In this paper we discuss some issues arising from our implementation and evaluation of two systems that enable mobile phone users to identify common address book contacts. These s...
Abstract. In this paper we identify the common techniques and technologies that are enabling location identification in a ubiquitous computing environment. We also address the imp...
Kavitha Muthukrishnan, Maria Eva Lijding, Paul J. ...
Core to ubiquitous computing environments are adaptive software systems that adapt their behavior to the context in which the user is attempting the task the system aims to suppor...
Eleanor O'Neill, Martin Klepal, David Lewis, Tony ...
In response to the advance of ubiquitous computing technologies, we believe that for computer systems to be ubiquitous, they must be context-aware. In this paper, we address the i...
Arthur H. van Bunningen, Ling Feng, Peter M. G. Ap...
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of ...