The military environment is changing, e.g., the operating environment is becoming more varied and demanding. Due to these challenges, new user interfaces (UIs) are required providi...
Sometimes it is desirable to access password-protected resources, but undesirable to disclose the password to the machine in use. In such situations, providing the password is a t...
Users in ubiquitous and pervasive computing environments will be much more empowered in ways to access and to control their navigation. Handover, the vital event in which a user c...
Edson dos Santos Moreira, David N. Cottingham, Jon...
The home environment becomes ready to host distributed devices dynamically adapting to service availability and reacting to user location and user activity. Sensors, high definiti...
Abstract. The research project CASCOM (Context-aware Business Application Service Co-ordination in Mobile Computing Environments) will implement, validate, and trial value-added su...