Sciweavers

233 search results - page 44 / 47
» Location-based services in ubiquitous computing environments
Sort
View
DIM
2005
ACM
13 years 9 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
MOBILITY
2009
ACM
14 years 8 days ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
CHI
2005
ACM
13 years 9 months ago
Experience buffers: a socially appropriate, selective archiving tool for evidence-based care
Diagnosis, treatment, and monitoring of interventions for children with autism can profit most when caregivers have substantial amounts of data they can easily record and review a...
Gillian R. Hayes, Khai N. Truong, Gregory D. Abowd...
DIMEA
2008
176views Multimedia» more  DIMEA 2008»
13 years 9 months ago
Designing GUI for the user configuration of pervasive awareness applications
The vision of Pervasive and Ubiquitous Computing promises that our future environments will be furnished with an increasing number of computationally augmented artifacts. Conseque...
Eleni Romoudi, Theodosia Fokidou
CIDR
2003
150views Algorithms» more  CIDR 2003»
13 years 9 months ago
The Database Machine: Old Story, New Slant?
Current database management system technology is not well equipped to provide adequate support for what has been deemed the 3rd wave of computing -- Ubiquitous Computing. Such app...
Julie A. McCann