Sciweavers

6861 search results - page 194 / 1373
» Security for Ubiquitous Computing
Sort
View
119
Voted
CHI
2004
ACM
16 years 4 months ago
Dealing with mobile conversations in public places: some implications for the design of socially intrusive technologies
In this paper we describe the results of a study investigating the behaviour and views of bystanders in response to a proximal mobile telephone conversation by a third party. Anal...
Steve Love, Mark Perry
PDC
2006
ACM
15 years 10 months ago
UbiComp in opportunity spaces: challenges for participatory design
The rise of ubiquitous computing (UbiComp), where pervasive, wireless and disappearing technologies offer hitherto unavailable means of supporting activity, increasingly opens up ...
Eva Hornecker, John Halloran, Geraldine Fitzpatric...
PDCAT
2004
Springer
15 years 9 months ago
UbiqStor: A Remote Storage Service for Mobile Devices
In Ubiquitous computing environment the mobile devices such as PDAs necessarily connect to remote storage servers. We present an iSCSI caching system that localizes iSCSI target to...
MinHwan Ok, Daegeun Kim, Myong-Soon Park
ICDCSW
2003
IEEE
15 years 9 months ago
Entry Points into a Smart Campus Environment - Overview of the ETHOC System
The university campus is an interesting application environment for the ubiquitous computing paradigm: a large number of users share a substantial amount of their information need...
Michael Rohs, Jürgen Bohn
CHI
1999
ACM
15 years 8 months ago
TouchCounters: Designing Interactive Electronic Labels for Physical Containers
We present TouchCounters, an integrated system of electronic modules, physical storage containers, and shelving surfaces for the support of collaborative physical work. Through ph...
Paul Yarin, Hiroshi Ishii