Sciweavers

370 search results - page 34 / 74
» Design for Privacy in Ubiquitous Computing Environments
Sort
View
AGENTS
1997
Springer
14 years 6 days ago
Software Agents and User Autonomy
: Software agents comprise a new area for research and soon will be embedded and ubiquitous in modern computing systems. In this formative phase, it is important to develop compreh...
Batya Friedman, Helen Nissenbaum
JPDC
2006
141views more  JPDC 2006»
13 years 8 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
CHI
2005
ACM
14 years 8 months ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
TEI
2009
ACM
106views Hardware» more  TEI 2009»
14 years 2 months ago
Spime builder: a tangible interface for designing hyperlinked objects
Ubiquitous computing is fostering an explosion of physical artifacts that are coupled to digital information – so-called Spimes. We introduce a tangible workbench that allows fo...
Leonardo Bonanni, Greg Vargas, Neil Chao, Stephen ...
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
WebProfiles: A Negotiation Model for User Awareness in Personal Area Networks
Automatic adaptation of the environment to user preferences results in personalized ambients that fulfill user interaction requirements in a more suitable way. However, the proble...
Juan Ignacio Vázquez, Diego López de...