This paper describes a novel approach to embedded software development. Instead of using a combination of C code and modeling tools, we propose an approach where modeling and progr...
Abstract: The application of Web 2.0 tools and methodologies in the domain of eGovernment is not yet a fully exploited area due to the immaturity of the software support, and the l...
Pervasive and ubiquitous computing has the potential to make huge changes in the ways that we will learn throughout our lives. This paper presents a vision for the lifelong user mo...
In ubiquitous computing, invisible devices and software are connected to one another to provide convenient services to users [1][2]. Users hope to obtain a personalized service wh...
This paper explores a topological perspective of planning in the presence of uncertainty, focusing on tasks specified by goal states in discrete spaces. The paper introduces stra...
This paper considers grasps and fixtures whose contacts react according to force-displacement laws consistent with friction constrains at the contacts. The passive force closure s...
In this paper, we give a sufficient condition for a graph to have a degree bounded spanning tree. Let n ≥ 1, k ≥ 3, c ≥ 0 and G be an n-connected graph. Suppose that for eve...
In this paper, I discuss ambiguous loss, why it is so traumatizing, what to do to lower the distress when someone disappears without a trace, and why a tribute is more appropriate...
A multiple display environment (MDE) networks personal and shared devices to form a virtual workspace, and designers are just beginning to grapple with the challenges of developing...
Brian P. Bailey, Jacob T. Biehl, Damon J. Cook, He...
This paper presents an overview of a study of 24 people who used an augmented reality game called TimeWarp. The paper initially discusses the game and evaluation methods chosen, i...