Context-aware systems: A literature review and classification

J Hong, E Suh, SJ Kim - Expert Systems with applications, 2009 - Elsevier
Nowadays, numerous journals and conferences have published articles related to context-
aware systems, indicating many researchers' interest. Therefore, the goal of this paper is to …

Ubiquitous computing: An overview of technology impacts

M Friedewald, O Raabe - Telematics and Informatics, 2011 - Elsevier
Ubiquitous computing is considered as a promising technological path of innovation.
Intensive R&D activities and political strategies are addressing the objective to foster …

Engineering context-aware systems and applications: A survey

U Alegre, JC Augusto, T Clark - Journal of Systems and Software, 2016 - Elsevier
Context-awareness is an essential component of systems developed in areas like Intelligent
Environments, Pervasive & Ubiquitous Computing and Ambient Intelligence. In these …

An autonomic context management system for pervasive computing

P Hu, J Indulska, R Robinson - 2008 Sixth Annual IEEE …, 2008 - ieeexplore.ieee.org
Context-aware applications adapt to changing computing environments or changing user
circumstances/tasks. Context information that supports such adaptations is provided by the …

A review of cybersecurity in grid-connected power electronics converters: Vulnerabilities, countermeasures, and testbeds

R Fu, ME Lichtenwalner, TJ Johnson - IEEE Access, 2023 - ieeexplore.ieee.org
With the increasing installations of solar energy, electric vehicles, and other distributed
energy resources and the deeper developments of digitalization and standardization …

A framework for programming robust context-aware applications

D Kulkarni, A Tripathi - IEEE Transactions on Software …, 2010 - ieeexplore.ieee.org
In this paper, we present a forward recovery model for programming robust context-aware
applications. The mechanisms devised as part of this model fall into two categories …

A novel fault tolerant service selection framework for pervasive computing

S Silas, K Ezra, E Blessing Rajsingh - Human-Centric Computing and …, 2012 - Springer
Background Service selection in pervasive computing is significant as it requires identifying
the best service provider based on users requirements. After identifying the best service …

Visibility of DCT basis functions: Effects of contrast masking

JA Solomon, AB Watson… - Proceedings of IEEE Data …, 1994 - ieeexplore.ieee.org
The discrete cosine transform (DCT) is a standard method by which images may be
compressed. Initially, the image is divided into 8/spl times/8-pixel blocks, each of which is …

BESI: Reliable and heterogeneous sensing and intervention for in-home health applications

R Alam, J Dugan, N Homdee, N Gandhi… - 2017 IEEE/ACM …, 2017 - ieeexplore.ieee.org
Advances in sensing, wireless communication, and data analytics have enabled various
monitoring systems for smart health applications. However, many challenges remain to …

Dynamic IoT Choreographies

J Seeger, RA Deshmukh, V Sarafov… - IEEE Pervasive …, 2019 - ieeexplore.ieee.org
The Internet of Things is growing at a dramatic rate and extending into various application
domains. We have designed, implemented, and evaluated a resilient and decentralized …