Virtual Networks A Flexible Platform for Network Services (PDF)
Privacy-Preserving Location-Dependent Query Processing (Abstract)
Wireless Smart Implants Dedicated to Multichannel Monitoring and Microstimulation (Abstract)
A Programmable Structure for Pervasive Computing (Abstract)
Context-Aware Computing: A Guide for the Pervasive Computing Community (Abstract)
PALLAS: A Querying Interface for Pervasive Computing using Handheld Devices (Abstract)
An Acoustic Identification Scheme for Location Systems (Abstract)
Context Aware Service Provisioning (Abstract)
Next Generation Vehicle Network (NGVN): Internet Access Utilizing Dynamic Discovery Protocols (Abstract)
Opportunities for Grid Computing in Bio- and Health-Informatics (PDF)
A Dynamic Honeypot Design for Intrusion Detection (Abstract)
Abnormality Metrics to Detect and Protect against Network Attacks (Abstract)
TRUMMAR - A Trust Model for Mobile Agent Systems Based on Reputation (Abstract)
Reconfigurable Computing for RC6 Cryptography (Abstract)
Design Principles for Inducing Reactivity in Ubiquitous Environments (Abstract)
The Use of a Hopfield Neural Network in Solving the Mobility Management Problem (Abstract)
An Intelligent Interface for the Dynamic Negotiation of QoS in ARCADE (Abstract)
Analysis of Wired Short Cuts in Wireless Sensor Networks (Abstract)
RUGGED: RoUting on finGerprint Gradients in sEnsor Networks (Abstract)
Internet Performance Modeling Using Mixture Dynamical System Models (Abstract)
Hybrid Cache Invalidation Schemes in Mobile Environments (Abstract)
Opportunistic Application Flows in Pervasive Environments (PDF)
A Distributed Framework for Relaying Stereo Vision for Telerobotics (Abstract)
Towards a Unified Graph-Based Framework for Dynamic Component-Based Architectures Description in Z (Abstract)
Modeling Jini-UPnP Bridge using Rapide ADL (PDF)
Simulation Performance Evaluation of an Energy Efficient Routing Protocol for Mobile Ad Hoc Networks (PDF)
A Method of Capturing System Stableness Degree in Resource Discovery and Interaction (PDF)
Secure Pervasive Computing without a Trusted Third Party (PDF)
Middies: Passive Middleware Abstractions for Pervasive Computing Environments (PDF)
Self-Deployment and Self-Configuration of Pervasive Network Services (PDF)
Author Index (PDF)