Abstract. In this paper we identify the common techniques and technologies that are enabling location identification in a ubiquitous computing environment. We also address the imp...
Kavitha Muthukrishnan, Maria Eva Lijding, Paul J. ...
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Core to ubiquitous computing environments are adaptive software systems that adapt their behavior to the context in which the user is attempting the task the system aims to suppor...
Eleanor O'Neill, Martin Klepal, David Lewis, Tony ...
With increased use of mobile information technology and increased amounts of information comes the need to simplify information presentation. This research considers whether low-in...
Peter Tarasewich, Christopher S. Campbell, Tian Xi...
This paper summarizes value analysis of adopting technologysupported attendance control service in a primary school. The results are based on a case study that explored a 14-week ...
Minna Isomursu, Mari Ervasti, Marianne Kinnula, Pe...