The heterogeneity characterizing the systems populating the Ubiquitous Computing environment prevents their seamless interoperability. Heterogeneous protocols may be willing to coo...
The search for new simplified interaction techniques is mainly motivated by the improvements of the communication with interactive devices. In this paper, we present an interactiv...
Mohamed-Ikbel Boulabiar, Thomas Burger, Franck Poi...
: - The Distributed object computing is a paradigm that allows objects to be distributed across a heterogeneous network, and allows each of the components to interoperate as a unif...
By nature, ubiquitous computing applications are intimately intertwined with users' everyday life. This situation is challenging because it requires to make the development of...
A ubiquitous computing environment will become a solid social infrastructure for recording human experiences in the real world and facilitating human activities. The captured acti...
This paper describes the development of a ubiquitous computing environment called the iRoom. Built from a foundation of the MIT Metaglue multi-agent software, a base level of func...
Jason B. Scholz, Mark W. Grigg, Paul Prekop, Mark ...
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
—In this paper, we propose a novel concept of Ubiquitous Virtual Reality (U-VR) and examine technical challenges to be required for realizing it. It is difficult to realize Virtu...
Youngjung Suh, Kiyoung Kim, JoungHyun Han, Woontac...
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
- Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are in...