Sciweavers

2111 search results - page 110 / 423
» How to Program Pervasive Systems
Sort
View
92
Voted
CHI
2010
ACM
15 years 7 months ago
Let's go from the whiteboard: supporting transitions in work through whiteboard capture and reuse
The use of whiteboards is pervasive across a wide range of work domains. But some of the qualities that make them successful—an intuitive interface, physical working space, and ...
Stacy M. Branham, Gene Golovchinsky, Scott Carter,...
MIDDLEWARE
2009
Springer
15 years 7 months ago
PAQ: Persistent Adaptive Query Middleware for Dynamic Environments
Abstract. Pervasive computing applications often entail continuous monitoring tasks, issuing persistent queries that return continuously updated views of the operational environmen...
Vasanth Rajamani, Christine Julien, Jamie Payton, ...
111
Voted
ISCC
2006
IEEE
129views Communications» more  ISCC 2006»
15 years 6 months ago
A Semantic Overlay Network for P2P Schema-Based Data Integration
Abstract— Today data sources are pervasive and their number is growing tremendously. Current tools are not prepared to exploit this unprecedented amount of information and to cop...
Carmela Comito, Simon Patarin, Domenico Talia
NETGAMES
2006
ACM
15 years 6 months ago
A new approach on wearable game design and its evaluation
As technologies evolve and computer systems shrink to the size of matchboxes, also their field of application shifts in new directions. Our permanent companions, mobile phones, p...
Christian Bertelsmeyer, Erik Koch, Alexander H. Sc...
ESORICS
2004
Springer
15 years 6 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...