By Topic

Pervasive Computing, IEEE

Issue 1 • Date Jan.-March 2006

Filter Results

Displaying Results 1 - 19 of 19
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (405 KB)  
    Freely Available from IEEE
  • Call for Papers

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (410 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (1580 KB)  
    Freely Available from IEEE
  • Grasping the Torch

    Page(s): 4 - 6
    Save to Project icon | Request Permissions | PDF file iconPDF (144 KB)  
    Freely Available from IEEE
  • Nanotechnology: the growing impact of shrinking computers

    Page(s): 7 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (616 KB) |  | HTML iconHTML  

    Nanotechnology helps make the pervasive aspect of pervasive computing possible. One obstacle to putting computers everywhere is size. You can put a desktop computer, well, on your desktop. But you can't put it in your bloodstream (such pervasive computing applications are indeed being explored). Shrinking computers makes it possible to put them almost anywhere. To envision nanotechnology's potential, think about building things from the molecular level up. At that level, you can build in characteristics and capabilities that aren't readily apparent. Fueled by numerous drivers, projects from data storage to power generation to medical exploration are all putting nanotechnology to use. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Products

    Page(s): 12 - 15
    Save to Project icon | Request Permissions | PDF file iconPDF (1112 KB)  
    Freely Available from IEEE
  • Universal interactions with smart spaces

    Page(s): 16 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (192 KB) |  | HTML iconHTML  

    A critical challenge facing the pervasive computing research community is the need to manage complex interactions among numerous interconnected computers and devices. In such a pervasive space, a given application's functionalities are partitioned and distributed across several computing devices that are spontaneously discovered and used. In recent years, researchers have devoted much attention to universal interactions with diverse devices in richly networked settings. We can categorize the numerous approaches explored into two groups: universal user interface languages and user interface remoting. We review recent noteworthy efforts for universal interactions using these two approaches. Such efforts aim to raise interoperability in interactive smart spaces by standardizing user interface languages or communication protocols. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID Technology and Applications

    Page(s): 22 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (864 KB) |  | HTML iconHTML  

    Radio frequency identification is a wireless communication technology that lets computers read the identity of inexpensive electronic tags from a distance without requiring a battery in the tags. As RFID technology matures, it will likely unleash a new wave of applications that will exploit inexpensive and highly available automatic identification. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An introduction to RFID technology

    Page(s): 25 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2936 KB) |  | HTML iconHTML  

    In recent years, radio frequency identification technology has moved from obscurity into mainstream applications that help speed the handling of manufactured goods and materials. RFID enables identification from a distance, and unlike earlier bar-code technology, it does so without requiring a line of sight. In this paper, the author introduces the principles of RFID, discusses its primary technologies and applications, and reviews the challenges organizations will face in deploying this technology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID-based maintenance at Frankfurt airport

    Page(s): 34 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (864 KB) |  | HTML iconHTML  

    Frankfurt airport's operating company, Fraport AG, integrated RFID and a mobile application with its asset management systems. The benefits include better planning, control, and documentation of technicians' work as well as improved process quality. This article summarizes not only the technology Fraport tested at Frankfurt airport but also the process-flow and facility-management changes it adopted. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requesting Pervasive Services by Touching RFID Tags

    Page(s): 40 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (968 KB) |  | HTML iconHTML  

    As the vision of pervasive computing gradually becomes a reality, we are seeing an increasing number of services in our everyday environments. We don't just access them at desktop computers but everywhere our activities lead us-using mobile terminals and built-in technology. Although a positive phenomenon, this transition also introduces considerable challenges to discovering and selecting services. The authors propose a general framework for requesting pervasive services by touching RFID tags. Visual symbols communicate to users the objects that they can touch and that activate services. When a user touches such a symbol with a mobile phone, the data stored in the tag and other contextual information related to the situation trigger the requested service. The authors designed a set of visual symbols and implemented the required functionality as component-based middleware. They studied this novel system's usability and user experience. This article is part of a special issue on RFID Technology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LotTrack: RFID-based process control in the semiconductor industry

    Page(s): 47 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2184 KB) |  | HTML iconHTML  

    We describe the design and implementation of a real-time localization solution that Infineon Technologies uses in its wafer fabrication facility in Villach, Austria. The system combines active RFID, passive RFID, and ultrasound sensors to track plastic wafer boxes and wafer cassettes in the company's chip-manufacturing process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-powered wireless temperature sensors exploit RFID technology

    Page(s): 54 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1992 KB) |  | HTML iconHTML  

    Emerging RFID technology lets us embed sensors into a very small chip, creating a wireless sensing device. So, we set out to develop such a single-chip versatile temperature sensor. We also wanted to be able to transfer our design to an implantable temperature sensor for an animal healthcare application with minimal structural modification. We discuss the implementation of temperature sensor. The fully integrated complementary metal-oxide semiconductor (CMOS) batteryless device measures temperature and performs calibration to compensate for the sensor's inherent imperfections. An RF link using passive RFID's backscattering technique wirelessly transmits the data to a reading device while extracting power from the same "airwave," letting the device operate anywhere and last almost forever. The entire microchip, including the temperature sensor, consumes less than a few microamperes over a half a second, so the scanning device can capture data from longer read distances. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The evolution of RFID security

    Page(s): 62 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1112 KB) |  | HTML iconHTML  

    As RFID technology progresses, security and privacy threats also evolve. By examining RFID's history, we can learn from past mistakes, rediscover successful solutions, and inspire future research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The smart phone: a ubiquitous input device

    Page(s): 70 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2328 KB) |  | HTML iconHTML  

    We show how modern mobile phones (Weiser's tabs) can interact with their environment, especially large situated displays (Weiser's boards). Smart phones' emerging capabilities are fueling a rise in the use of mobile phones as input devices to such resources as situated displays, vending machines, and home appliances. Mobile phones' prevalence gives them great potential to be the default physical interface for ubiquitous computing applications. We survey interaction techniques that use mobile phones as input devices to ubiquitous computing environments. We use smart phone to describe an enhanced mobile phone. Our analysis blurs the line between smart phones and PDAs such as the Palm Pilot because the feature sets continue to converge. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pervasive gaming in the everyday world

    Page(s): 78 - 85
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1888 KB) |  | HTML iconHTML  

    In this paper, we've made an initial attempt to explore the three dimensions of pervasive game play in the context of people's everyday life. Using an advanced prototype of SupaFly, a pervasive game developed by the former company It's Alive (now part of Daydream), we've evaluated how people perceive and play the game in normal, everyday settings. Our evaluation focused on how the players judged the designers' attempts to incorporate the three dimensions in the game. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wearable systems in nursing home care: prototyping experience

    Page(s): 86 - 91
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (776 KB) |  | HTML iconHTML  

    Productivity in nursing care is a major concern in all residential facilities, as is improving the quality of care. Pervasive computing offers great promise in this area. In this paper we discuss requirements analysis, multiphase prototyping, and effective use of commercial off-the-shelf technologies to improve communication and situation awareness in nursing teams. We developed a wearable prototype with only a person-month of development time, using existing electronic meeting technologies for its multimodal communication platform. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wearables in 2005

    Page(s): 92 - 95
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3328 KB) |  | HTML iconHTML  

    In October 2005, the 9th Annual International Symposium on Wearable Computing was held in Osaka, Japan, the first to be held in Asia. As the largest primary conference for wearables researchers, ISWC provides a good snapshot of the state of the field. So, with the benefit of hindsight, this article presents highlights of how wearables research actually looked in 2005. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2005 Reviewers

    Page(s): 96
    Save to Project icon | Request Permissions | PDF file iconPDF (73 KB)  
    Freely Available from IEEE

Aims & Scope

All aspects of current mobile computing research and applications development, including architectures, support services, algorithms and protocols, mobile environments, mobile communication systems, applications, emerging technologies, and societal impacts.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Dr. Roy Want
Intel Research