Sciweavers

3937 search results - page 166 / 788
» Questioning Ubiquitous Computing
Sort
View
121
Voted
CSCW
2008
ACM
15 years 5 months ago
Range: exploring implicit interaction through electronic whiteboard design
An important challenge in designing ubiquitous computing experiences is negotiating transitions between explicit and implicit interaction, such as how and when to provide users wi...
Wendy Ju, Brian A. Lee, Scott R. Klemmer
135
Voted
PUC
2002
107views more  PUC 2002»
15 years 3 months ago
Location Models from the Perspective of Context-Aware Applications and Mobile Ad Hoc Networks
Location models are crucial to location-aware applications. In this paper we present two approaches for modeling location information in an infrastructure-based and an ad hoc netwo...
Martin Bauer, Christian Becker, Kurt Rothermel
160
Voted
WMCSA
2003
IEEE
15 years 9 months ago
Proximity Mining: Finding Proximity using Sensor Data History
Emerging ubiquitous and pervasive computing applications often need to know where things are physically located. To meet this need, many locationsensing systems have been develope...
Toshihiro Takada, Satoshi Kurihara, Toshio Hirotsu...
174
Voted
FTDCS
2004
IEEE
15 years 7 months ago
An Architectural View of the Entities Required for Execution of Task in Pervasive Space
Aimed to provide computation ubiquitously, pervasive computing is perceived as a means to provide an user the transparency of anywhere, anyplace, anytime computing. Pervasive comp...
K. Kalapriya, S. K. Nandy, V. Satish, R. Uma Mahes...
135
Voted
AINA
2007
IEEE
15 years 10 months ago
Towards Quantifying the (In)Security of Networked Systems
Traditional security analyses are often geared towards cryptographic primitives or protocols. Although such analyses are absolutely necessary, they do not provide much insight for...
Xiaohu Li, T. Paul Parker, Shouhuai Xu