Sciweavers

3937 search results - page 14 / 788
» Questioning Ubiquitous Computing
Sort
View
ACMDIS
2006
ACM
14 years 1 months ago
Supporting ethnographic studies of ubiquitous computing in the wild
Ethnography has become a staple feature of IT research over the last twenty years, shaping our understanding of the social character of computing systems and informing their desig...
Andy Crabtree, Steve Benford, Chris Greenhalgh, Pa...
FGCS
2008
159views more  FGCS 2008»
13 years 7 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
ICWMC
2006
IEEE
14 years 1 months ago
Power Characterization of a Bluetooth-based Wireless Node for Ubiquitous Computing
Abstract— Ubiquitous computing refers to making many computing devices available throughout the physical environment, while making them effectively invisible to the user. To furt...
Juan-Carlos Cano, José-Manuel Cano, Eva Gon...
ACMDIS
2004
ACM
14 years 1 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
PUC
2007
113views more  PUC 2007»
13 years 7 months ago
Yesterday's tomorrows: notes on ubiquitous computing's dominant vision
Ubiquitous computing is unusual amongst technological research arenas. Most areas of computer science research, such as programming language implementation, distributed operating s...
Genevieve Bell, Paul Dourish