We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
Mobility is more and more mediated, supported and transformed by technological artefacts and infrastructures. Especially technologies labelled as mobile, pervasive, ubiquitous or ...
Many believe that ubiquitous computing will succeed when it has faded into the background of everyday life and work—that is, when it has become mundane. This paper examines the ...
Mark W. Newman, Nicolas Ducheneaut, W. Keith Edwar...
—Social Networks will unfold their full potential when connected people are enabled to collaborate - any time, appropriate to the current location, activity and computing environ...
Daniel Schuster, Thomas Springer, Alexander Schill
The advent of Cloud computing platforms, and the growing pervasiveness of Multicore processor architectures have revealed the inadequateness of traditional programming models base...