Sciweavers

6861 search results - page 57 / 1373
» Security for Ubiquitous Computing
Sort
View
HCI
2009
13 years 5 months ago
The Five Commandments of Activity-Aware Ubiquitous Computing Applications
Recent work demonstrates the potential for extracting patterns from users' behavior as detected by sensors. Since there is currently no generalized framework for reasoning abo...
Nasim Mahmud, Jo Vermeulen, Kris Luyten, Karin Con...
PERCOM
2006
ACM
14 years 7 months ago
Plan B: An Operating System for Ubiquitous Computing Environments
The conventional approach for building pervasive environments relies on middleware to integrate different systems. Instead, we have built a system that can deal with these environ...
Francisco J. Ballesteros, Enrique Soriano, Katia L...
WINET
2002
169views more  WINET 2002»
13 years 7 months ago
Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments
In the near future, we will see dramatic changes in computing and networking hardware. A large number of devices (e.g., phones, PDAs, even small household appliances) will become c...
Lalana Kagal, Vlad Korolev, Sasikanth Avancha, Anu...
HUC
2003
Springer
14 years 26 days ago
Evaluation of Visual Notification Cues for Ubiquitous Computing
With increased use of mobile information technology and increased amounts of information comes the need to simplify information presentation. This research considers whether low-in...
Peter Tarasewich, Christopher S. Campbell, Tian Xi...
STEP
2005
IEEE
14 years 1 months ago
Open Challenges in Ubiquitous and Net-Centric Computing Middleware
Thierry Bodhuin, Gerardo Canfora, Rosa Preziosi, M...