Sciweavers

6662 search results - page 70 / 1333
» Mobile and Ubiquitous Computing
Sort
View
143
Voted
FGCS
2008
159views more  FGCS 2008»
15 years 3 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
121
Voted
ICWMC
2006
IEEE
15 years 9 months ago
Power Characterization of a Bluetooth-based Wireless Node for Ubiquitous Computing
Abstract— Ubiquitous computing refers to making many computing devices available throughout the physical environment, while making them effectively invisible to the user. To furt...
Juan-Carlos Cano, José-Manuel Cano, Eva Gon...
116
Voted
ACMDIS
2004
ACM
15 years 9 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
125
Voted
PUC
2007
113views more  PUC 2007»
15 years 3 months ago
Yesterday's tomorrows: notes on ubiquitous computing's dominant vision
Ubiquitous computing is unusual amongst technological research arenas. Most areas of computer science research, such as programming language implementation, distributed operating s...
Genevieve Bell, Paul Dourish
130
Voted
ISCI
2008
139views more  ISCI 2008»
15 years 3 months ago
Easishop: Ambient intelligence assists everyday shopping
E-commerce has been one of the success stories of the last decade. Developments in wireless communications and mobile computing have heralded an era of mobile commerce (m-commerce...
Stephen Keegan, Gregory M. P. O'Hare, Michael J. O...