Home UC3M
Home IT
Home / Teaching / Máster Interuniversitario en Ingeniería Telemática / Ubiquitous computing


Ubiquitous Computing

Computación Ubicua

  REFERENCES

Standardization Group


Magazine and Journals

  • IEEE Pervasive Computing Magazine
  • IEEE Transactions on Mobile Computing
  • IEEE Communications Magazine
  • IEEE Wireless Communications
  • IEEE Security & Privacy
  • Computer Networks (Elsevier)
  • IEEE Communications Letter
  • IEEE Transactions on Consumer Electronics

Basic References

  • Communications of the ACM. Número especial sobre Ubiquitous Computing. Dec 2002.
  • IEEE Personal Communications, Volume: 8 Issue: 4. Número especial "An overview of pervasive computing". Aug 2001.
  • Satyanarayanan, M: "Pervasive computing: vision and challenges". IEEE Personal Communications, Volume: 8 Issue: 4, Page(s): 10 -17. Aug 2001.
  • C. Siva Ram Murthy and B.S. Manoj.: "Transport Layer and Security Protocols for Ad Hoc Wireless Networks". Chapter 9. Ad Hoc Wireless Networks. Architectures and Protocols. ISBN 0-13-147023-X. (L/D 004.72 MUR).

Mobility Support Articles

  • Ł. Budzisz, R. Ferrús, A. Brunstrom, K-J. Grinnemo, R. Fracchia, G. Galante, and F. Casadevall. "Towards transport-layer mobility: Evolution of SCTP multihoming". Computer Communications, volume 31, issue 5, 980-998. March 2008.
  • D. Le, X. Fu, and D. Hogrefe. A Review of Mobility Support Paradigms for the Internet. IEEE Communications Surveys and Tutorials, 8(1):2--15, 2006.
  • H. Schulzrinne, E. Wedlund: "Application-layer mobility using SIP". ACM SIGMOBILE Mobile Computing and Communications Review,   Volume 4, Issue 3, Pages: 47 - 57. July 2000.
  • M. Ratola: "Which Layer for Mobility? - Comparing Mobile IPv5, HIP and SCTP". T-110.551 Seminar on Internetworking in the spring 2004. Espoo, Finland, 2004.
  • W.M. Eddy: "At what layer does mobility belong?". Communications Magazine, IEEE, On page(s): 155- 159, Volume: 42,   Issue: 10, Oct. 2004.
  • S. Thajchayapong and J.M. Peha.: "Mobility Patterns in Microcellular Wireless Networks". In IEEE Transactions on Mobile Computing. Vol. 5. Nº 1. January 2006.
  • R. Stewart, Q. Xie, M. Tuexen, S. Maruyama, M. Kozuka: "Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration". RFC 5061, September 2007.
  • S. Moyer, D. Marples, S. Tsang, J. Katz, P. Gurung, T. Cheng, A. Dutta, H. Schulzrinne, A. Roychowdhury: "Framework Draft for Networked Appliances using the Session Initiation Protocol". Internet Draft, draft-moyer-sip-appliances-framework-02.txt, December 2001.
  • S. Tsang, S. Moyer, D. Marples, H. Schulzrinne, A. Roychowdhur: "SIP Extensions for Communicating with Networked Appliances". Internet Draft, draft-tsang-sip-appliances-do-00.txt, November, 2000.

Service Discovery Articles

  • C. Campo, C. García-Rubio, A. Marín and F. Almenárez: "PDP: A lightweight discovery protocol for local-scope interactions in wireless ad hoc networks". In Computer Networks Journal, volume 50, issue 17. Elsevier. ISSN: 1389-1286. December 2006.
  • F. Zhu, M. W. Mutka and L. M. Ni.: "Service Discovery in Pervasive Computing Environments".   In IEEE Pervasive Computing. October-December 2005.

Prediction Algorithm Articles

  • S. K. Das, D. J. Cook, A. Bhattacharya, E. O. Heierman III, T. Lin: "The Role of Prediction Algorithms in the MavHome Smart Home Architecture". IEEE Wireless Communications, no. 6, December 2002.
  • K. Gopalratnam and D. J. Cook: "Online Sequential Prediction Via Incremental Parsing: The Active LeZi Algorithm". IEEE Intelligent Systems.

Energy Articles

  • L. Feeney and M. Nilson.: "Investigating the energy consumption of a wireless network interface in an ad hoc networking environment". In Proc. IEEE INFOCOM 2001.
  • C. E. Jones, K. M. Sivalingam, P. Agrawal, and J. C. Chen.: "A survey of energy efficient network protocols for wireless networks". Wireless Networks, 7(4):343--358, July 2001.

Sensor Networks Articles

  • I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cyirci. "Wireless Sensor Networks: A Survey". Computer Networks, 38(4):393-422, Mar. 2002.
  • M. Labrador, P. Wightman. "Topology Control in Wireless Sensor Networks, with a companion simulation tool for teaching and research". Springer, 210 p. ISBN: 978-1-4020-9584-9. 2009.
  • D. Djenouri, L. Khelladi, AN Badache. "A survey of security issues in mobile ad hoc and sensor networks". Communications Surveys & Tutorials, IEEE, Vol. 7, No. 4, pp. 2-28. 2005.

Security and Trust Articles

  • OASIS eXtensible Access Control Markup Language (XACML) TC. XACML Specification Set. Disponible en http://www.oasis-open.org/committees/xacml/.
  • OASIS Security Services (SAML) TC. SAML Specifications V2.0. Disponible en http://www.oasis-open.org/committees/security/.
  • E. Maler, D. Reed. "The Venn of Identity: Options and Issues in Federated Identity Management". Security & Privacy, IEEE, Volume 6, Issue 2, pages 16-23. March-April 2008.
  • Y. Sun, Z. Hany, K.J. Ray Liu. "Defense of trust management vulnerabilities in distributed networks". Communications Magazine, IEEE, Volume 46, Issue 2, pages 112-119. February 2008.
  • M. Merabti, D. Llewellyn-Jones. "Digital Rights Management in Ubiquitous Computing". Multimedia, IEEE, Volume 13, Issue 2, pages 32- 42. April-June 2006.

Mobile Agents Articles

  • J. Dale, E. Mamdani: "Open Standards for Interoperating Agent-Based Systems". In: Software Focus, 1(2), John Wiley, 2001." Disponible en http://www.fipa.org/docs/input/f-in-00023/f-in-00023.html
  • D. Chess, C. Harrison, and A.Kershenbaum: "Mobile Agents: Are they a good idea?". IBM Research Report. T.J. Watson Research Center. 1995. Disponible en http://karajan.it.uc3m.es:9673/UbiComp/Material/mobag.ps.zip
  • S. Franklin and A. Graesser: "Is it an Agent, or just a Program?: A Taxonomy for Autonomous Agents". Proceedings of the Third International Workshop on Agent Theories, Architectures, and Languages, Springer-Verlag, 1996.
  • T. Sander and C. F. Tschudin: "Protecting Mobile Agents Against Malicious Hosts". LNCS vol. 1419, edited by G. Vigna, 1998. Disponible en http://karajan.it.uc3m.es:9673/UbiComp/Material/sander98protecting.pdf
  • F. Hohl: "A Framework to Protect Mobile Agents by Using Reference States". 20th International Conference on Distributed Computing Systems (ICDCS 2000).IEEE Computer Society. 2000.

Ubiquitous Computing for Smart Home

  • J. Latvakoski, P. Pääkkönen, D. Pakkala, A. Tikkala, J. Remes, P. Välitalo: "Interaction of All IP Mobile Internet Devices with Networked Appliances in a Residential Home". Proceedings of the 22 nd International Conference on Distributed Computing Systems Workshops (ICDCSW’02), 2002.
  • A. Roy, S. K. Das Bhaumik, A. Bhattacharya, K. Basu, D. Cook and S. K. Das: "Location Aware Resource Management in Smart Homes". In Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom’03). March 2003.
  • C. Bae, J. Yoo, K. Kang, Y. Choe and J. Lee: "Home Server for Home Digital Service Environments". IEEE Transactions on Consumer Electronics, Vol. 49, No. 4, NOVEMBER 2003.

Localización | Personal | Docencia | Investigación | Novedades | Intranet
© Universidad Carlos III de Madrid