Computación de Sistemas Ubicuos (86 - 8582)

Estudio: Máster Interuniversitario en Ingeniería Telemática

Fecha de generación:  15-03-2016 10:01:09

Curso Académico:   2015/2016
Imprimir la ficha en pdf

Profesor coordinador:

Fecha Revisión:

Departamento de Ingeniería Telemática

Sin tipo definido



Créditos ECTS:

Profesores, Horarios, Grupos e Idiomas
Para consultar los profesores, grupos y horarios pinchar en el enlace:
  • Máster Interuniversitario en Ingeniería Telemática

Competencias que adquiere el estudiante y resultados del aprendizaje.


Criterios de evaluación

Bibliografía básica
  • Gupta, S.K.S. , Wang-Chien Lee, Purakayastha, A., Srimani, P.K.. "An overview of pervasive computing" (número especial).. IEEE Personal Communications, Volume 8, Issue 4. Aug 2001..
  • Leonard M. Jessup, Daniel Robey.. "Issues and challenges in ubiquitous computing".. Communications of the ACM, Volume 45 , Issue 12. December 2002..
  • Satyanarayanan, M.. "Pervasive computing: vision and challenges".. IEEE Personal Communications, Volume 8, Issue 4, Page(s) 10 -17. Aug 2001..

Bibliografía complementaria
  • C. Campo, C. García-Rubio, A. Marín and F. Almenárez.. "PDP: A lightweight discovery protocol for local-scope interactions in wireless ad hoc networks".. In Computer Networks Journal, Volume 50, Issue 17. Elsevier. ISSN: 1389-1286. December 2006..
  • C. E. Jones, K. M. Sivalingam, P. Agrawal, and J. C. Chen.. "A survey of energy efficient network protocols for wireless networks".. Wireless Networks, 7(4):343--358, July 2001.
  • C. Siva Ram Murthy and B.S. Manoj.. "Transport Layer and Security Protocols for Ad Hoc Wireless Networks".. Chapter 9. Ad Hoc Wireless Networks. Architectures and Protocols. Prentice Hall. ISBN 0-13-147023-X. (L/D 004.72 MUR)..
  • D. Chess, C. Harrison, and A.Kershenbaum. "Mobile Agents: Are they a good idea?". IBM Research Report. T.J. Watson Research Center. 1995. Disponible en
  • D. Le, X. Fu, and D. Hogrefe.. "A Review of Mobility Support Paradigms for the Internet".. IEEE Communications Surveys and Tutorials, 8(1):2--15, 2006..
  • F. Hohl.. "A Framework to Protect Mobile Agents by Using Reference States".. 20th International Conference on Distributed Computing Systems (ICDCS 2000). IEEE Computer Society. 2000..
  • F. Zhu, M. W. Mutka and L. M. Ni.. "Service Discovery in Pervasive Computing Environments".. In IEEE Pervasive Computing. October-December 2005..
  • H. Schulzrinne, E. Wedlund.. "Application-layer mobility using SIP".. ACM SIGMOBILE Mobile Computing and Communications Review, Volume 4, Issue 3, Pages: 47 - 57. July 2000..
  • I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cyirci.. "Wireless Sensor Networks: A Survey".. Computer Networks, 38(4):393-422, March 2002..
  • J. Dale, E. Mamdani.. "Open Standards for Interoperating Agent-Based Systems".. In: Software Focus, 1(2), John Wiley, 2001. Disponible en
  • L. Budzisz, R. Ferrús, A. Brunstrom, K-J. Grinnemo, R. Fracchia, G. Galante, and F. Casadevall.. "Towards transport-layer mobility: Evolution of SCTP multihoming".. Computer Communications, volume 31, issue 5, 980-998. March 2008..
  • L. Feeney and M. Nilson.. "Investigating the energy consumption of a wireless network interface in an ad hoc networking environment".. In Proc. IEEE INFOCOM 2001..
  • OASIS Security Services (SAML) TC.. SAML Specifications V2.0.. Disponible en
  • OASIS eXtensible Access Control Markup Language (XACML) TC.. XACML Specification Set.. Disponible en
  • S. Franklin and A. Graesser.. "Is it an Agent, or just a Program?: A Taxonomy for Autonomous Agents".. Proceedings of the Third International Workshop on Agent Theories, Architectures, and Languages, Springer-Verlag, 1996.
  • S. K. Das, D. J. Cook, A. Bhattacharya, E. O. Heierman III, T. Lin,. "The Role of Prediction Algorithms in the MavHome Smart Home Architecture".. IEEE Wireless Communications, no. 6, December 2002..
  • S. Thajchayapong and J.M. Peha.. "Mobility Patterns in Microcellular Wireless Networks".. In IEEE Transactions on Mobile Computing. Vol. 5. Nº 1. January 2006.
  • T. Sander and C. F. Tschudin.. "Protecting Mobile Agents Against Malicious Hosts".. LNCS vol. 1419, edited by G. Vigna, 1998. Disponible en
  • W.M. Eddy.. "At what layer does mobility belong?".. Communications Magazine, IEEE, On page(s): 155- 159, Volume: 42, Issue: 10, Oct. 2004..

El programa de la asignatura y, concretamente, la planificación semanal, podrán sufrir alguna variación por causa de fuerza mayor debidamente justificada así como por eventos académicos comunicados con suficiente antelación

Dirección web para más información:

© Universidad Carlos III de Madrid