Sciweavers

6861 search results - page 65 / 1373
» Security for Ubiquitous Computing
Sort
View
INTERACT
2007
13 years 11 months ago
Multimodal Interaction in a Ubiquitous Environment
Result of my literature review shows the important characteristics of three distinct modalities and the factors influencing interaction in a ubiquitous computing context. Research ...
Mayuree Srikulwong
ICCSA
2009
Springer
14 years 5 months ago
Towards Location-Based Real-Time Monitoring Systems in u-LBS
Recently, ubiquitous location-based services (u-LBS) has been utilized in a variety of practical and mission-critical applications such as security services, personalization servic...
MoonBae Song, Hyunseung Choo
APNOMS
2007
Springer
14 years 4 months ago
The Primary Path Selection Algorithm for Ubiquitous Multi-homing Environments
The multi-homing technology can provide an extended coverage area via distinct access technologies. Also, it is able to redirect a flow from one interface to another without reinit...
Dae Sun Kim, Choong Seon Hong
DAGSTUHL
2001
13 years 11 months ago
Challenges in Ubiquitous Data Management
Ubiquitous computing is a compelling vision for the future that is moving closer to realization at an accelerating pace. The combination of global wireless and wired connectivity a...
Michael J. Franklin
IWANN
2009
Springer
14 years 2 months ago
Easing the Smart Home: Translating Human Hierarchies to Intelligent Environments
Abstract. Ubiquitous computing research have extended traditional environments in the so–called Intelligent Environments. All of them use their capabilities for pursuing their in...
Manuel García-Herranz, Pablo A. Haya, Xavie...