Sciweavers

3732 search results - page 3 / 747
» Ubiquitous Computing for the Public
Sort
View
EUC
2008
Springer
13 years 8 months ago
Human Universality in Ubiquitous Computing: Maslow, Where Are You?
Too narrow, the productivity-oriented vision guiding ubiquitous computing should be replaced or enriched with humanistic aspects. We discuss the role of Maslow's hierarchy of...
Sébastien Duval, Christian Hoareau, Hiromic...
ACMDIS
2004
ACM
13 years 11 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
CHI
2003
ACM
14 years 6 months ago
The toilet entertainment system
A toilet is not only a place where people answer calls of nature. It is also a place for contemplation and reflection ? and a place where people read information. But bringing thi...
Johan Thoresson, Pär Stenberg
CHI
2005
ACM
14 years 6 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 7 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim