Browsing by Subject "Ubiquitous computing"
Now showing items 1-20 of 32
-
5G-XHaul: Enabling Scalable Virtualization for Future 5G Transport Networks
(2017)Network slicing is a major trend in the design of future 5G networks that will enable operators to effectively service multiple industry verticals with a single network infrastructure. Thus, network slicing will shape all ... -
An architecture for secure VoiIP and collaboration applications
(2007)VoIP and collaboration Internet applications are a driving force for the use and expansion of the Internet. Current applications usually require end user registration in a central user database, which in turn provides ... -
Bringing IoT and cloud computing towards pervasive healthcare
(2012)Pervasive healthcare applications utilizing body sensor networks generate a vast amount of data that need to be managed and stored for processing and future usage. Cloud computing among with the Internet of Things (IoT) ... -
A communication-aware energy-efficient graph-coloring algorithm for VM placement in clouds
(2018)The problem of virtual machine (VM) consolidation has received a lot of attention over the past years. Most of the proposed techniques tackling the VM consolidation problem focus on energy consumption ignoring the network ... -
A Deep Learning Model for Data Synopses Management in Pervasive Computing Applications
(2021)Pervasive computing involves the placement of processing units and services close to end users to support intelligent applications that will facilitate their activities. With the advent of the Internet of Things (IoT) and ... -
Design and implementation of a VIPSec based application
(2007)Voice over IP (VoIP) is one of the most emerging technologies, while a respectable number of corresponding applications are being implemented or updated in daily basis. Although communications security is a constant ... -
Design of novel screening environments for Mild Cognitive Impairment: Giving priority to elicited speech and language abilities
(2015)Recent cognitive decline screening batteries have highlighted the importance of language deficits related to semantic knowledge breakdown to reveal the incipient dementia. This paper proposes the introduction of novel ... -
A distributed data allocation scheme for autonomous nodes
(2018)The limited computational and storage capabilities of the devices interconnected in Internet of Things (IoT) make them to host only a sub-set of the the collected data. Every device, i.e., an IoT node, should keep only the ... -
EasyHarvest: Supporting the deployment and management of sensing applications on smartphones
(2014)In this paper we present a first prototype of the EasyHarvest framework, which aims to simplify the deployment and controlled execution of large-scale sensing applications on smartphones. On the one hand, application owners ... -
An Ensemble Model for Data Imputation to Support Pervasive Applications
(2022)Pervasive Computing (PC) opens up the room for the adoption of devices very close to end users that gives the opportunity to interact with them and execute various applications to facilitate their every day activities. ... -
A health care monitoring system that uses ontology agents
(2016)The healthcare domain is mission critical and vast research efforts keep being funded in order to improve life quality of people. Health management consists of specific cooperation intensive activities, while medical ... -
Home assistive system for dementia
(2017)This work proposes an innovative home assisted system, based on the interaction of the stimulus earpiece. It addresses a need of people suffering from dementia as well as their familiars to be recognized by them and have ... -
iMuse Mobile Tour: A personalized multimedia museum guide opens to groups
(2011)In the recent years, there is a growing interest in exploiting the advances of mobile and pervasive computing to museum environments. A mobile museum guide, named iMuse Mobile Tour is presented in this paper. The guide ... -
An intelligent, uncertainty driven management scheme for software updates in pervasive IoT applications
(2018)The era of the Internet of Things (IoT) involves a huge number of autonomous devices (nodes) capable of monitoring and interacting with their environment. The autonomous devices are also able of being interconnected, thus, ... -
Mobile healthcare information management utilizing Cloud Computing and Android OS
(2010)Cloud Computing provides functionality for managing information data in a distributed, ubiquitous and pervasive manner supporting several platforms, systems and applications. This work presents the implementation of a ... -
Mobility work re-visited not considered harmful
(2011)The Internet is a universal source of information for its users. However, obtaining desired content has become the main focus of interest rather than the communication with machine endpoints. The increased availability of ... -
Normative conflicts:Patterns,detection and resolution
(2009)The analysis, representation and management of normative conflicts have been the focus of much research in recent years in commercial and business applications. In this paper we are concerned with normative conflicts that ... -
An open framework for flexible plug-in privacy mechanisms in crowdsensing applications
(2017)Preserving user privacy is crucial for the wide adoption of crowdsensing and participatory sensing applications that rely on personal devices. Currently, each application comes with its own hardwired and possibly undocumented ... -
Policy conflict analysis for DiffServ quality of service management
(2009)Policy-based management provides the ability to (re-)configure differentiated services networks so that desired Quality of Service (QoS) goals are achieved. This requires implementing network provisioning decisions, ... -
Proactive tasks management for Pervasive Computing Applications
(2021)Current advances in the Internet of Things (IoT) and Edge Computing (EC) involve numerous devices/nodes present at both ‘layers’ being capable of performing simple processing activities close to end users. This approach ...