This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
April-June 2008 (vol. 7 no. 2)
pp. 2-4
Roy Want, Intel Research
Learn how your mobile device is becoming a proxy for you and your activities, improving your effectiveness while on the go.

[1] A. Küpper, G. Treu, and C. Linnhoff-Popien, "TraX: a Device-Centric Middleware Framework for Location-Based Services," IEEE Comm. Magazine, vol. 44, no. 9, 2006, pp. 114–120.
[2] C. Lee, A. Helal, and D. Nordstedt, "The μJini Proxy Architecture for Impromptu Mobile Service Access," Proc. 2006 Int'l Symp. Applications and the Internet Workshops (SAINT 2006 Workshops), IEEE CS Press, 2006, pp. 113–117.
[3] P. Bellavista, A. Corradi, and C. Giannelli, "Coupling Transparency and Visibility: A Translucent Middleware Approach for Positioning System Integration and Management (PoSIM)," Proc. Int'l Symp. Wireless Communication Systems (ISWCS 06), IEEE Press, 2006, pp. 179–184.
[4] Java Community Process, JSR179 Location API for J2ME, http://jcp.org/aboutJava/communityprocess/ finaljsr179.
[5] K. Rehman, F. Stajano, and G. Coulouris, "An Architecture for Interactive Context-Aware Applications," IEEE Pervasive Computing, vol. 6, no. 1, 2007, pp. 73–80.
[6] G. Treu, F. Fuchs, and C. Dargatz, "Implicit Authorization for Social Location Disclosure," J. Software, vol. 3, no. 1, 2008, pp. 18–26.

Index Terms:
cell phone, proxy, mobile computing, pervasive computing
Citation:
Roy Want, "You Are Your Cell Phone," IEEE Pervasive Computing, vol. 7, no. 2, pp. 2-4, April-June 2008, doi:10.1109/MPRV.2008.41
Usage of this product signifies your acceptance of the Terms of Use.