Sciweavers

6861 search results - page 17 / 1373
» Security for Ubiquitous Computing
Sort
View
ICCSA
2004
Springer
14 years 26 days ago
Task Modeling in Computer Supported Collaborative Learning Environments to Adapt to Mobile Computing
Using the new wireless technologies, mobile devices with small displays (handhelds, PDAs, mobile phones) are present in many environments. We are interested in the effective use of...
Ana I. Molina, Miguel A. Redondo, Manuel Ortega
ISI
2006
Springer
13 years 7 months ago
A Trust Model for Uncertain Interactions in Ubiquitous Environments
Hung Le Xuan, Hassan Jameel, Seong Jin Cho, Weiwei...
SUTC
2006
IEEE
14 years 1 months ago
Securing Distributed Wireless Sensor Networks: Issues and Guidelines
With the emergence of ubiquitous computing the role of sensor network is becoming more important which demands highest level security and energy efficiency. In this paper we have ...
Riaz Ahmed Shaikh, Sungyoung Lee, Young Jae Song, ...
CHI
2003
ACM
14 years 7 months ago
Are designers ready for ubiquitous computing?: a formative study
Ubiquitous computing is increasingly becoming reality, even for people outside of research. A group that will have to face the challenges of this new technology is product and ind...
Sara Ljungblad, Tobias Skog, Lalya Gaye
WMTE
2006
IEEE
14 years 1 months ago
Invisibility Considered Harmful: Revisiting Traditional Principles of Ubiquitous Computing in the Context of Education
Ubiquitous computing, as a subfield of computer science, has traditionally been associated with a set of principles expressed (loosely but tellingly) with terms like transparency,...
Michael Eisenberg, Ann Eisenberg, Leah Buechley, N...