With the continuous availability of wearable computers, users have the opportunity to create and acquire large numbers of files. The ability to store and retrieve documents effect...
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Symbol Technologies has completed a unique accomplishment; it has created a commercially successful Wearable Computer. The success of this product is directly due to a structured ...
Robert Stein, Stephen Ferrero, Margaret Hetfield, ...
We present Saltate!, a wireless prototype system to support beginners of ballroom dancing. Saltate! acquires data from force sensors mounted under the dancers' feet, detects ...
—The key feature of many emerging pervasive computing applications is to proactively provide services to mobile individuals. One major challenge in providing users with proactive...