Much of the ongoing research in ubiquitous computing has concentrated on providing context information, e.g. location information, to the level of services and applications. Typic...
End-user programming has become ubiquitous, so much so that there are more end-user programmers today than there are professional programmers. End-user programming empowers—but t...
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
The technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes o...
The iBand is a wearable bracelet-like device that exchanges information about its users and their relationships. This exchange happens during the common gesture of the handshake, ...
Marije Kanis, Niall Winters, Stefan Agamanolis, An...