Sciweavers

2669 search results - page 32 / 534
» Providing Contextual Information to Pervasive Computing Appl...
Sort
View
NORDICHI
2006
ACM
14 years 1 months ago
Modified contextual design as a field evaluation method
Downstream utility is a critical success factor for usability evaluation methods, in terms of the extent to which they can deliver value. In this paper we argue that field methods...
Sharon McDonald, Kelly Monahan, Gilbert Cockton
MDM
2004
Springer
147views Communications» more  MDM 2004»
14 years 27 days ago
Mobile Agents: Can They Assist with Context Awareness?
This position paper argues that the mobile agents paradigm is a useful and important technology enabling pervasive and ubiquitous computing. Context awareness drives adaptability ...
Arkady B. Zaslavsky
ICIP
2002
IEEE
14 years 9 months ago
Objective evaluation of segmentation quality using spatio-temporal context
In this paper, we propose an automatic method for the objective evaluation of segmentation results. The method is based on computing the deviation of the segmentation results from...
Andrea Cavallaro, Elisa Drelie Gelasca, Touradj Eb...
CCS
2007
ACM
14 years 1 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
ICMB
2006
IEEE
138views Business» more  ICMB 2006»
14 years 1 months ago
me-Commerce: An Infrastructure for Personal Predictive Mobile Commerce
Given mobile phone penetration statistics and current mobile phone technical specifications, it is apparent that in developed countries, the majority of citizens carry not just mo...
Andreas Komninos, Peter Barrie, Julian Newman, Stu...