Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of UbiComp

ISSN: 0976--2213
Publisher: Academy & Industry Research Collaboration Center (AIRCC)


ADD TO MY LIST
 
Validation of Context Based Service Discovery Protocol for Ubiquitous Applications PDF available

Author(s): Anandi Giridharan | Pallapa Venkataram
Volume: 3
Issue: 4
Year: 2012
A Secure Web Application: E-Tracking System PDF available

Author(s): Vina M. Lomte | D. R. Ingle | B. B. Meshram
Volume: 3
Issue: 4
Year: 2012
Evaluation of Data Fusion in Radars Network and Determination of Optimum Algorithm PDF available

Author(s): Ali Naseri | Omid Azmoon
Volume: 2
Issue: 4
Year: 2011
Cloud Based Application Development for Accessing Restaurant Information on Mobile Device using LBS PDF available

Author(s): Keerthi S. Shetty | Sanjay Singh
Volume: 2
Issue: 4
Year: 2011
Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol PDF available

Author(s): Mehrdad Kianersi | Mahmoud Gardeshi
Volume: 2
Issue: 4
Year: 2011
Cryptanalysis of Sulma, An Ultralightweight Mutual Authentication Protocol for Low-Cost RFID Tags PDF available

Author(s): Mahdi Azizi | Nasour Bagheri
Volume: 2
Issue: 4
Year: 2011
Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous Environments PDF available

Author(s): Lachhman Das Dhomeja | Yasir Arfat Malkani | Asad Ali Shaikh | Ayaz Keerio
Volume: 2
Issue: 4
Year: 2011
EFFECTIVE LOAD BALANCING WITH POWER CONSERVATION IN RFID PDF available

Author(s): Vijayakumar.G.Dhas | Ramanathan Muthukaruppan | Konguvel Balakrishnan | Rajarajan Ganesan
Volume: 1
Issue: 4
Year: 2010
WAP Based Seamless Roaming In Urban Environment with Wise Handoff Technique PDF available

Author(s): N.S.V.Shet | K.Chandrasekaran | K.C.Shet
Volume: 1
Issue: 4
Year: 2010
MOBILE BASED SECURE DIGITAL WALLET FOR PEER TO PEER PAYMENT SYSTEM PDF available

Author(s): Majid Taghiloo | Mohammad Ali Agheli | Mohammad Reza Rezaeinezhad
Volume: 1
Issue: 4
Year: 2010
Cryptanalysis of Pasargad, A Distance Bounding Protocol Based on RFID System PDF available

Author(s): Mahdi Azizi | Abdolrasol Mirgadri | Nasour Bagheri
Volume: 3
Issue: 3
Year: 2012
Attacks on Web Based Software and Modelling Defence Mechanisms PDF available

Author(s): D.R. Ingle | B. B. Meshram
Volume: 3
Issue: 3
Year: 2012
Intrusion Detection and Prevention of Node Replication Attacks in Wireless Body Area Sensor Network PDF available

Author(s): Anandkumar K.M | Jayakumar C | Arun Kumar P | Sushma M | Vikraman R
Volume: 3
Issue: 3
Year: 2012
Providing a Distance Bounding Protocol Named Pasargad in order to Defend against Relay Attacks on RFID-Based Electronic Voting System PDF available

Author(s): Mohammad Arjmand | Mahmoud Gardeshi | Reza Taheri zohur | Mohammad Kazemi
Volume: 2
Issue: 3
Year: 2011
EFFICIENT ALGORITHMS TO ENHANCE RECOVERY SCHEMA IN LINK STATE PROTOCOLS PDF available

Author(s): Radwan S. Abujassar | Mohammed Ghanbari
Volume: 2
Issue: 3
Year: 2011
SYSTEM SUPPORT FOR MANAGING INVALID BINDINGS PDF available

Author(s): Lachhman Das Dhomeja | Yasir Arfat Malkani | Azhar Ali Shah | Khalil Khoumbati
Volume: 2
Issue: 3
Year: 2011
A NEW SYSTEM ARCHITECTURE FOR PERVASIVE COMPUTING PDF available

Author(s): Anis ISMAIL | Abd El Salam AL HAJJAR | Ziad Ismail
Volume: 2
Issue: 3
Year: 2011
SAVINGS IN LOCATION MANAGEMENT COSTS LEVERAGING USER STATISTICS PDF available

Author(s): E. Martin | R. Bajcsy
Volume: 2
Issue: 3
Year: 2011
I-Interaction: An Intelligent In-Vehicle User Interaction Model PDF available

Author(s): Li Liu | Edward Dillon
Volume: 1
Issue: 3
Year: 2010
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network PDF available

Author(s): R. Shankar | Timothy Rajkumar.K | P.Dananjayan
Volume: 1
Issue: 3
Year: 2010
An Intelligent Driver Assistance System (I-DAS) for Vehicle Safety Modelling using Ontology Approach PDF available

Author(s): Saravanan Kannan | Arunkumar Thangavelu | RameshBabu Kalivaradhan
Volume: 1
Issue: 3
Year: 2010
Interaction With Tilting Gestures In Ubiquitous Environments PDF available

Author(s): Ayman Atia | Jiro Tanaka
Volume: 1
Issue: 3
Year: 2010
A novel integrated approach for handling anomalies in RFID data PDF available

Author(s): A.Anny Leema, | Hemalatha.M
Volume: 4
Issue: 2
Year: 2013
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMETER, SPO2 AND LOCATION SENSORS PDF available

Author(s): Ogunduyile O.O | Zuva K | Randle O.A | Zuva T
Volume: 4
Issue: 2
Year: 2013
Secure Device Pairing: A Usability Study PDF available

Author(s): Yasir Arfat Malkani | Ayaz Keerio | Lachhman Das Dhomeja
Volume: 3
Issue: 2
Year: 2012
Content Based Video Retrieval Systems PDF available

Author(s): B V Patel | B B Meshram
Volume: 3
Issue: 2
Year: 2012
A Group-based Method for Context-Aware Service Discovery in Pervasive Computing Environment PDF available

Author(s): Marzieh Ilka | Ahmad Faraah | Mahdi Niamanesh
Volume: 3
Issue: 2
Year: 2012
SESSAMO: Session Mobility for Video Streaming Applications PDF available

Author(s): Mohammed BOUTABIA | Luis Rojas CARDENAS | Hossam AFIFI
Volume: 2
Issue: 2
Year: 2011
Data Storage on a RFID Tag for a Distributed System PDF available

Author(s): Sarita Pais | Judith Symonds
Volume: 2
Issue: 2
Year: 2011
Efficient and Secure Authentication and Key Agreement Protocol PDF available

Author(s): Ja’afer AL-Saraireh
Volume: 2
Issue: 2
Year: 2011
Time Synchronization in Wireless Sensor Networks: A Survey PDF available

Author(s): Prakash Ranganathan | Kendall Nygard
Volume: 1
Issue: 2
Year: 2010
Overlapping Zone Partitioning Localisation Technique for RFID PDF available

Author(s): Kavi K. Khedo | Dassen Sathan | Roushdat Elaheebocus | Raja K. Subramanian | Soonil D.D.V. Rughooputh
Volume: 1
Issue: 2
Year: 2010
A Distributed System for MAD-COW Disease Monitoring and Tracking PDF available

Author(s): Lei Zhang | Alvin S. Lim | Hui Song | Xinliang Zheng
Volume: 1
Issue: 2
Year: 2010
SULMA: A Secure Ultra Light-Weight Mutual Authentication Protocol for Lowcost RFID Tags PDF available

Author(s): Mehrdad Kianersi | Mahmoud Gardeshi | Mohammad Arjmand
Volume: 2
Issue: 2
Year: 2011
Checkpointing with Synchronized Clocks in Distributed Systems PDF available

Author(s): S. Neogy | A. Sinha | P. K. Das
Volume: 1
Issue: 2
Year: 2010
Fault Tolerant Distributed and Fixed Hierarchical Mobile IP PDF available

Author(s): Paramesh C. Upadhyay | Sudarshan Tiwari
Volume: 1
Issue: 2
Year: 2010
Modified Queue-Based Exponential Rule Scheduler for Improved QOS in OFDMA Systems PDF available

Author(s): C.Kalyana Chakravarthy | P.V.G.D. Prasad Reddy
Volume: 1
Issue: 2
Year: 2010
A Framework for enabling Service migration in Ubiquitous Computing PDF available

Author(s): Irene Antony Tharayil | Rajasree M. S.
Volume: 4
Issue: 1
Year: 2013
Acceleration Detection of Large (Probably) Prime Numbers PDF available

Author(s): Dragan Vidakovic | Olivera Nikolic | Dusko Parezanovic
Volume: 4
Issue: 1
Year: 2013
A Novel and Cost Effective Approach to Public Vehicle Tracking System PDF available

Author(s): Deepak Mishra | Apurv Vasal | Puneet Tandon
Volume: 3
Issue: 1
Year: 2012
Real Time Hand Gesture Recognition System for Dynamic Applications PDF available

Author(s): Siddharth S. Rautaray | Anupam Agrawal
Volume: 3
Issue: 1
Year: 2012
A Proposed Architecture for Continuous Web Monitoring Through Online Crawling of Blogs PDF available

Author(s): Mehdi Naghavi | Mohsen Sharifi
Volume: 3
Issue: 1
Year: 2012
Cryptanalysis and Enhancement of Two Low Cost RFID Authentication Protocols PDF available

Author(s): Hoda Jannati | Abolfazl Falahati
Volume: 3
Issue: 1
Year: 2012
CDTOM: A Context-driven Task-oriented Middleware for Pervasive Homecare Environment PDF available

Author(s): Hongbo Ni | Bessam Abdulrazak | Daqing Zhang | Shu Wu
Volume: 2
Issue: 1
Year: 2011
Information Selection and Delivery Algorithm for Delivering Advertisements Suitable for the Pedestrians Present at a Particular Site PDF available

Author(s): Koichi MATSUOKA | Nobuo KATOU | Shigeo DEJIMA | Kazumasa TAKAMI
Volume: 2
Issue: 1
Year: 2011
24-Karat Protection: RFID and Retail Jewelry Marketing PDF available

Author(s): David C. Wyld
Volume: 1
Issue: 1
Year: 2010
Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard PDF available

Author(s): MohammadHassan Habibi | Mahmud Gardeshi | Mahdi R. Alaghband
Volume: 2
Issue: 1
Year: 2011
EFFICIENT ALGORITHMS TO ENHANCE RECOVERY SCHEMA IN LINK STATE PROTOCOLS PDF available

Author(s): Radwan S. Abujassar | Mohammed Ghanbari
Volume: 02
Issue: 03
Year: 2011
Providing a Distance Bounding Protocol Named Pasargad in order to Defend against Relay Attacks on RFID-Based Electronic Voting System PDF available

Author(s): Mohammad Arjmand | Mahmoud Gardeshi | Reza Taheri zohur | Mohammad Kazemi
Volume: 02
Issue: 03
Year: 2011
Free Forms + CRM     Why do you need a reservation system?