Pervasive computing environments will combine everyday physical spaces with network aware devices and services; hence providing computing behaviour that is much more entwined with...
Abstract. Embedded assessment leverages the capabilities of pervasive computing to advance early detection of health conditions. In this approach, technologies embedded in the home...
Margaret E. Morris, Stephen S. Intille, Jennifer B...
Audio location is a technique for performing accurate 3D location sensing using off-the-shelf audio hardware. The use of off-the-shelf hardware allows audio location deployment to ...
There is currently a lot of research going on in the field of mobile interaction with the real world. So far, the environment where the mobile phone is used is mainly perceived as...
Karin Leichtenstern, Alexander De Luca, Enrico Ruk...
Distributed sensor networks offer many new capabilities for contextually monitoring environments. By making such systems mobile, we increase the application-space for the distribut...
Location awareness is an important capability for mobile computing. Yet inexpensive, pervasive positioning—a requirement for wide-scale adoption of location-aware computing—has...
Anthony LaMarca, Yatin Chawathe, Sunny Consolvo, J...
The retail store environment is a challenging application area for Pervasive Computing technologies. It has demanding base conditions due to the number and complexity of the interd...
Albert Krohn, Tobias Zimmer, Michael Beigl, Christ...
In this paper, we describe the Tampere University of Technology’s involvement in the research of machine washable and wirelessly rechargeable wearable technology and using mobil...
Pekka Iso-Ketola, Tapio Karinsalo, Manu Myry, Lass...
This paper proposes and evaluates interaction techniques for camera-equipped mobile phones. The proposed techniques are based on a visual code system that provides a number of orie...
This paper explores the use of camera phones with pen input as a platform for generating digital annotations to realworld objects. We analyze the client-side requirements for a ge...