Sciweavers

2358 search results - page 104 / 472
» A Secure Pervasive Environment
Sort
View
PERCOM
2010
ACM
14 years 26 days ago
Negotiate power and performance in the reality of RFID systems
—Recent years have witnessed the wide adoption of the RFID technology in many important application domains including logistics, inventory, retailing, public transportation, and ...
Xunteng Xu, Lin Gu, Jianping Wang, Guoliang Xing
PERVASIVE
2005
Springer
14 years 2 months ago
Service Discovery in TinyObj: Strategies and Approaches
In this paper, we describe TinyObj service discovery model, which uses short wireless packet broadcasts for service discovery within a user’s vicinity. We present a prototype im...
Pavel Poupyrev, Takahiro Sasao, Shunsuke Saruwatar...
NORDICHI
2004
ACM
14 years 2 months ago
Place storming: performing new technologies in context
We present Place Storming, an original method of brainstorming technological concepts, particularly in the area of pervasive computing. Place Storming is contextdriven and play-ba...
Ken Anderson, Jane McGonigal
PERVASIVE
2004
Springer
14 years 2 months ago
Augmenting Collections of Everyday Objects: A Case Study of Clothes Hangers As an Information Display
Though the common conception of human-computer interfaces is one of screens and keyboards, the emergence of ubiquitous computing envisions interfaces that will spread from the desk...
Tara Matthews, Hans-Werner Gellersen, Kristof Van ...
DAIS
2010
13 years 10 months ago
Distributed Object-Oriented Programming with RFID Technology
Our everyday environments will soon be pervaded with RFID tags integrated in physical objects. These RFID tags can store a digital representation of the physical object and transmi...
Andoni Lombide Carreton, Kevin Pinte, Wolfgang De ...