Sciweavers

235 search results - page 14 / 47
» What is Ubiquitous about Ubiquitous Computing
Sort
View
EUC
2008
Springer
13 years 11 months ago
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation
The first challenge that we tackle in this paper is how to conduct access control in ubiquitous environments where sites have to handle access requests from their own users as wel...
Omar Hasan, Jean-Marc Pierson, Lionel Brunie
CHI
2009
ACM
14 years 9 months ago
Reflections of everyday activities in spending data
In this paper we show that financial information can be used to sense many aspects of human activity. This simple technique gives people information about their daily lives, is ea...
Julia Schwarz, Jennifer Mankoff, H. Scott Matthews
MDM
2004
Springer
14 years 2 months ago
Enabling Context-Aware and Privacy-Conscious User Data Sharing
This paper provides detail on two key components of the Houdini framework under development at Bell Labs, that enable context-aware and privacy-conscious user data sharing appropr...
Richard Hull, Bharat Kumar, Daniel F. Lieuwen, Pet...
ICWE
2003
Springer
14 years 2 months ago
Semi-automatic Assessment Process in a Ubiquitous Environment for Language Learning
This work presents a research on the methods and mechanisms necessary to bring the Information and Communication Technologies in the traditional classroom. This will be achieved by...
Maximiliano Paredes, Manuel Ortega, Pedro P. S&aac...
JUCS
2006
135views more  JUCS 2006»
13 years 9 months ago
Visualization Services in a Conference Context: An Approach by RFID Technology
: Ambient Intelligent (AmI) vision is a new concept materialized by the Six Framework Program of the European Community. It involves three key technologies: Ubiquitous Computing, U...
José Bravo, Ramón Hervás, Ino...