Sciweavers

6861 search results - page 36 / 1373
» Security for Ubiquitous Computing
Sort
View
ICMLC
2010
Springer
13 years 6 months ago
An ontology-supported ubiquitous interface agent for cloud computing - Example on Bluetooth wireless technique with Java program
: This paper focused on designing of a ubiquitous interface agent based on the ontology technology and interaction diagram with the backend information agent system, i.e., OntoIAS,...
Sheng-Yuan Yang, Chun-Liang Hsu, Dong-Liang Lee
CHI
2004
ACM
14 years 8 months ago
Acquiring in situ training data for context-aware ubiquitous computing applications
Ubiquitous, context-aware computer systems may ultimately enable computer applications that naturally and usefully respond to a user's everyday activity. Although new algorit...
Stephen S. Intille, Ling Bao, Emmanuel Munguia Tap...
GI
2007
Springer
13 years 11 months ago
Inherent Tradeoffs in Ubiquitous Computing Services
: Assisting everyday life is one major intent of ubiquitous computing (UbiComp). In addition, a given UbiComp infrastructure can be harnessed beyond assisting and helping people in...
Stefan G. Weber, Sebastian Ries, Andreas Heinemann
WIMOB
2008
IEEE
14 years 1 months ago
Improving User Satisfaction in a Ubiquitous Computing Application
—The Smart Party is a ubiquitous computing application based on the Panoply middleware. The Smart Party allows attendees at a party to transparently participate in the selection ...
Kevin Eustice, A. M. Jourabchi, J. Stoops, Peter L...
MOBISYS
2004
ACM
14 years 7 months ago
An Architecture for Privacy-Sensitive Ubiquitous Computing
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in d...
Jason I. Hong, James A. Landay