Android/OSGi-based Machine-to-Machine context-aware system

M Kuna, H Kolaric, I Bojic, M Kusek… - Proceedings of the 11th …, 2011 - ieeexplore.ieee.org
This paper presents a context-aware system that uses Machine-to-Machine communication
to retrieve sensor data collected by an Android operating system smartphone. It uses the …

Distributed e-health system with smart self-care units

M Rusu, G Saplacan, G Sebestyen… - 2009 IEEE 5th …, 2009 - ieeexplore.ieee.org
In order to assure remote monitoring of patients with chronic diseases and also to improve
the responsiveness and quality of medical services a distributed e-health system was …

Agent-based mobile middleware architecture (AMMA) for patient-care clinical data messaging using wireless networks

B Arunachalan, J Light - 2008 12th IEEE/ACM International …, 2008 - ieeexplore.ieee.org
Mobile messaging in healthcare environment is asynchronous based on real-time events,
set of contextual elements such as location of service, resource availability, and guaranteed …

[PDF][PDF] A Jabber-based management framework for heterogeneous sensor network applications

C Pastrone, MA Spirito, R Tomasi, F Rizzo - International Journal of …, 2008 - Citeseer
The continuously increasing diffusion of application scenarios requiring pervasive data
sensing has lead to the development of novel monitoring solutions leveraging on …

Applying event-driven architecture to mobile computing

S Nitz, C Kleiner, A Koschel… - … Symposium on Signal …, 2013 - ieeexplore.ieee.org
Complex event processing (CEP) has been an area of intensive research in recent years.
Similarly, mobile devices such as smartphones, tablets and laptops are widespread …

Promising XMPP based applications for military and defense systems

O Gürel, MU Çakir - 2013 IEEE 37th Annual Computer Software …, 2013 - ieeexplore.ieee.org
This paper discusses Extensible Messaging and Presence Protocol (XMPP) based
promising applications and their prospective use in military and defense industry. XMPP …

[PDF][PDF] Domain independent context awareness framework

M Vrbaski - 2013 - repository.library.carleton.ca
In the past few years we witnessed a huge expansion and penetration of wireless
appliances, sensor, smart phones, PDAs in a wide range of domains, such as smart homes …

Using MetaXA for theft detection

I Astrova, C Kleiner, A Koschel… - 2014 Science and …, 2014 - ieeexplore.ieee.org
While mobile devices (such as smartphones, tablets and laptops) allow for more flexible and
convenient business operations, they are susceptible of thefts. Surprisingly, mobile devices …

DEUS: Distributed Electronic Patient File Update System

CP Neumann, F Rampp, R Lenz - arXiv preprint arXiv:2311.14349, 2023 - arxiv.org
Inadequate availability of patient information is a major cause for medical errors and affects
costs in healthcare. Traditional approaches to information integration in healthcare do not …

An Offline Srategy Of Securing A Confidential Data In A Misplaced Or Stolen Laptop And Track Back The Laptop With Location And Pictorial Metrics Of Unauthorised …

PI Ansiya, PS Mol, S Dharmalingam - Advances in Natural and Applied …, 2017 - go.gale.com
In recent years, many measures have been proposed for preventing the laptop thefts and to
track back the misplaced laptop. Yet many of these techniques have not been fruitful after …