Sciweavers

6861 search results - page 39 / 1373
» Security for Ubiquitous Computing
Sort
View
HICSS
2002
IEEE
80views Biometrics» more  HICSS 2002»
14 years 17 days ago
Ubiquitous Computing: Omnipresent Technology in Support of Network Centric Warfare
The U.S. military is in the midst of a transformation. While business leaders moved quickly to put computing power in the hands of individuals, the military establishment has been...
Mark Adkins, John Kruse, Robert Younger
GI
2007
Springer
14 years 1 months ago
Potentials and Requirements of Mobile Ubiquitous Computing for Public Transport
: Public transport plays an important role in our society which is characterized by mobility, individuality, comfort and ecological constraints. It is common opinion that public tr...
Holger Mügge, Karl-Heinz Lüke, Matthias ...
CHI
2007
ACM
14 years 8 months ago
Enhancing ubiquitous computing with user interpretation: field testing the home health horoscope
Domestic ubiquitous computing systems often rely on inferences about activities in the home, but the open-ended, dynamic and heterogeneous nature of the home poses serious problem...
William W. Gaver, Phoebe Sengers, Tobie Kerridge, ...
CHI
2005
ACM
14 years 8 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
MOBIQUITOUS
2007
IEEE
14 years 1 months ago
Towards Scalable and Robust Service Discovery in Ubiquitous Computing Environments via Multi-hop Clustering
Abstract— Large-scale ubiquitous computing environments require scalable and robust service discovery to enable “anytime, anywhere” computing, which is hard to be satisfied ...
Wei Gao