Sciweavers

160 search results - page 8 / 32
» Ubiquitous Electronic Tagging
Sort
View
CSREAPSC
2006
13 years 8 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
CHI
2001
ACM
14 years 7 months ago
Listen reader: an electronically augmented paper-based book
While predictions abound that electronic books will supplant traditional paper-based books, many people bemoan the coming loss of the book as cultural artifact. In this project we...
Maribeth Back, Jonathan Cohen, Rich Gold, Steve R....
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 1 months ago
Personal Network Routing Protocol (PNRP) for Personal Ubiquitous Environments
— The proliferation of heterogeneous devices, ranging from mobile communication to home electronics and their internetworking have resulted into the development of a "person...
Usman Javaid, Djamal-Eddine Meddour, Tinku Mohamed...
ICDCS
2002
IEEE
14 years 9 days ago
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns are taken into account early in the design proces...
Jalal Al-Muhtadi, Roy H. Campbell, Apu Kapadia, M....
CAISE
2004
Springer
14 years 23 days ago
Process Mining for Ubiquitous Mobile Systems: An Overview and a Concrete Algorithm
Abstract. Ubiquitous Mobile Systems (UMSs) allow for automated capturing of events. Both mobility and ubiquity are supported by electronic means such as mobile phones and PDAs and ...
Ana Karla A. de Medeiros, Boudewijn F. van Dongen,...