Sciweavers

93 search results - page 5 / 19
» Ubiquitous Memory Introspection
Sort
View
CHI
2004
ACM
14 years 7 months ago
Catalyzing social interaction with ubiquitous computing: a needs assessment of elders coping with cognitive decline
This paper describes design directions for ubiquitous computing to facilitate social interaction. The study focuses on elders coping with cognitive decline and their caregivers, b...
Margaret E. Morris, Jay Lundell, Eric Dishman
CHI
2005
ACM
14 years 7 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
ICDCSW
2002
IEEE
13 years 11 months ago
An Architecture Concept for Ubiquitous Computing Aware Wearable Computers
In Marc Weiser’s vision of ubiquitous computing, users are located in an environment with potentially thousands of computers around them. Many capabilities of these smart device...
Martin Bauer, Bernd Brügge, Gudrun Klinker, A...
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 8 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
EUC
2005
Springer
14 years 8 days ago
Ubiquitous Learning on Pocket SCORM
With advanced technologies, computer devices have become smaller and powerful. As a result, many people enjoy ubiquitous learning using mobile devices such as Pocket PCs. Pocket PC...
Hsuan-Pu Chang, Wen-Chih Chang, Yun-Long Sie, Nige...