• An ECA-P policy-based framework for managing ubiquitous computing environments

  • Defend against cache consistency attacks in wireless ad hoc networks

  • Secure reporting of traffic forwarding activity in mobile ad hoc networks

  • A reputation-based mechanism for isolating selfish nodes in ad hoc networks

  • MPA assisted optimized proactive handoff scheme

  • An enhanced dynamic framed slotted ALOHA algorithm for RFID tag identification

  • Loosely coupling ontological reasoning with an efficient middleware for context-awareness

  • Contextualizing applications via semantic middleware

  • Plethora: a framework for converting generic applications to run in a ubiquitous environment

  • Exploiting co-location history for efficient service selection in ubiquitous computing systems