Sciweavers

391 search results - page 6 / 79
» Protecting Users' Anonymity in Pervasive Computing Environme...
Sort
View
ACHI
2008
IEEE
14 years 1 months ago
User-Centred Development of Mobile Interfaces to a Pervasive Computing Environment
—A challenging issue for HCI is the development of usable mobile interfaces for interactions with a complex pervasive environment. We consider a need for interfaces which automat...
Karin Leichtenstern, Elisabeth André
PERVASIVE
2005
Springer
14 years 29 days ago
Introducing Personal Operating Spaces for Ubiquitous Computing Environments
Pervasive computing environments will combine everyday physical spaces with network aware devices and services; hence providing computing behaviour that is much more entwined with...
Anuroop Shahi, Victor Callaghan, Michael Gardner
PERCOM
2005
ACM
14 years 7 months ago
Anonymous Content Sharing in Ad Hoc Networks
It may be costly for mobile pervasive computing device users to download content from the Internet using their 3G connections if the 3G connection cost is a function of the amount...
Seung-Seok Kang, Matt W. Mutka, Li Xiao
CSREAPSC
2006
13 years 8 months ago
An Access Control Framework for Pervasive Computing Environments
Abstract. The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven ...
Sarah Javanmardi, Hadi Hemmati, Rasool Jalili
PERCOM
2004
ACM
14 years 7 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles