[BOOK][B] Ubiquitous computing: smart devices, environments and interactions
S Poslad - 2011 - books.google.com
This book provides an introduction to the complex field of ubiquitous computing Ubiquitous
Computing (also commonly referred to as Pervasive Computing) describes the ways in …
Computing (also commonly referred to as Pervasive Computing) describes the ways in …
Activebelt: Belt-type wearable tactile display for directional navigation
K Tsukada, M Yasumura - international conference on ubiquitous …, 2004 - Springer
In this paper we propose a novel wearable interface called “ActiveBelt” that enables users to
obtain multiple directional information with the tactile sense. Since the information provided …
obtain multiple directional information with the tactile sense. Since the information provided …
[BOOK][B] Ubiquitous computing-computing in context
A Schmidt - 2003 - search.proquest.com
Computers have advanced beyond the desktop into many parts of everyday life. Ubiquitous
Computing is inevitably computing in context: it takes place in situations in the real world. So …
Computing is inevitably computing in context: it takes place in situations in the real world. So …
Social, economic, and ethical implications of ambient intelligence and ubiquitous computing
Visions of ambient intelligence and ubiquitous computing involve integrating tiny
microelectronic processors and sensors into everyday objects in order to make them “smart.” …
microelectronic processors and sensors into everyday objects in order to make them “smart.” …
Modeling and processing information for context-aware computing: A survey
Context-awareness is emerging as a central issue in ubiquitous computing research.
Context-aware computing refers to the idea that computing devices can sense and react to …
Context-aware computing refers to the idea that computing devices can sense and react to …
Security on FPGAs: State-of-the-art implementations and attacks
In the last decade, it has become apparent that embedded systems are integral parts of our
every day lives. The wireless nature of many embedded applications as well as their …
every day lives. The wireless nature of many embedded applications as well as their …
Prototy** usable privacy and security systems: Insights from experts
Iterative design, implementation, and evaluation of prototype systems is a common
approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); …
approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); …
Context-aware middleware for resource management in the wireless internet
The provisioning of Web services over the wireless Internet introduces novel challenging
issues for service design and implementation: from user/terminal mobility during service …
issues for service design and implementation: from user/terminal mobility during service …
Supporting stimulation needs in dementia care through wall-sized displays
Beside reminiscing, the increasing cognitive decline in dementia can also be addressed
through sensory stimulation allowing the immediate, nonverbal engagement with the world …
through sensory stimulation allowing the immediate, nonverbal engagement with the world …
[PDF][PDF] Develo** consumer-friendly pervasive retail systems
Pervasive computing offers many varied applications but will probably have its most
significant impact on day-by-day living.“The most profound technologies are those that …
significant impact on day-by-day living.“The most profound technologies are those that …