- 1. Big data management systems for the exploitation of pervasive environments
- (Publication)
- Created on 19 December 2018
- 2. Big Data Processing for Pervasive Environment in Cloud Computing
- (Publication)
- Created on 19 December 2018
- 3. Simulation and Support of Critical Activities by Mobile Agents in Pervasive and Ubiquitos Scenarios
- (Publication)
- Many contexts of every-day life are characterized by pervasiveness and ubiquity of embedded systems. These features can be exploited to support people in different scenarios, such as emergency situations ...
- Created on 19 December 2018
- 4. Semantically Augmented Exploitation of Pervasive Environments by Intelligent Agents
- (Publication)
- Mobile devices can be used to improve the exploitation of reality by the user in pervasive environments. In this paper we present a software framework for augmenting the user's perception of reality by ...
- Created on 19 December 2018
- 5. A Semantic Framework for Delivery of Context-Aware Ubiquitous Services in Pervasive Environments
- (Publication)
- Pervasive environments offer to software applications the possibility to interact with the reality in order to perceive the information surrounding the users and to adapt the environment itself, or to ...
- Created on 19 December 2018
- 6. Mobile Devices for the Visit of "Anfiteatro Campano" in Santa Maria Capua Veter
- (Publication)
- Archaeological sites become pervasive environments because of personal devices like tablets and smart-phones, which are able to detect and explain ruins, artifact and points of cultural interest by their ...
- Created on 19 December 2018
- 7. Semantic Brokering of Multimedia Contents for Smart Delivery of Ubiquitous Services in Pervasive Environments
- (Publication)
- With the proliferation of modern mobile devices having the capability to interact each other and with the environment in a transparent manner, there is an increase in the development of those applications ...
- Created on 19 December 2018
- 8. Agents Network for Automatic Safety Check in Constructing Sites
- (Publication)
- Compliance with safety standards in constructing sites is a mandatory activity that helps prevent a high num ber of fatalities during working activities. Unfortunately, because of negligence or limited ...
- Created on 19 December 2018
- 9. The Cloud\}@Home Project: Towards a New Enhanced Computing Paradig
- (Publication)
- Cloud Computing is emerging as a promising paradigm capable of providing a flexible, dynamic, resilient and cost effective infrastructure for both academic and business environments. The aim of this project ...
- Created on 19 December 2018
- 10. A simulation model for localization of pervasive objects using heterogeneous wireless networks
- (Publication)
- Position represents a relevant attribute needed by many applications, whose contexts are characterized by pervasiveness of the objects/things in the considered scenarios. In order to infer positions of ...
- Created on 19 December 2018
- 11. BDI Intelligent Agents for Augmented Exploitation of Pervasive Environments
- (Publication)
- Created on 19 December 2018
- 12. Mobile Agent-Based Provision of Context-Awareness for Positioning
- (Publication)
- The convergence of wireless networking, mobile computing, pervasive devices, and location-sensing technologies has created a new class of computing, namely location-aware computing, that is based on the ...
- Created on 19 December 2018
- 13. A Positioning Service for Pervasive Objects in Dynamic Environments
- (Publication)
- Pervasiveness of electronic devices and networks allows to design ubiquitous services, which use distributed sensors as their extensions. Localization of mobile objects using standard protocols and infrastructures ...
- Created on 19 December 2018
- 14. Distributed Agents network for ubiquitous Monitoring and Services Exploitation
- (Publication)
- Many application contexts noways are characterized by pervasiveness of embedded systems in crowded environments of everyday life. To accomplish common requirements ubiquitous computing must address many ...
- Created on 19 December 2018
- 15. Testing complex safety-critical systems in SOA context
- (Publication)
- Due to its simplicity and ease of application, testing is the main technique by which complex safety-critical systems can be verified in order to find both omission and commission bugs.Strict requirements ...
- Created on 19 December 2018
- 16. On the Evaluation of the Distributed Objects and Mobile Agents Programming Models for a Distributed Optimization Application
- (Publication)
- Distributed Objects and Mobile Agents are gaining more and more popularity in parallel and distributed programming, especially when targeted towards heterogeneous distributed architectures. In this paper ...
- Created on 19 December 2018