Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,755,883 papers from all fields of science
Search
Sign In
Create Free Account
Ubiquitous computing
Known as:
Pervasive Computing
, Ubiquitous games
, Ubiquitous Software
Expand
Ubiquitous computing (or "ubicomp") is a concept in software engineering and computer science where computing is made to appear anytime and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
3G MIMO
Adaptation (computer science)
Ambient Devices
Automatic identification and data capture
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2008
Review
2008
EPC Network Architecture
D. Ranasinghe
,
M. Harrison
,
P. Cole
2008
Corpus ID: 56529213
The concept of a “Networked Physical World” originated from the Auto-ID Center, now called the Auto-ID Labs [1]. Such a “World…
Expand
Highly Cited
2005
Highly Cited
2005
Categorisation and modelling of quality in context information
M. A. Razzaque
,
S. Dobson
,
P. Nixon
International Joint Conference on Artificial…
2005
Corpus ID: 16041833
Pervasive Computing environments are dynamic and heterogeneous. They are required to be self-managing and autonomic, demanding…
Expand
Highly Cited
2005
Highly Cited
2005
Pervasive power: a radioisotope-powered piezoelectric generator
A. Lal
,
R. Duggirala
,
Hui Li
IEEE pervasive computing
2005
Corpus ID: 18891519
A long-lasting radioisotope micropower generator for self-powered sensor microsystems promises to make pervasive computing…
Expand
Review
2004
Review
2004
Device ensembles [ubiquitous computing]
Bill N. Schilit
,
U. Sengupta
Computer
2004
Corpus ID: 206447287
The ubiquity of wireless local and personal area networks, an expanding array of intelligent handheld devices, and an…
Expand
Highly Cited
2004
Highly Cited
2004
Wireless Future: Ubiquitous Computing
Friedemann Mattern
2004
Corpus ID: 10024700
Over the last 30 years, we have seen the power of microprocessors double about every 18 months. An equally rapid increase applies…
Expand
Highly Cited
2002
Highly Cited
2002
Development of situation-aware application software for ubiquitous computing environments
S. Yau
,
Yu Wang
,
F. Karim
Proceedings 26th Annual International Computer…
2002
Corpus ID: 8909283
Ubiquitous computing represents the concept of computing everywhere, making computing and communication essentially transparent…
Expand
Highly Cited
2000
Highly Cited
2000
Clustering algorithms for wireless ad hoc networks
Lakshmi Ramachandran
,
M. Kapoor
,
Abhinanda Sarkar
,
A. Aggarwal
DIALM '00
2000
Corpus ID: 7845006
Efficient clustering algorithms play a very important role in the fast connection establishment of ad hoc networks. In this paper…
Expand
Highly Cited
2000
Highly Cited
2000
Practical Intrusion Detection Handbook
Paul Proctor
2000
Corpus ID: 109760243
From the Publisher: The definitive guide to understanding, selecting, and deploying intrusion detection in the enterprise…
Expand
Highly Cited
1995
Highly Cited
1995
Network management and control issues in multimedia wireless networks
M. Schwartz
IEEE wireless communications
1995
Corpus ID: 21261255
Discusses some typical multimedia applications and services that might be expected to use future wireless and combined wireless…
Expand
Highly Cited
1993
Highly Cited
1993
Disconnected Operation for AFS
L. Huston
,
P. Honeyman
Symposium on Mobile and Location-Independent…
1993
Corpus ID: 14731575
AFS plays a prominent role in our plans for a mobile workstation. The AFS client manages a cache of the most recently used files…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE