Sciweavers

SFM
2011
Springer
253views Formal Methods» more  SFM 2011»
12 years 9 months ago
Application-Layer Connector Synthesis
The heterogeneity characterizing the systems populating the Ubiquitous Computing environment prevents their seamless interoperability. Heterogeneous protocols may be willing to coo...
Paola Inverardi, Romina Spalazzese, Massimo Tivoli
HCI
2011
12 years 10 months ago
A Low-Cost Natural User Interaction Based on a Camera Hand-Gestures Recognizer
The search for new simplified interaction techniques is mainly motivated by the improvements of the communication with interactive devices. In this paper, we present an interactiv...
Mohamed-Ikbel Boulabiar, Thomas Burger, Franck Poi...
CORR
2011
Springer
212views Education» more  CORR 2011»
13 years 1 months ago
Analytical Study of Object Components for Distributed and Ubiquitous Computing Environment
: - The Distributed object computing is a paradigm that allows objects to be distributed across a heterogeneous network, and allows each of the components to interoperate as a unif...
Usha Batra, Deepak Dahiya, Sachin Bhardwaj
PERCOM
2010
ACM
13 years 4 months ago
A visual, open-ended approach to prototyping ubiquitous computing applications
By nature, ubiquitous computing applications are intimately intertwined with users' everyday life. This situation is challenging because it requires to make the development of...
Zoé Drey, Charles Consel
IEEEMM
2006
97views more  IEEEMM 2006»
13 years 6 months ago
Ubiquitous Experience Media
A ubiquitous computing environment will become a solid social infrastructure for recording human experiences in the real world and facilitating human activities. The captured acti...
Kenji Mase, Yasuyuki Sumi, Tomoji Toriyama, Megumu...
ACSW
2003
13 years 8 months ago
Development of the software infrastructure for a ubiquitous computing environment - the DSTO iRoom
This paper describes the development of a ubiquitous computing environment called the iRoom. Built from a foundation of the MIT Metaglue multi-agent software, a base level of func...
Jason B. Scholz, Mark W. Grigg, Paul Prekop, Mark ...
CSREASAM
2006
13 years 8 months ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai
ISUVR
2007
13 years 8 months ago
Virtual Reality in Ubiquitous Computing Environment
—In this paper, we propose a novel concept of Ubiquitous Virtual Reality (U-VR) and examine technical challenges to be required for realizing it. It is difficult to realize Virtu...
Youngjung Suh, Kiyoung Kim, JoungHyun Han, Woontac...
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 8 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
CSREASAM
2007
13 years 8 months ago
Contextual Risk-Based Access Control
- Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are in...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...