Sciweavers

6861 search results - page 15 / 1373
» Security for Ubiquitous Computing
Sort
View
ISTA
2004
13 years 9 months ago
Where Does Ubiquitous Computing Lead the Organization?
: The paper is concerned with the question of how the emergence of ubiquitous computing influences organizations in terms of changing business processes and social aspects of emplo...
Igor O. Marin
LCN
2007
IEEE
14 years 1 months ago
A Ubiquitous Computing Network Framework for Assisting People in Urban Areas
—This paper presents a framework to address the combination of ubiquitous computing interests as an Intelligent Assisting Location-Aware Service and development of its hardware a...
Minsoo Lee, Yoonsik Uhm, Zion Hwang, Yong Kim, Joo...
SAC
2006
ACM
13 years 7 months ago
Editorial message: special track on ubiquitous computing
Ubiquitous computing places humans in the center of environments saturated with computing and wireless communications capabilities, yet gracefully integrated, so that technology r...
Achilles Kameas, George Roussos
EUC
2005
Springer
14 years 1 months ago
Middleware Architecture for Context Knowledge Discovery in Ubiquitous Computing
Advanced analysis of data for extracting useful knowledge is the next natural step in the world of ubiquitous computing. So far, most of the ubiquitous systems process knowledge in...
Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee
CHI
2008
ACM
14 years 8 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...