Most authentication protocols designed for ubiquitous computing environments try to solve the problem of intuitive, scalable, secure authentication of wireless communication. Due ...
abstractions, concepts, and actions that characterize human experiences. This will herald computing for human experience (CHE). The CHE vision is built on a suite of technologies t...
In this paper, we seek to contribute to the Ubiquitous Computing agenda by focusing on one of its earliest, but most difficult, design ambitions ? making technology "invisibl...
Peter Tolmie, James Pycock, Tim Diggins, Allan Mac...
—The Smart Party is a ubiquitous computing application based on the Panoply middleware. The Smart Party allows attendees at a party to transparently participate in the selection ...
Kevin Eustice, A. M. Jourabchi, J. Stoops, Peter L...
There are new challenges to us, as researchers, on how to design and evaluate new mobile applications because they give users access to powerful computing devices through small in...