A mobile virtual butler to bridge the gap between users and ambient assisted living: A smart home case study

N Costa, P Domingues, F Fdez-Riverola, A Pereira - Sensors, 2014 - mdpi.com
Ambient Intelligence promises to transform current spaces into electronic environments that
are responsive, assistive and sensitive to human presence. Those electronic environments …

An attack injection approach to evaluate the robustness of ad hoc networks

D de Andrés, J Friginal, JC Ruiz… - 2009 15th IEEE Pacific …, 2009 - ieeexplore.ieee.org
Ad hoc networks constitute a quick and cheap alternative to provide communications when
deploying a fixed infrastructure could result prohibitive in terms of either time or money …

Attack injection to support the evaluation of ad hoc networks

J Friginal, D de Andrés, JC Ruiz… - 2010 29th IEEE …, 2010 - ieeexplore.ieee.org
The increasing emergence of mobile computing devices seamlessly providing wireless
communication capabilities opens a wide range of new application domains for ad hoc …

Towards a flexible middleware for context-aware pervasive and wearable systems

M Muro, M Amoretti, F Zanichelli, G Conte - Medical & biological …, 2012 - Springer
Ambient intelligence and wearable computing call for innovative hardware and software
technologies, including a highly capable, flexible and efficient middleware, allowing for the …

Attack Injection for Performance and Dependability Assessment of Ad hoc Networks

J Friginal, JC Ruiz, D De Andrés, P Gil - 12th European Workshop on …, 2009 - hal.science
Ad hoc networks are wireless, self-configuring and selfmaintaining networks that allow
dispensing of fixed infrastructures by relying on nodes cooperation for providing packet …

[PDF][PDF] A Survey and Taxonomy of Pervasive Computing Research

CC Vo - 2009 - homepage.cs.latrobe.edu.au
A Survey and Taxonomy of Pervasive Computing Research Page 1 A Survey and Taxonomy of
Pervasive Computing Research Chuong Cong Vo Abstract This work presents a survey and …

An aspect-oriented approach to face neighbour saturation issues in proactive ad hoc routing protocols: olsrd as a case study

A Bustos, J Friginal, D de Andrés, JC Ruiz - Proceedings of the 1st …, 2012 - dl.acm.org
Ad hoc networking is gaining momentum in contexts of use requiring the rapid, and low cost,
deployment of communication networks. However, many studies show that ad hoc routing …

[PDF][PDF] Methodology for Engineering Emergent Self–Organization in Massively Distributed Embedded Systems

D Orfánus - 2020 - researchgate.net
Abstract Massively Distributed Embedded Systems (MDES) is a class of distributed
embedded systems consisting of 10s to 1000s of simple autonomous elements with scarce …

Security threats and issues with MANET

S Singh - … advancements and applications in mobile ad-hoc …, 2012 - igi-global.com
In recent years, mobile ad hoc networks have received tremendous attention because of
their self configuration capabilities. Although security has long been an active research topic …

Study of Compressed Organization Structure by Means of Entropy Theory

L Jian-she, W Li-juan, F Bo - … Conference on E-Business and E …, 2010 - ieeexplore.ieee.org
The paper is based on the formula put forward by Shannon, which is used to measure the
information flow generated from discrete variables, and also the maximum entropy rule put …