Mobile and Ubiquitous Objects

The University of Malaga's wireless communications and pervasive computing team is developing software tools to enhance distributed mobile applications' development and deployment phases. So, our first aim was to obtain tools based on wireless devices. On the other hand, traditional method...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE pervasive computing 2006-07, Vol.5 (3), p.57-59
Hauptverfasser: Diaz, A., Merino, P., Rivas, F.J., Kulkarni, U.P., Vadavi, J.V., Joshi, S.M., Yardi, A.R.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 59
container_issue 3
container_start_page 57
container_title IEEE pervasive computing
container_volume 5
creator Diaz, A.
Merino, P.
Rivas, F.J.
Kulkarni, U.P.
Vadavi, J.V.
Joshi, S.M.
Yardi, A.R.
description The University of Malaga's wireless communications and pervasive computing team is developing software tools to enhance distributed mobile applications' development and deployment phases. So, our first aim was to obtain tools based on wireless devices. On the other hand, traditional methods for analyzing mobile data communications' performance in realistic scenarios were based on trials, using mobile devices only as modems with the applications running in a laptop. Our research group is investigating two issues related to ubiquitous objects: creating a model to combat security risks and access-control problems and developing a protocol to facilitate communication between various objects
doi_str_mv 10.1109/MPRV.2006.52
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_MPRV_2006_52</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1673367</ieee_id><sourcerecordid>1019695831</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-405ef6b0af3abc2fdc9e87c4e6f1998eb35e950e40688f00949301956407f5833</originalsourceid><addsrcrecordid>eNp90E1Lw0AQBuBFFKzVmzcRchIPps7uZjc7Ryl-QUtFrNcl2c5CStq02fTQf--GCN48DDOHh5fhZeyaw4RzwMf5x-f3RADoiRInbMSVMqlQCKf9LXXKhTbn7CKENQA3iDhit_OmrGpKiu0qWZbV_lB1zSEki3JNrguX7MwXdaCr3z1my5fnr-lbOlu8vk-fZqmTHLs0A0Vel1B4WZRO-JVDMrnLSHuOaKiUilABZaCN8QCYoQSOSmeQe2WkHLO7IXfXNvsDhc5uquCorostxXesMLkUEvMI7_-FPMZqjJE80oeBurYJoSVvd221KdpjRLavy_Z12b4uq0TkNwOviOiP6lzKOD8fvGNi</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1019695831</pqid></control><display><type>article</type><title>Mobile and Ubiquitous Objects</title><source>IEEE Electronic Library (IEL)</source><creator>Diaz, A. ; Merino, P. ; Rivas, F.J. ; Kulkarni, U.P. ; Vadavi, J.V. ; Joshi, S.M. ; Yardi, A.R.</creator><creatorcontrib>Diaz, A. ; Merino, P. ; Rivas, F.J. ; Kulkarni, U.P. ; Vadavi, J.V. ; Joshi, S.M. ; Yardi, A.R.</creatorcontrib><description>The University of Malaga's wireless communications and pervasive computing team is developing software tools to enhance distributed mobile applications' development and deployment phases. So, our first aim was to obtain tools based on wireless devices. On the other hand, traditional methods for analyzing mobile data communications' performance in realistic scenarios were based on trials, using mobile devices only as modems with the applications running in a laptop. Our research group is investigating two issues related to ubiquitous objects: creating a model to combat security risks and access-control problems and developing a protocol to facilitate communication between various objects</description><identifier>ISSN: 1536-1268</identifier><identifier>EISSN: 1558-2590</identifier><identifier>DOI: 10.1109/MPRV.2006.52</identifier><identifier>CODEN: IPCECF</identifier><language>eng</language><publisher>IEEE</publisher><subject>access control ; Application software ; communication ; Communication system security ; Computation ; Computer programs ; Data analysis ; Data communication ; debugging ; distributed mobile applications ; Laptop ; middleware ; Mobile communication systems ; Mobile computing ; Modems ; Performance analysis ; Pervasive computing ; Phases ; Security ; Software ; software deployment ; software development ; Software tools ; ubiquitous objects ; Wireless communication</subject><ispartof>IEEE pervasive computing, 2006-07, Vol.5 (3), p.57-59</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-405ef6b0af3abc2fdc9e87c4e6f1998eb35e950e40688f00949301956407f5833</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1673367$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27923,27924,54757</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1673367$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Diaz, A.</creatorcontrib><creatorcontrib>Merino, P.</creatorcontrib><creatorcontrib>Rivas, F.J.</creatorcontrib><creatorcontrib>Kulkarni, U.P.</creatorcontrib><creatorcontrib>Vadavi, J.V.</creatorcontrib><creatorcontrib>Joshi, S.M.</creatorcontrib><creatorcontrib>Yardi, A.R.</creatorcontrib><title>Mobile and Ubiquitous Objects</title><title>IEEE pervasive computing</title><addtitle>MPRV</addtitle><description>The University of Malaga's wireless communications and pervasive computing team is developing software tools to enhance distributed mobile applications' development and deployment phases. So, our first aim was to obtain tools based on wireless devices. On the other hand, traditional methods for analyzing mobile data communications' performance in realistic scenarios were based on trials, using mobile devices only as modems with the applications running in a laptop. Our research group is investigating two issues related to ubiquitous objects: creating a model to combat security risks and access-control problems and developing a protocol to facilitate communication between various objects</description><subject>access control</subject><subject>Application software</subject><subject>communication</subject><subject>Communication system security</subject><subject>Computation</subject><subject>Computer programs</subject><subject>Data analysis</subject><subject>Data communication</subject><subject>debugging</subject><subject>distributed mobile applications</subject><subject>Laptop</subject><subject>middleware</subject><subject>Mobile communication systems</subject><subject>Mobile computing</subject><subject>Modems</subject><subject>Performance analysis</subject><subject>Pervasive computing</subject><subject>Phases</subject><subject>Security</subject><subject>Software</subject><subject>software deployment</subject><subject>software development</subject><subject>Software tools</subject><subject>ubiquitous objects</subject><subject>Wireless communication</subject><issn>1536-1268</issn><issn>1558-2590</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2006</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNp90E1Lw0AQBuBFFKzVmzcRchIPps7uZjc7Ryl-QUtFrNcl2c5CStq02fTQf--GCN48DDOHh5fhZeyaw4RzwMf5x-f3RADoiRInbMSVMqlQCKf9LXXKhTbn7CKENQA3iDhit_OmrGpKiu0qWZbV_lB1zSEki3JNrguX7MwXdaCr3z1my5fnr-lbOlu8vk-fZqmTHLs0A0Vel1B4WZRO-JVDMrnLSHuOaKiUilABZaCN8QCYoQSOSmeQe2WkHLO7IXfXNvsDhc5uquCorostxXesMLkUEvMI7_-FPMZqjJE80oeBurYJoSVvd221KdpjRLavy_Z12b4uq0TkNwOviOiP6lzKOD8fvGNi</recordid><startdate>20060701</startdate><enddate>20060701</enddate><creator>Diaz, A.</creator><creator>Merino, P.</creator><creator>Rivas, F.J.</creator><creator>Kulkarni, U.P.</creator><creator>Vadavi, J.V.</creator><creator>Joshi, S.M.</creator><creator>Yardi, A.R.</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20060701</creationdate><title>Mobile and Ubiquitous Objects</title><author>Diaz, A. ; Merino, P. ; Rivas, F.J. ; Kulkarni, U.P. ; Vadavi, J.V. ; Joshi, S.M. ; Yardi, A.R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-405ef6b0af3abc2fdc9e87c4e6f1998eb35e950e40688f00949301956407f5833</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2006</creationdate><topic>access control</topic><topic>Application software</topic><topic>communication</topic><topic>Communication system security</topic><topic>Computation</topic><topic>Computer programs</topic><topic>Data analysis</topic><topic>Data communication</topic><topic>debugging</topic><topic>distributed mobile applications</topic><topic>Laptop</topic><topic>middleware</topic><topic>Mobile communication systems</topic><topic>Mobile computing</topic><topic>Modems</topic><topic>Performance analysis</topic><topic>Pervasive computing</topic><topic>Phases</topic><topic>Security</topic><topic>Software</topic><topic>software deployment</topic><topic>software development</topic><topic>Software tools</topic><topic>ubiquitous objects</topic><topic>Wireless communication</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Diaz, A.</creatorcontrib><creatorcontrib>Merino, P.</creatorcontrib><creatorcontrib>Rivas, F.J.</creatorcontrib><creatorcontrib>Kulkarni, U.P.</creatorcontrib><creatorcontrib>Vadavi, J.V.</creatorcontrib><creatorcontrib>Joshi, S.M.</creatorcontrib><creatorcontrib>Yardi, A.R.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE pervasive computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Diaz, A.</au><au>Merino, P.</au><au>Rivas, F.J.</au><au>Kulkarni, U.P.</au><au>Vadavi, J.V.</au><au>Joshi, S.M.</au><au>Yardi, A.R.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Mobile and Ubiquitous Objects</atitle><jtitle>IEEE pervasive computing</jtitle><stitle>MPRV</stitle><date>2006-07-01</date><risdate>2006</risdate><volume>5</volume><issue>3</issue><spage>57</spage><epage>59</epage><pages>57-59</pages><issn>1536-1268</issn><eissn>1558-2590</eissn><coden>IPCECF</coden><abstract>The University of Malaga's wireless communications and pervasive computing team is developing software tools to enhance distributed mobile applications' development and deployment phases. So, our first aim was to obtain tools based on wireless devices. On the other hand, traditional methods for analyzing mobile data communications' performance in realistic scenarios were based on trials, using mobile devices only as modems with the applications running in a laptop. Our research group is investigating two issues related to ubiquitous objects: creating a model to combat security risks and access-control problems and developing a protocol to facilitate communication between various objects</abstract><pub>IEEE</pub><doi>10.1109/MPRV.2006.52</doi><tpages>3</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1536-1268
ispartof IEEE pervasive computing, 2006-07, Vol.5 (3), p.57-59
issn 1536-1268
1558-2590
language eng
recordid cdi_crossref_primary_10_1109_MPRV_2006_52
source IEEE Electronic Library (IEL)
subjects access control
Application software
communication
Communication system security
Computation
Computer programs
Data analysis
Data communication
debugging
distributed mobile applications
Laptop
middleware
Mobile communication systems
Mobile computing
Modems
Performance analysis
Pervasive computing
Phases
Security
Software
software deployment
software development
Software tools
ubiquitous objects
Wireless communication
title Mobile and Ubiquitous Objects
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T15%3A58%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Mobile%20and%20Ubiquitous%20Objects&rft.jtitle=IEEE%20pervasive%20computing&rft.au=Diaz,%20A.&rft.date=2006-07-01&rft.volume=5&rft.issue=3&rft.spage=57&rft.epage=59&rft.pages=57-59&rft.issn=1536-1268&rft.eissn=1558-2590&rft.coden=IPCECF&rft_id=info:doi/10.1109/MPRV.2006.52&rft_dat=%3Cproquest_RIE%3E1019695831%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1019695831&rft_id=info:pmid/&rft_ieee_id=1673367&rfr_iscdi=true