Mobile and Ubiquitous Objects
The University of Malaga's wireless communications and pervasive computing team is developing software tools to enhance distributed mobile applications' development and deployment phases. So, our first aim was to obtain tools based on wireless devices. On the other hand, traditional method...
Gespeichert in:
Veröffentlicht in: | IEEE pervasive computing 2006-07, Vol.5 (3), p.57-59 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 59 |
---|---|
container_issue | 3 |
container_start_page | 57 |
container_title | IEEE pervasive computing |
container_volume | 5 |
creator | Diaz, A. Merino, P. Rivas, F.J. Kulkarni, U.P. Vadavi, J.V. Joshi, S.M. Yardi, A.R. |
description | The University of Malaga's wireless communications and pervasive computing team is developing software tools to enhance distributed mobile applications' development and deployment phases. So, our first aim was to obtain tools based on wireless devices. On the other hand, traditional methods for analyzing mobile data communications' performance in realistic scenarios were based on trials, using mobile devices only as modems with the applications running in a laptop. Our research group is investigating two issues related to ubiquitous objects: creating a model to combat security risks and access-control problems and developing a protocol to facilitate communication between various objects |
doi_str_mv | 10.1109/MPRV.2006.52 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_MPRV_2006_52</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1673367</ieee_id><sourcerecordid>1019695831</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-405ef6b0af3abc2fdc9e87c4e6f1998eb35e950e40688f00949301956407f5833</originalsourceid><addsrcrecordid>eNp90E1Lw0AQBuBFFKzVmzcRchIPps7uZjc7Ryl-QUtFrNcl2c5CStq02fTQf--GCN48DDOHh5fhZeyaw4RzwMf5x-f3RADoiRInbMSVMqlQCKf9LXXKhTbn7CKENQA3iDhit_OmrGpKiu0qWZbV_lB1zSEki3JNrguX7MwXdaCr3z1my5fnr-lbOlu8vk-fZqmTHLs0A0Vel1B4WZRO-JVDMrnLSHuOaKiUilABZaCN8QCYoQSOSmeQe2WkHLO7IXfXNvsDhc5uquCorostxXesMLkUEvMI7_-FPMZqjJE80oeBurYJoSVvd221KdpjRLavy_Z12b4uq0TkNwOviOiP6lzKOD8fvGNi</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1019695831</pqid></control><display><type>article</type><title>Mobile and Ubiquitous Objects</title><source>IEEE Electronic Library (IEL)</source><creator>Diaz, A. ; Merino, P. ; Rivas, F.J. ; Kulkarni, U.P. ; Vadavi, J.V. ; Joshi, S.M. ; Yardi, A.R.</creator><creatorcontrib>Diaz, A. ; Merino, P. ; Rivas, F.J. ; Kulkarni, U.P. ; Vadavi, J.V. ; Joshi, S.M. ; Yardi, A.R.</creatorcontrib><description>The University of Malaga's wireless communications and pervasive computing team is developing software tools to enhance distributed mobile applications' development and deployment phases. So, our first aim was to obtain tools based on wireless devices. On the other hand, traditional methods for analyzing mobile data communications' performance in realistic scenarios were based on trials, using mobile devices only as modems with the applications running in a laptop. Our research group is investigating two issues related to ubiquitous objects: creating a model to combat security risks and access-control problems and developing a protocol to facilitate communication between various objects</description><identifier>ISSN: 1536-1268</identifier><identifier>EISSN: 1558-2590</identifier><identifier>DOI: 10.1109/MPRV.2006.52</identifier><identifier>CODEN: IPCECF</identifier><language>eng</language><publisher>IEEE</publisher><subject>access control ; Application software ; communication ; Communication system security ; Computation ; Computer programs ; Data analysis ; Data communication ; debugging ; distributed mobile applications ; Laptop ; middleware ; Mobile communication systems ; Mobile computing ; Modems ; Performance analysis ; Pervasive computing ; Phases ; Security ; Software ; software deployment ; software development ; Software tools ; ubiquitous objects ; Wireless communication</subject><ispartof>IEEE pervasive computing, 2006-07, Vol.5 (3), p.57-59</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-405ef6b0af3abc2fdc9e87c4e6f1998eb35e950e40688f00949301956407f5833</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1673367$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27923,27924,54757</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1673367$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Diaz, A.</creatorcontrib><creatorcontrib>Merino, P.</creatorcontrib><creatorcontrib>Rivas, F.J.</creatorcontrib><creatorcontrib>Kulkarni, U.P.</creatorcontrib><creatorcontrib>Vadavi, J.V.</creatorcontrib><creatorcontrib>Joshi, S.M.</creatorcontrib><creatorcontrib>Yardi, A.R.</creatorcontrib><title>Mobile and Ubiquitous Objects</title><title>IEEE pervasive computing</title><addtitle>MPRV</addtitle><description>The University of Malaga's wireless communications and pervasive computing team is developing software tools to enhance distributed mobile applications' development and deployment phases. So, our first aim was to obtain tools based on wireless devices. On the other hand, traditional methods for analyzing mobile data communications' performance in realistic scenarios were based on trials, using mobile devices only as modems with the applications running in a laptop. Our research group is investigating two issues related to ubiquitous objects: creating a model to combat security risks and access-control problems and developing a protocol to facilitate communication between various objects</description><subject>access control</subject><subject>Application software</subject><subject>communication</subject><subject>Communication system security</subject><subject>Computation</subject><subject>Computer programs</subject><subject>Data analysis</subject><subject>Data communication</subject><subject>debugging</subject><subject>distributed mobile applications</subject><subject>Laptop</subject><subject>middleware</subject><subject>Mobile communication systems</subject><subject>Mobile computing</subject><subject>Modems</subject><subject>Performance analysis</subject><subject>Pervasive computing</subject><subject>Phases</subject><subject>Security</subject><subject>Software</subject><subject>software deployment</subject><subject>software development</subject><subject>Software tools</subject><subject>ubiquitous objects</subject><subject>Wireless communication</subject><issn>1536-1268</issn><issn>1558-2590</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2006</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNp90E1Lw0AQBuBFFKzVmzcRchIPps7uZjc7Ryl-QUtFrNcl2c5CStq02fTQf--GCN48DDOHh5fhZeyaw4RzwMf5x-f3RADoiRInbMSVMqlQCKf9LXXKhTbn7CKENQA3iDhit_OmrGpKiu0qWZbV_lB1zSEki3JNrguX7MwXdaCr3z1my5fnr-lbOlu8vk-fZqmTHLs0A0Vel1B4WZRO-JVDMrnLSHuOaKiUilABZaCN8QCYoQSOSmeQe2WkHLO7IXfXNvsDhc5uquCorostxXesMLkUEvMI7_-FPMZqjJE80oeBurYJoSVvd221KdpjRLavy_Z12b4uq0TkNwOviOiP6lzKOD8fvGNi</recordid><startdate>20060701</startdate><enddate>20060701</enddate><creator>Diaz, A.</creator><creator>Merino, P.</creator><creator>Rivas, F.J.</creator><creator>Kulkarni, U.P.</creator><creator>Vadavi, J.V.</creator><creator>Joshi, S.M.</creator><creator>Yardi, A.R.</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20060701</creationdate><title>Mobile and Ubiquitous Objects</title><author>Diaz, A. ; Merino, P. ; Rivas, F.J. ; Kulkarni, U.P. ; Vadavi, J.V. ; Joshi, S.M. ; Yardi, A.R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-405ef6b0af3abc2fdc9e87c4e6f1998eb35e950e40688f00949301956407f5833</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2006</creationdate><topic>access control</topic><topic>Application software</topic><topic>communication</topic><topic>Communication system security</topic><topic>Computation</topic><topic>Computer programs</topic><topic>Data analysis</topic><topic>Data communication</topic><topic>debugging</topic><topic>distributed mobile applications</topic><topic>Laptop</topic><topic>middleware</topic><topic>Mobile communication systems</topic><topic>Mobile computing</topic><topic>Modems</topic><topic>Performance analysis</topic><topic>Pervasive computing</topic><topic>Phases</topic><topic>Security</topic><topic>Software</topic><topic>software deployment</topic><topic>software development</topic><topic>Software tools</topic><topic>ubiquitous objects</topic><topic>Wireless communication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Diaz, A.</creatorcontrib><creatorcontrib>Merino, P.</creatorcontrib><creatorcontrib>Rivas, F.J.</creatorcontrib><creatorcontrib>Kulkarni, U.P.</creatorcontrib><creatorcontrib>Vadavi, J.V.</creatorcontrib><creatorcontrib>Joshi, S.M.</creatorcontrib><creatorcontrib>Yardi, A.R.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE pervasive computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Diaz, A.</au><au>Merino, P.</au><au>Rivas, F.J.</au><au>Kulkarni, U.P.</au><au>Vadavi, J.V.</au><au>Joshi, S.M.</au><au>Yardi, A.R.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Mobile and Ubiquitous Objects</atitle><jtitle>IEEE pervasive computing</jtitle><stitle>MPRV</stitle><date>2006-07-01</date><risdate>2006</risdate><volume>5</volume><issue>3</issue><spage>57</spage><epage>59</epage><pages>57-59</pages><issn>1536-1268</issn><eissn>1558-2590</eissn><coden>IPCECF</coden><abstract>The University of Malaga's wireless communications and pervasive computing team is developing software tools to enhance distributed mobile applications' development and deployment phases. So, our first aim was to obtain tools based on wireless devices. On the other hand, traditional methods for analyzing mobile data communications' performance in realistic scenarios were based on trials, using mobile devices only as modems with the applications running in a laptop. Our research group is investigating two issues related to ubiquitous objects: creating a model to combat security risks and access-control problems and developing a protocol to facilitate communication between various objects</abstract><pub>IEEE</pub><doi>10.1109/MPRV.2006.52</doi><tpages>3</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1536-1268 |
ispartof | IEEE pervasive computing, 2006-07, Vol.5 (3), p.57-59 |
issn | 1536-1268 1558-2590 |
language | eng |
recordid | cdi_crossref_primary_10_1109_MPRV_2006_52 |
source | IEEE Electronic Library (IEL) |
subjects | access control Application software communication Communication system security Computation Computer programs Data analysis Data communication debugging distributed mobile applications Laptop middleware Mobile communication systems Mobile computing Modems Performance analysis Pervasive computing Phases Security Software software deployment software development Software tools ubiquitous objects Wireless communication |
title | Mobile and Ubiquitous Objects |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T15%3A58%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Mobile%20and%20Ubiquitous%20Objects&rft.jtitle=IEEE%20pervasive%20computing&rft.au=Diaz,%20A.&rft.date=2006-07-01&rft.volume=5&rft.issue=3&rft.spage=57&rft.epage=59&rft.pages=57-59&rft.issn=1536-1268&rft.eissn=1558-2590&rft.coden=IPCECF&rft_id=info:doi/10.1109/MPRV.2006.52&rft_dat=%3Cproquest_RIE%3E1019695831%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1019695831&rft_id=info:pmid/&rft_ieee_id=1673367&rfr_iscdi=true |