Mobile phones are a widely-available class of device with supporting communications infrastructure which can be appropriated and exploited to support ubicomp experiences. However m...
Chris Greenhalgh, Steve Benford, Adam Drozd, Marti...
Abstract. Many existing localization systems generate location predictions, but fail to report how accurate the predictions are. This paper explores the effect of revealing the er...
David Dearman, Alex Varshavsky, Eyal de Lara, Khai...
Abstract. While the user-centered design methods we bring from humancomputer interaction to ubicomp help sketch ideas and refine prototypes, few tools or techniques help explore di...
Scott Davidoff, Min Kyung Lee, Anind K. Dey, John ...
Despite a growing desire to create smart homes, we know little about how networked technologies interact with a house’s infrastructure. In this paper, we begin to close this gap ...
Marshini Chetty, Ja-Young Sung, Rebecca E. Grinter
Weight training, in addition to aerobic exercises, is an important component of a balanced exercise program. However, mechanisms for tracking free weight exercises have not yet bee...
Domestic technologies have been a popular area of study for ubiquitous computing researchers, however there is relatively little recent data on how families currently use and share...
Abstract. Battery lifetime has become one of the top usability concerns of mobile systems. While many endeavors have been devoted to improving battery lifetime, they have fallen sh...
Nilanjan Banerjee, Ahmad Rahmati, Mark D. Corner, ...
Abstract. The popularity of handheld devices has created a flurry of research activity into new protocols and applications that can handle and exploit the defining characteristic...
Andrew G. Miklas, Kiran K. Gollu, Kelvin K. W. Cha...
We study activity recognition using 104 hours of annotated data collected from a person living in an instrumented home. The home contained over 900 sensor inputs, including wired r...
Beth Logan, Jennifer Healey, Matthai Philipose, Em...
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...