Sciweavers

1036 search results - page 8 / 208
» Ubiquitous Verification of Ubiquitous Systems
Sort
View
ACMDIS
2004
ACM
14 years 27 days ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
MIDDLEWARE
2004
Springer
14 years 25 days ago
Adaptive resource discovery for ubiquitous computing
The terms pervasive and ubiquitous computing are used to describe a smart space populated by hundreds of intelligent devices that are embedded in their surroundings. Characteristi...
Rae Harbird, Stephen Hailes, Cecilia Mascolo
ARCS
2005
Springer
14 years 1 months ago
A File System for System Programming in Ubiquitous Computing
In Ubiquitous computing small embedded sensor and computing nodes are the main enabling technologies. System programming for such small embedded systems is a challenging task invol...
Christian Decker, Michael Beigl, Albert Krohn
ENTCS
2008
110views more  ENTCS 2008»
13 years 7 months ago
Exploring an Option Space to Engineer a Ubiquitous Computing System
Engineering natural and appropriate interactive behaviour in ubiquitous computing systems presents new challenges to their developers. This paper explores formal models of interac...
Michael D. Harrison, Christian Kray, José C...
PERCOM
2007
ACM
14 years 7 months ago
Designing Ubiquitous Computing Systems for Sports Equipment
In this paper, we report on a user-centered, iterative design process for augmenting sports equipment with ubiquitous computing technology. In several design iterations, a fully w...
Matthias Kranz, Wolfgang Spiessl, Albrecht Schmidt