Proceedings 21st International Conference on Distributed Computing Systems Workshops
DOI: 10.1109/cdcs.2001.918707
|View full text |Cite
|
Sign up to set email alerts
|

Sm@rtLibrary - an infrastructure for ubiquitous technologies and applications

Abstract: This paper presents our ongoing research on the potentials of ubiquitous technologies for future workspaces. The SmBrtLibrary serves as a test and demonstration environment for ubiquitous technologies and their application. In this area we are currently concentrating on localization and location management technologies, context-dependent services, platform and device independent access to the services and information provided in such environments.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…For example, in the Smart Library experiment implemented by the Swiss Federal Institute of Technology, Zurich, and the German National Research Center for Information Technology, researchers used RFID-enabled IC chips to automatically sense people and books in a library-like environment. 1 In this experiment, a person's virtual object records what books that person is interested in. Conversely, the book's virtual object records the status of the book, such as whether it is out on loan and where it is currently located.…”
Section: Aims Of Ubiquitous Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, in the Smart Library experiment implemented by the Swiss Federal Institute of Technology, Zurich, and the German National Research Center for Information Technology, researchers used RFID-enabled IC chips to automatically sense people and books in a library-like environment. 1 In this experiment, a person's virtual object records what books that person is interested in. Conversely, the book's virtual object records the status of the book, such as whether it is out on loan and where it is currently located.…”
Section: Aims Of Ubiquitous Computingmentioning
confidence: 99%
“…It also includes application data and a message authentication code (MAC) 4 created by a service provider. The service provider calculates MAC using cryptographic check function f with the input data comprised of the system data, application data, and secret key K. MAC = fK (system data, application data) (1) The service provider's computer securely retains secret key K. When a sensor sends the 128-bit ID information to a computer, it checks to see if the original MAC matches the calculated one from Equation 1. If the system data and/or application data is altered during the data transmission or through other events, the computer easily detects the alteration because the calculated MAC would be incorrect.…”
Section: Securing Pervasive Materials Handlingmentioning
confidence: 99%