Sciweavers

6861 search results - page 36 / 1373
» Security for Ubiquitous Computing
Sort
View
ICMLC
2010
Springer
15 years 2 months ago
An ontology-supported ubiquitous interface agent for cloud computing - Example on Bluetooth wireless technique with Java program
: This paper focused on designing of a ubiquitous interface agent based on the ontology technology and interaction diagram with the backend information agent system, i.e., OntoIAS,...
Sheng-Yuan Yang, Chun-Liang Hsu, Dong-Liang Lee
133
Voted
CHI
2004
ACM
16 years 4 months ago
Acquiring in situ training data for context-aware ubiquitous computing applications
Ubiquitous, context-aware computer systems may ultimately enable computer applications that naturally and usefully respond to a user's everyday activity. Although new algorit...
Stephen S. Intille, Ling Bao, Emmanuel Munguia Tap...
101
Voted
GI
2007
Springer
15 years 7 months ago
Inherent Tradeoffs in Ubiquitous Computing Services
: Assisting everyday life is one major intent of ubiquitous computing (UbiComp). In addition, a given UbiComp infrastructure can be harnessed beyond assisting and helping people in...
Stefan G. Weber, Sebastian Ries, Andreas Heinemann
135
Voted
WIMOB
2008
IEEE
15 years 10 months ago
Improving User Satisfaction in a Ubiquitous Computing Application
—The Smart Party is a ubiquitous computing application based on the Panoply middleware. The Smart Party allows attendees at a party to transparently participate in the selection ...
Kevin Eustice, A. M. Jourabchi, J. Stoops, Peter L...
MOBISYS
2004
ACM
16 years 3 months ago
An Architecture for Privacy-Sensitive Ubiquitous Computing
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in d...
Jason I. Hong, James A. Landay