Sciweavers

391 search results - page 47 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
UDM
2005
IEEE
14 years 2 months ago
Challenges and Opportunities of Context-Aware Information Access
Ubiquitous computing environments embedding a wide range of pervasive computing technologies provide a challenging and exciting new domain for information access. Individuals work...
Gareth J. F. Jones
HCI
2009
13 years 6 months ago
Accessing e-Learning Systems via Screen Reader: An Example
The evolution of the Information and Communication Technology (ICT) and the rapid growth of the Internet have impelled the pervasive diffusion of e-Learning systems. This is a grea...
Maria Claudia Buzzi, Marina Buzzi, Barbara Leporin...
PERVASIVE
2006
Springer
13 years 8 months ago
iCAP: Interactive Prototyping of Context-Aware Applications
Although numerous context-aware applications have been developed and there have been technological advances for acquiring contextual information, it is still difficult to develop a...
Anind K. Dey, Timothy Sohn, Sara Streng, Justin Ko...
PERVASIVE
2009
Springer
14 years 3 months ago
RF-Based Initialisation for Inertial Pedestrian Tracking
Location information is an important source of context for ubiquitous computing systems. We have previously developed a wearable location system that combines a foot-mounted inerti...
Oliver Woodman, Robert Harle
ACMDIS
2004
ACM
14 years 2 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...