Sciweavers

6861 search results - page 102 / 1373
» Security for Ubiquitous Computing
Sort
View
CHI
2004
ACM
14 years 11 months ago
Lessons learned using ubiquitous sensors for data collection in real homes
Interface design for the home requires a realistic understanding of the complexity and richness of the human activities that go on there; it is our goal to develop tools that enab...
Jennifer Beaudin, Stephen S. Intille, Emmanuel Mun...
AINA
2008
IEEE
14 years 5 months ago
Intra Domain Route Optimization for Ubiquitous
The main advantage of a wireless network is user mobility, which calls for efficient routing support at the network layer. An architecture combines hierarchical mobile IPv6 and ne...
Hye-Young Kim, Young-Sik Jeong, Laurence Tianruo Y...
MOBIQUITOUS
2007
IEEE
14 years 5 months ago
A Ubiquitous Context-Aware Environment for Surgical Training
— The age of technology has changed the way that surgeons are being trained. Traditional methodologies for training can include lecturing, shadowing, apprenticing, and developing...
Patricia Ordonez, Palanivel Balaji Kodeswaran, Vla...
UCS
2007
Springer
14 years 4 months ago
Compact Data Format for Advertising and Discovery in Ubiquitous Networks
In this paper, we describe a packet data size minimization method designed specifically for advertising and discovery in ubiquitous networks. The minimization is effective for achi...
Pavel Poupyrev, Yoshihiro Kawahara, Peter Davis, H...