This paper addresses two problems: “What are the appropriate methods for evaluating information systems?” and “How do we measure the impact of ambient information systems?...
Xiaobin Shen, Peter Eades, Seok-Hee Hong, Andrew V...
The Verisoft project aims at the pervasive formal verification of entire computer systems. In particular, the seamless verification of the academic system is attempted. This syst...
Mauro Gargano, Mark A. Hillebrand, Dirk Leinenbach...
Abstract. With rapid advancements in wireless devices, ubiquitous computing seems becoming a reality everyday. Active pervasive network infrastructure has been introduced to offer...
Though the common conception of human-computer interfaces is one of screens and keyboards, the emergence of ubiquitous computing envisions interfaces that will spread from the desk...
Tara Matthews, Hans-Werner Gellersen, Kristof Van ...
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...