Sciweavers

6861 search results - page 32 / 1373
» Security for Ubiquitous Computing
Sort
View
COMPUTER
2004
162views more  COMPUTER 2004»
13 years 7 months ago
Context-Aware Trails
The growth of ubiquitous computing has given rise to a range of possibilities for context-based application development. Technologies for mobile computing and context-awareness can...
Siobhán Clarke, Cormac Driver
PERVASIVE
2006
Springer
13 years 7 months ago
The Smart Tachograph - Individual Accounting of Traffic Costs and Its Implications
Today, several costs caused by road traffic may either be only roughly approximated, or cannot be clearly assigned to the drivers causing them, or both. They are typically distribu...
Vlad Coroama
SAC
2004
ACM
14 years 1 months ago
A Ubiquitous Computing environment for aircraft maintenance
Ubiquitous Computing bears a high potential in the area of aircraft maintenance. Extensive requirements regarding quality, safety, and documentation as well as high costs for havi...
Matthias Lampe, Martin Strassner, Elgar Fleisch
CHI
2004
ACM
14 years 8 months ago
Catalyzing social interaction with ubiquitous computing: a needs assessment of elders coping with cognitive decline
This paper describes design directions for ubiquitous computing to facilitate social interaction. The study focuses on elders coping with cognitive decline and their caregivers, b...
Margaret E. Morris, Jay Lundell, Eric Dishman
CSE
2009
IEEE
13 years 11 months ago
Extended Dempster-Shafer Theory in Context Reasoning for Ubiquitous Computing Environments
—Context, the pieces of information that capture the characteristics of ubiquitous computing environment, is often imprecise and incomplete due to user mobility, unreliable wirel...
Daqiang Zhang, Jiannong Cao, Jingyu Zhou, Minyi Gu...