Reference Hub1
Pervasive Computing Applications, Technologies, and Challenges for E-Health

Pervasive Computing Applications, Technologies, and Challenges for E-Health

Thienne Johnson, Eleri Cardozo, Eliane Gomes Guimarães
ISBN13: 9781615208432|ISBN10: 1615208437|EISBN13: 9781615208449
DOI: 10.4018/978-1-61520-843-2.ch012
Cite Chapter Cite Chapter

MLA

Johnson, Thienne, et al. "Pervasive Computing Applications, Technologies, and Challenges for E-Health." Designing Solutions-Based Ubiquitous and Pervasive Computing: New Issues and Trends, edited by Francisco Milton Mendes Neto and Pedro Fernandes Ribeiro Neto, IGI Global, 2010, pp. 232-247. https://doi.org/10.4018/978-1-61520-843-2.ch012

APA

Johnson, T., Cardozo, E., & Gomes Guimarães, E. (2010). Pervasive Computing Applications, Technologies, and Challenges for E-Health. In F. Neto & P. Neto (Eds.), Designing Solutions-Based Ubiquitous and Pervasive Computing: New Issues and Trends (pp. 232-247). IGI Global. https://doi.org/10.4018/978-1-61520-843-2.ch012

Chicago

Johnson, Thienne, Eleri Cardozo, and Eliane Gomes Guimarães. "Pervasive Computing Applications, Technologies, and Challenges for E-Health." In Designing Solutions-Based Ubiquitous and Pervasive Computing: New Issues and Trends, edited by Francisco Milton Mendes Neto and Pedro Fernandes Ribeiro Neto, 232-247. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-61520-843-2.ch012

Export Reference

Mendeley
Favorite

Abstract

The pervasive computing paradigm offers many tools to facilitate health care applications. It allows more robust local and remote monitoring applications, because of many personal acquired contexts that can be used to provide better specialized health services, such as emergency, elderly care, etc. This chapter provides an overview of pervasive environments for eHealth applications. The most common applications and some technologies used to provide pervasive computing environment to collect information for the eHealth applications will be described. Some challenge issues that need research and discussion will be presented, such as security, use of context, user acceptance and performance requirements.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.