Search dblp for Publications

export results for "toc:db/journals/percom/percom2.bht:"

 download as .bib file

@article{DBLP:journals/percom/AgahBD06,
  author    = {Afrand Agah and
               Kalyan Basu and
               Sajal K. Das},
  title     = {Security enforcement in wireless sensor networks: {A} framework based
               on non-cooperative games},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {2},
  pages     = {137--158},
  year      = {2006}
}
@article{DBLP:journals/percom/BallesterosSGL06,
  author    = {Francisco J. Ballesteros and
               Enrique Soriano and
               Gorka Guardiola and
               Katia Leal},
  title     = {The Plan {B} {OS} for ubiquitous computing. Voice control, security,
               and terminals as case studies},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {4},
  pages     = {472--488},
  year      = {2006}
}
@article{DBLP:journals/percom/BurkeFMPS06,
  author    = {Jeff Burke and
               Jonathan Friedman and
               Eitan Mendelowitz and
               Heemin Park and
               Mani B. Srivastava},
  title     = {Embedding expression: Pervasive computing architecture for art and
               entertainment},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {1},
  pages     = {1--36},
  year      = {2006}
}
@article{DBLP:journals/percom/CaoLW06,
  author    = {Jiannong Cao and
               Lin Liao and
               Guojun Wang},
  title     = {Scalable key management for secure multicast communication in the
               mobile environment},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {2},
  pages     = {187--203},
  year      = {2006}
}
@article{DBLP:journals/percom/ChenH06,
  author    = {An{-}Pin Chen and
               Tien{-}Hwa Ho},
  title     = {Location Aided Mobile Peer-to-Peer system},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {3},
  pages     = {300--312},
  year      = {2006}
}
@article{DBLP:journals/percom/ContiBIZ06,
  author    = {Marco Conti and
               Chatschik Bisdikian and
               Jadwiga Indulska and
               Franco Zambonelli},
  title     = {PerCom 2006 special issue},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {4},
  pages     = {369--371},
  year      = {2006}
}
@article{DBLP:journals/percom/DasRR06,
  author    = {Sajal K. Das and
               Nirmalya Roy and
               Abhishek Roy},
  title     = {Context-aware resource management in multi-inhabitant smart homes:
               {A} framework based on Nash {H}},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {4},
  pages     = {372--404},
  year      = {2006}
}
@article{DBLP:journals/percom/DengHM06,
  author    = {Jing Deng and
               Richard Han and
               Shivakant Mishra},
  title     = {Decorrelating wireless sensor network traffic to inhibit traffic analysis
               attacks},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {2},
  pages     = {159--186},
  year      = {2006}
}
@article{DBLP:journals/percom/GirukaS06,
  author    = {Venkata C. Giruka and
               Mukesh Singhal},
  title     = {Two scalable location service protocols for wireless ad hoc networks},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {3},
  pages     = {262--285},
  year      = {2006}
}
@article{DBLP:journals/percom/HengartnerS06,
  author    = {Urs Hengartner and
               Peter Steenkiste},
  title     = {Exploiting information relationships for access control in pervasive
               computing},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {3},
  pages     = {344--367},
  year      = {2006}
}
@article{DBLP:journals/percom/HengartnerS06a,
  author    = {Urs Hengartner and
               Peter Steenkiste},
  title     = {Avoiding privacy violations caused by context-sensitive services},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {4},
  pages     = {427--452},
  year      = {2006}
}
@article{DBLP:journals/percom/HenricksenI06,
  author    = {Karen Henricksen and
               Jadwiga Indulska},
  title     = {Developing context-aware pervasive computing applications: Models
               and approach},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {1},
  pages     = {37--64},
  year      = {2006}
}
@article{DBLP:journals/percom/HsuTTHFW06,
  author    = {Yuan{-}Ying Hsu and
               Yu{-}Chee Tseng and
               Chien{-}Chao Tseng and
               Chi{-}Fu Huang and
               Jung{-}Hsuan Fan and
               Hsiao{-}Lu Wu},
  title     = {Design and implementation of two-tier MANETs with seamless roaming
               and load-balancing routing capability},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {3},
  pages     = {286--299},
  year      = {2006}
}
@article{DBLP:journals/percom/HursonMOSJ06,
  author    = {Ali R. Hurson and
               Angela Maria Mu{\~{n}}oz{-}Avila and
               Neil Orchowski and
               Behrooz A. Shirazi and
               Yu Jiao},
  title     = {Power-aware data retrieval protocols for indexed broadcast parallel
               channels},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {1},
  pages     = {85--107},
  year      = {2006}
}
@article{DBLP:journals/percom/KeeratiwintakornK06,
  author    = {Phongsak Keeratiwintakorn and
               Prashant Krishnamurthy},
  title     = {An energy efficient security protocol for {IEEE} 802.11 WLANs},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {2},
  pages     = {204--231},
  year      = {2006}
}
@article{DBLP:journals/percom/KimKS06,
  author    = {Mijeom Kim and
               Mohan Kumar and
               Behrooz A. Shirazi},
  title     = {Service discovery using volunteer nodes in heterogeneous pervasive
               computing environments},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {3},
  pages     = {313--343},
  year      = {2006}
}
@article{DBLP:journals/percom/MontavontN06,
  author    = {Nicolas Montavont and
               Thomas No{\"{e}}l},
  title     = {Stronger interaction between link layer and network layer for an optimized
               mobility management in heterogeneous IPv6 networks},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {3},
  pages     = {233--261},
  year      = {2006}
}
@article{DBLP:journals/percom/RiceHB06,
  author    = {Andrew C. Rice and
               Robert K. Harle and
               Alastair R. Beresford},
  title     = {Analysing fundamental properties of marker-based vision system designs},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {4},
  pages     = {453--471},
  year      = {2006}
}
@article{DBLP:journals/percom/RiebackSCT06,
  author    = {Melanie R. Rieback and
               Patrick N. D. Simpson and
               Bruno Crispo and
               Andrew S. Tanenbaum},
  title     = {{RFID} malware: Design principles and examples},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {4},
  pages     = {405--426},
  year      = {2006}
}
@article{DBLP:journals/percom/SinghalH06,
  author    = {Mukesh Singhal and
               Ali R. Hurson},
  title     = {Guest Editors' Note},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {2},
  pages     = {109--110},
  year      = {2006}
}
@article{DBLP:journals/percom/VermaST06,
  author    = {Atul Verma and
               Hemjit Sawant and
               Jindong Tan},
  title     = {Selection and navigation of mobile sensor nodes using a sensor network},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {1},
  pages     = {65--84},
  year      = {2006}
}
@article{DBLP:journals/percom/XieKAS06,
  author    = {Bin Xie and
               Anup Kumar and
               Dharma P. Agrawal and
               S. Srinivasan},
  title     = {Secured macro/micro-mobility protocol for multi-hop cellular {IP}},
  journal   = {Pervasive and Mobile Computing},
  volume    = {2},
  number    = {2},
  pages     = {111--136},
  year      = {2006}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics