Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,369,651 papers from all fields of science
Search
Sign In
Create Free Account
Ubiquitous computing
Known as:
Pervasive Computing
, Ubiquitous games
, Ubiquitous Software
Expand
Ubiquitous computing (or "ubicomp") is a concept in software engineering and computer science where computing is made to appear anytime and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
3G MIMO
Adaptation (computer science)
Ambient Devices
Automatic identification and data capture
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Vehicles Meet Infrastructure: Toward Capacity–Cost Tradeoffs for Vehicular Access Networks
N. Lu
,
Ning Zhang
,
Nan Cheng
,
Xuemin Shen
,
J. Mark
,
F. Bai
IEEE transactions on intelligent transportation…
2013
Corpus ID: 7129123
Access infrastructure, such as Wi-Fi access points and cellular base stations (BSs), plays a vital role in providing pervasive…
Expand
Highly Cited
2011
Highly Cited
2011
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
Chun-Ta Li
,
M. Hwang
Information Sciences
2011
Corpus ID: 11133949
Review
2008
Review
2008
EPC Network Architecture
D. Ranasinghe
,
M. Harrison
,
P. Cole
2008
Corpus ID: 56529213
The concept of a “Networked Physical World” originated from the Auto-ID Center, now called the Auto-ID Labs [1]. Such a “World…
Expand
Highly Cited
2008
Highly Cited
2008
Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives
Varuna Godara
2008
Corpus ID: 55796531
Today, e-businesses are adopting pervasive computing with passion but at the same time aware of the operational, ethical, legal…
Expand
Highly Cited
2005
Highly Cited
2005
Categorisation and modelling of quality in context information
M. A. Razzaque
,
S. Dobson
,
P. Nixon
International Joint Conference on Artificial…
2005
Corpus ID: 16041833
Pervasive Computing environments are dynamic and heterogeneous. They are required to be self-managing and autonomic, demanding…
Expand
Highly Cited
2005
Highly Cited
2005
Security parallels between people and pervasive devices
Stephen A. Weis
Third IEEE International Conference on Pervasive…
2005
Corpus ID: 1646419
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost…
Expand
Review
2004
Review
2004
Device ensembles [ubiquitous computing]
Bill N. Schilit
,
U. Sengupta
Computer
2004
Corpus ID: 206447287
The ubiquity of wireless local and personal area networks, an expanding array of intelligent handheld devices, and an…
Expand
Highly Cited
2003
Highly Cited
2003
Automating Service Dependency Management in a Service-Oriented Component Model
H. Cervantes
,
R. Hall
2003
Corpus ID: 7018614
This paper describes a mechanism to automate service dependency management in a service-oriented component model. The impetus…
Expand
Highly Cited
2002
Highly Cited
2002
Development of situation-aware application software for ubiquitous computing environments
S. Yau
,
Yu Wang
,
F. Karim
Proceedings 26th Annual International Computer…
2002
Corpus ID: 8909283
Ubiquitous computing represents the concept of computing everywhere, making computing and communication essentially transparent…
Expand
Highly Cited
2000
Highly Cited
2000
Practical Intrusion Detection Handbook
Paul Proctor
2000
Corpus ID: 109760243
From the Publisher: The definitive guide to understanding, selecting, and deploying intrusion detection in the enterprise…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE