead to innovative technologies for acquisition, storage and communication of real-world information, resulting in a multitude of so called ??smart items??. Prominent examples for that are RFID and wireless sensor nodes. Key to everaging the full power of these items is to embedd them into a system architecture. In this paper we present such an architecture...
This paper addresses the problem of using the location identifier (LID) as the domain value of the index for trajectories of RFID tags and proposes the solution for solving this problem. The query performance for tracing tags depends upon the distribution of tag trajectories in the data space. We investigate a more efficient representation of tag trajectories by means of ordering the set of values...
Context-aware application development is the most explored area in ubiquitous computing. The majority of ubiquitous applications focus on the development of legacy or ad hoc architectures and artifacts that adapt context information into business logic. Web services have been widely used and provide large flexibility for distributed applications due to their Internet support and low-coupled characteristics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.