Sciweavers

235 search results - page 33 / 47
» What is Ubiquitous about Ubiquitous Computing
Sort
View
CHI
2004
ACM
14 years 8 months ago
Privacy policies as decision-making tools: an evaluation of online privacy notices
Studies have repeatedly shown that users are increasingly concerned about their privacy when they go online. In response to both public interest and regulatory pressures, privacy ...
Carlos Jensen, Colin Potts
KI
2010
Springer
13 years 6 months ago
Positions, Regions, and Clusters: Strata of Granularity in Location Modelling
Location models are data structures or knowledge bases used in Ubiquitous Computing for representing and reasoning about spatial relationships between so-called smart objects, i.e....
Hedda Rahel Schmidtke, Michael Beigl
DBSEC
2000
112views Database» more  DBSEC 2000»
13 years 9 months ago
Coordinating Policy for Federated Applications
Abstract At the start of its present term of office in 1997 the UK government published a planning document promising ubiquitous access to Electronic Health Records (EHRs) held wit...
Ken Moody
CASCON
1996
109views Education» more  CASCON 1996»
13 years 9 months ago
A system for the seamless integration of personal messages using agents developed on a lotus notes platform
We introduce a seamless messaging system for the management of personal messages. The aim of it is to intercept, filter, interpret, and deliver multi-modal messages (voice, fax, a...
Ramiro Liscano, Roger Impey, Paul Gordon, Suhayya ...
CONCURRENCY
2010
104views more  CONCURRENCY 2010»
13 years 8 months ago
Performance analysis of an experimental wireless relay sensor network
Communication through relay channels in wireless sensor networks can create diversity and consequently improve robustness of data transmission for ubiquitous computing and network...
Gu-Chun Zhang, Xiao-Hong Peng, Xuan-Ye Gu