Sciweavers

1036 search results - page 30 / 208
» Ubiquitous Verification of Ubiquitous Systems
Sort
View
CSREAPSC
2006
13 years 9 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
JMM
2006
126views more  JMM 2006»
13 years 7 months ago
Content Adaptation Based Approach for Ubiquitous Multimedia
ents a prototype system, called UbiCon system. By abstracting media streams into generic CONTENT entities, the system provides a simple and powerful means for services to operate m...
Haipeng Wang, Zhiwen Yu, Xingshe Zhou, Tao Zhang, ...
HCI
2009
13 years 5 months ago
The Five Commandments of Activity-Aware Ubiquitous Computing Applications
Recent work demonstrates the potential for extracting patterns from users' behavior as detected by sensors. Since there is currently no generalized framework for reasoning abo...
Nasim Mahmud, Jo Vermeulen, Kris Luyten, Karin Con...
AINA
2007
IEEE
13 years 11 months ago
Domain Modelling for Ubiquitous Computing Applications
Many Ubiquitous computing applications can be considered as planning and acting problems in environments characterised by uncertainty and partial observability. Such systems rely ...
Anthony Harrington, Vinny Cahill
CHI
2011
ACM
12 years 11 months ago
Publics in practice: ubiquitous computing at a shelter for homeless mothers
Today, commodity technologies like mobile phones—once symbols of status and wealth—have become deeply woven into social and economic participation in Western society. Despite ...
Christopher A. Le Dantec, Robert G. Farrell, Jim C...