Sciweavers

370 search results - page 21 / 74
» Design for Privacy in Ubiquitous Computing Environments
Sort
View
ISORC
2003
IEEE
14 years 1 months ago
Object-Oriented Middleware Infrastructure for Distributed Augmented Reality
The paper describes design and implementation of software infrastructure for building augmented reality applications for ubiquitous computing environments. Augmented reality is on...
Eiji Tokunaga, Andrej van der Zee, Makoto Kurahash...
IPC
2007
IEEE
14 years 2 months ago
Design and Validation of a Low-Power Network Node for Pervasive Applications
Pervasive computing refers to making many computing devices available throughout the physical environment, while making them effectively invisible to the user. To further increase...
Juan-Carlos Cano, Carlos Miguel Tavares Calafate, ...
CSREASAM
2007
13 years 9 months ago
Contextual Risk-Based Access Control
- Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are in...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
14 years 1 months ago
Ambient computing applications: an experience with the SPREAD approach
Todays, we assist to the explosive development of mobile computing devices like PDAs and cell-phones, the integration of embedded intelligence (like Web server) in more and more c...
Paul Couderc, Michel Banâtre
CHI
2007
ACM
14 years 8 months ago
Exploring affective design for physical controls
Physical controls such as knobs, sliders, and buttons are experiencing a revival as many computing systems progress from personal computing architectures towards ubiquitous comput...
Colin Swindells, Karon E. MacLean, Kellogg S. Boot...