Third IEEE International Conference on Pervasive Computing and Communications
DOI: 10.1109/percom.2005.6
|View full text |Cite
|
Sign up to set email alerts
|

Accessing Ubiquitous Services Using Smart Phones

Abstract: The integration of Bluetooth service discovery protocol (SDP)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
12
0

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 26 publications
(14 citation statements)
references
References 19 publications
2
12
0
Order By: Relevance
“…As autonomicity is one of the key technologies able to address such requirements, the use-case is a city where some catastrophic event has impacted the communication infrastructure causing faults limiting normal wire and wireless connectivity, but with the premise that all agents are endowed with mobile devices with wireless capacity [2].…”
Section: Objectivesmentioning
confidence: 99%
See 1 more Smart Citation
“…As autonomicity is one of the key technologies able to address such requirements, the use-case is a city where some catastrophic event has impacted the communication infrastructure causing faults limiting normal wire and wireless connectivity, but with the premise that all agents are endowed with mobile devices with wireless capacity [2].…”
Section: Objectivesmentioning
confidence: 99%
“…The use-case considers a city where some catastrophic event has impacted the communication infrastructure causing faults limiting normal wire and wireless connectivity, but with the premise that all the involved entities are endowed with mobile devices with wireless capacity [2]. Such a use-case is ideal for demonstrating how autonomic self-organization meets requirements for communications in critical situations between the survivors and rescue teams, with the aim of providing first aid as soon as possible.…”
Section: Chapter Iii: Experimental Prototype 1 Introductionmentioning
confidence: 99%
“…Perhaps the most closely related such works are those of Beaufour and Bonnet [11] and Ravi et al [38]. Both consider the use of smartphones for implementing physical access control (c.f., Section 6.1), and Ravi et al also provide an approach for integrating payment and access control with service discovery via smartphones.…”
Section: Related Workmentioning
confidence: 99%
“…Grey is an effort to enhance this platform to build a ubiquitous access-control technology spanning both physical and virtual resources. This vision is not ours alone; e.g., several groups have experimented with the use of mobile phones as digital keys [11,38]; NTT Docomo is conducting trials on the use of mobile phones to authorize entry to apartments 2 ; and mobile phones can already be used to purchase items from vending machines in several countries. However, to the extent that the capabilities of these systems can be inferred, we believe that Grey presents a more sound and flexible platform for building a ubiquitous access-control system and, eventually, for experimenting with advanced mobile applications.…”
Section: Introductionmentioning
confidence: 99%
“…These phones can serve as personal computers for all practical purposes, if only the display could be made bigger and battery lifetime improved. There is already some research initiative in exploring the potential of mobile phones as next generation personal computers [35,55].…”
Section: Technology Enablersmentioning
confidence: 99%