Sciweavers

1036 search results - page 138 / 208
» Ubiquitous Verification of Ubiquitous Systems
Sort
View
SUTC
2006
IEEE
14 years 1 months ago
TARANTULAS: Mobility-enhanced Wireless Sensor-Actuator Networks
Amidst the numerous active research efforts in wireless sensor networks which aim to push beyond the limits, we aim to significantly enhance the effectiveness of wireless sensors ...
Winston Khoon Guan Seah, Kevin Z. Liu, Marcelo H. ...
PERVASIVE
2005
Springer
14 years 1 months ago
Embedded Assessment: Overcoming Barriers to Early Detection with Pervasive Computing
Abstract. Embedded assessment leverages the capabilities of pervasive computing to advance early detection of health conditions. In this approach, technologies embedded in the home...
Margaret E. Morris, Stephen S. Intille, Jennifer B...
MOBICOM
2004
ACM
14 years 1 months ago
Towards service and user discovery on wireless networks
This work presents a user position management system for Wi-Fi networks. The location system is based on access point coverage range and beacon devices. The implementation was mad...
Andrei Oliveira da Silva, Paulo Henrique de Souza ...
NORDICHI
2004
ACM
14 years 1 months ago
Six modes of proactive resource management: a user-centric typology for proactive behaviors
Proactivity has recently arisen as one of the focus areas within HCI. Proactive systems adhere to two premises: 1) working on behalf of, or pro, the user, and 2) acting on their o...
Antti Salovaara, Antti Oulasvirta
SACMAT
2004
ACM
14 years 1 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste