Sciweavers

2111 search results - page 23 / 423
» How to Program Pervasive Systems
Sort
View
PERVASIVE
2004
Springer
15 years 5 months ago
Issues with RFID Usage in Ubiquitous Computing Applications
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation technology in the ubiquitous computing domain. In this paper we present various s...
Christian Floerkemeier, Matthias Lampe
83
Voted
FAST
2003
15 years 1 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
UM
2009
Springer
15 years 7 months ago
How Users Perceive and Appraise Personalized Recommendations
Abstract. Traditional websites have long relied on users revealing their preferences explicitly through direct manipulation interfaces. However recent recommender systems have gone...
Nicolas Jones, Pearl Pu, Li Chen
PERVASIVE
2007
Springer
15 years 6 months ago
Ambient Information Systems: Evaluation in Two Paradigms
We take two paradigms for information systems development, functionalism and social relativism, and apply their assumptions to the evaluation of ambient information systems. Ambie...
Zachary Pousman, John T. Stasko
192
Voted

Book
537views
16 years 10 months ago
How to Think Like a Computer Scientist: Java Version
""The goal of this book is to teach you to think like a computer scientist. I like the way computer scientists think because they combine some of the best features of Mat...
Allen B. Downey