Learn More
A new computing era after mainframes, PC's and mobiles is becoming more and more anticipated since the beginning of the 21st century: Ubiquitous Computing. A common characteristic behind this approach is that, it is based on a substantially more flexible system understanding , whereby the thought of the system as a tool moves into the background and the(More)
The increasing penetration of the real world with embedded and globally networked sensors enables the formation of a Web of Things (WoT), where high-level state information derived from sensors is embedded into Web representations of real-world entities (e.g. places, objects). A key service for the WoT is searching for entities which exhibit a certain(More)
—The increasing penetration of the real world with embedded and globally networked sensors leads to the formation of the Internet of Things, offering global online access to the current state of the real world. We argue that on top of this real-time data, a Web of Things is needed, a software infrastructure that allows the construction of applications(More)
—We are observing an increasing trend of connecting embedded sensors and sensor networks to the Internet and publishing their output on the Web. We believe that this development is a precursor of a Web of Things, which gives real-world objects and places a Web presence that not only contains a static description of these entities, but also their real-time(More)
It is clear that the reconfiguration of mobile SDR terminals requires complex interactions between the mobile terminal and the network or application server entities. To enable mobile devices to utilize different radio access technologies and communication protocols depending on the requested application QoS and to enable development of context aware(More)
A new computing era after Mainframes, PC's and mobiles is becoming more and more anticipated since the beginning of the 21st century. This new era is often described with several confusing terms such as pervasive, ubiquitous, ambient or context-aware computing. However, there is a common characteristic behind all these projections: They are all based on a(More)
Many ubiquitous computing applications so far fail to live up to their expectations. While working perfectly in controllable laboratory environments , they seem to be particularly prone to problems related to a discrepancy between user expectation and systems behavior when released into the wild. This kind of unwanted behavior of course prevents the vision(More)
The support of reconfiguration requires the existence of negotiation procedures and trading rules connecting the device reconfiguration manager with the corresponding network proxies that will operate between the network proxies and the managed equipment, and will enable the exchange of information (e.g. mode availability, access network capabilities) or(More)