{"title":"Opportunistic Networks","authors":"A. Heinemann","doi":"10.4018/9781599048321.ch009","DOIUrl":null,"url":null,"abstract":"A predominant concern in ubiquitous computing (UC) is the natural and effortless interaction of humans with a smart environment in order to carry out a certain task or simply to make life easier. Often, interaction is bootstrapped with a user’s personal, mobile device. Such a device may carry a digital representation in form of a user profile and a key pair that serves as a digital identity. Examples of devices are personal digital assistants (PDAs) or mobile phones. Especially the mobile phone plays a prominent role since it has conquered our everyday life and is basically ubiquitously available for the user. More and more mobile phones and PDAs are equipped with short range wireless communication capabilities. In most cases, either Bluetooth (Bluetooth SIG Inc., 2003-2005) or 802.11b WiFi technology (IEEE, 1999) is integrated. The prevalent use of wireless connectivity is to synchronize personal data between a mobile device and a desktop computer (via Bluetooth) or have easy access to an institution’s network (via a 802.11 WiFi Wireless Access Point) and further to the Internet. But in addition, with the integration of abstract","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"120","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/9781599048321.ch009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 120
Abstract
A predominant concern in ubiquitous computing (UC) is the natural and effortless interaction of humans with a smart environment in order to carry out a certain task or simply to make life easier. Often, interaction is bootstrapped with a user’s personal, mobile device. Such a device may carry a digital representation in form of a user profile and a key pair that serves as a digital identity. Examples of devices are personal digital assistants (PDAs) or mobile phones. Especially the mobile phone plays a prominent role since it has conquered our everyday life and is basically ubiquitously available for the user. More and more mobile phones and PDAs are equipped with short range wireless communication capabilities. In most cases, either Bluetooth (Bluetooth SIG Inc., 2003-2005) or 802.11b WiFi technology (IEEE, 1999) is integrated. The prevalent use of wireless connectivity is to synchronize personal data between a mobile device and a desktop computer (via Bluetooth) or have easy access to an institution’s network (via a 802.11 WiFi Wireless Access Point) and further to the Internet. But in addition, with the integration of abstract