Sciweavers

270 search results - page 24 / 54
» Pervasive maps: Explore and interact with pervasive environm...
Sort
View
PERCOM
2004
ACM
15 years 11 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva
DSVIS
2006
Springer
15 years 3 months ago
Rapid User-Centred Evaluation for Context-Aware Systems
This paper describes a platform for the user-centred design and evaluation of adaptive, context-aware services in the wireless, mobile and pervasive computing markets. It focuses o...
Eleanor O'Neill, David Lewis, Kris McGlinn, Simon ...
PERVASIVE
2011
Springer
14 years 2 months ago
Planning, Apps, and the High-End Smartphone: Exploring the Landscape of Modern Cross-Device Reaccess
The rapid growth of mobile devices has made it challenging for users to maintain a consistent digital history among all their personal devices. Even with a variety of cloud computi...
Elizabeth Bales, Timothy Sohn, Vidya Setlur
ACMACE
2009
ACM
15 years 6 months ago
Power explorer: a casual game style for encouraging long term behavior change among teenagers
When it comes to motivating teenagers towards energy awareness, new approaches need to be considered. One such is the use of pervasive games connected to the players own energy co...
Anton Gustafsson, Magnus Bång, Mattias Svahn
SELMAS
2004
Springer
15 years 5 months ago
Adaptive Access Control in Coordination-Based Mobile Agent Systems
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the...
Christine Julien, Jamie Payton, Gruia-Catalin Roma...