Sciweavers

9581 search results - page 229 / 1917
» On Ubiquitous Integrated Computing
Sort
View
SAGA
2007
Springer
15 years 11 months ago
Randomized Algorithms and Probabilistic Analysis in Wireless Networking
Abstract. Devices connected wirelessly, in various forms including computers, hand-held devices, ad hoc networks, and embedded systems, are expected to become ubiquitous all around...
Aravind Srinivasan
MOBIQUITOUS
2005
IEEE
15 years 11 months ago
WebProfiles: A Negotiation Model for User Awareness in Personal Area Networks
Automatic adaptation of the environment to user preferences results in personalized ambients that fulfill user interaction requirements in a more suitable way. However, the proble...
Juan Ignacio Vázquez, Diego López de...
WOWMOM
2005
ACM
95views Multimedia» more  WOWMOM 2005»
15 years 11 months ago
Incremental Trust: Building Trust from Past Experience
Emerging ubiquitous computing leverages the need for automated trust management models. We take a domestic network of both fixed and mobile nodes as our reference scenario and in...
Marco Domenico Aime, Antonio Lioy
PUC
2006
93views more  PUC 2006»
15 years 5 months ago
Comparing end-user and intelligent remote control interface generation
Traditional remote controls typically allow users to activate functionality of a single device. Given that users activate a subset of functionality across devices to accomplish a p...
Olufisayo Omojokun, Jeffrey S. Pierce, Charles Lee...
TIT
1998
139views more  TIT 1998»
15 years 5 months ago
Codes for Digital Recorders
—Constrained codes are a key component in the digital recording devices that have become ubiquitous in computer data storage and electronic entertainment applications. This paper...
Kees A. Schouhamer Immink, Paul H. Siegel, Jack K....