• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 903
Next 10 →

The Invisible Computer

by Cscw North, Andrew Monk, Brian Shackel, Book Review, Lon Barfield, Alan Dix, Dave Clarke, Susan Turner
"... Published by the British HCI Group • ISSN 1351-119X 1 ..."
Abstract - Add to MetaCart
Published by the British HCI Group • ISSN 1351-119X 1

Interfacing with the Invisible Computer

by Kasim Rehman , Frank Stajano, et al. , 2002
"... The Ubicomp scenario of wirelessly networked processors embedded in everyday objects has been dubbed "the invisible computer". Users no longer interact with a computer but with familiar objects whose functionality is transparently enhanced by computing features. Using the results of an ext ..."
Abstract - Cited by 14 (4 self) - Add to MetaCart
The Ubicomp scenario of wirelessly networked processors embedded in everyday objects has been dubbed "the invisible computer". Users no longer interact with a computer but with familiar objects whose functionality is transparently enhanced by computing features. Using the results

Secure Invisible Computing

by Yong Xiong, Johannes Hel, Ro Forin, Gideon Yuval, Yong Xiong, Johannes Hel, Ro Forin, Gideon Yuval , 2003
"... Invisible computing creates better everyday devices by augmenting them with computation and communication. The native interface of a particular device suffices, with computation and communication occurring transparently to the user. An invisible computing device does not require setup or maintenance ..."
Abstract - Add to MetaCart
Invisible computing creates better everyday devices by augmenting them with computation and communication. The native interface of a particular device suffices, with computation and communication occurring transparently to the user. An invisible computing device does not require setup

Component Based Invisible Computing

by Alessandro Forin, Ro Forin, Johannes Helander, Paul Pham, Jagadeeswaran Rajendiran , 2001
"... MMLite is a modular system architecture that is suitable for a wide variety of hardware and applications. The system provides a selection of object-based components that are statically and/or dynamically assembled into a full application system. The virtual memory manager is optional and is loaded o ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
MMLite is a modular system architecture that is suitable for a wide variety of hardware and applications. The system provides a selection of object-based components that are statically and/or dynamically assembled into a full application system. The virtual memory manager is optional and is loaded on demand. Communication with remote peers uses XML/SOAP and standard web services. Components can be easily replaced and reimplemented. Componentization reduced the development time and led to a flexible and understandable system.

The Visible Problems of the Invisible Computer

by Andrew Odlyzko - First Monday , 1999
"... The future is said to belong to information appliances, specialized and easy to use devices that will have the car tell the coffee pot to brew a cup of coffee just in time for our arrival home. These gadgets are supposed to eliminate the complexity and resulting frustration of the PC. The thesis of ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
The future is said to belong to information appliances, specialized and easy to use devices that will have the car tell the coffee pot to brew a cup of coffee just in time for our arrival home. These gadgets are supposed to eliminate the complexity and resulting frustration of the PC. The thesis of this essay is that while information appliances will proliferate, they will not lessen the perception of an exasperating electronic environment. The interaction of the coffee pot, the car, the smart fridge, and the networked camera will create a new layer of complexity. In the rush towards the digital era, we will continue to live right on the edge of intolerable frustration. The paradox of information appliances is that while they are presented as products for a mature market, their main effect will be to unleash a tidal wave of innovation. When technology changes rapidly, greater ease of use serves to attract more users and developers, creating new frustrations. The most we can do is ameli...

Shifting Contexts in Invisible Computing Environments

by David R. Mcgee, Misha Pavel, Philip R. Cohen - CHI Workshop on Distributed and Disappearing UIs in Ubiquitous Computing. Available Internet: http://www.teco.edu/chi2001ws/proceedings.html , 2001
"... Invisible computing systems are highly context-dependent. Consequently, the influence that language has on contex-tual interpretation cannot be ignored by such systems. Rather, once language and other forms of human action are perceived by a system, its interpretative processes will of necessity be ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Invisible computing systems are highly context-dependent. Consequently, the influence that language has on contex-tual interpretation cannot be ignored by such systems. Rather, once language and other forms of human action are perceived by a system, its interpretative processes will of necessity

New Media Literacy INVISIBLE COMPUTING

by unknown authors , 2001
"... Abstract--In this paper, I examine the pervasive quest for invisible computers, applications, and interfaces in order to make a case for resisting the pressure to standardize platforms for delivering on-line courses and other Web-based applications. We need to be especially wary of the argument that ..."
Abstract - Add to MetaCart
Abstract--In this paper, I examine the pervasive quest for invisible computers, applications, and interfaces in order to make a case for resisting the pressure to standardize platforms for delivering on-line courses and other Web-based applications. We need to be especially wary of the argument

Privacy and trust issues with invisible computers

by Saadi Lahlou, Marc Langheinrich, Carsten Röcker - Com. ACM , 2005
"... A set of designer guidelines from the European Union offers the first step in building privacyaware systems. When 59-year-old Robert Rivera slipped on spilled yogurt and injured his kneecap in a Los Angeles supermarket, he sued the store’s management to recover hospitalization costs and lost wages. ..."
Abstract - Cited by 28 (4 self) - Add to MetaCart
A set of designer guidelines from the European Union offers the first step in building privacyaware systems. When 59-year-old Robert Rivera slipped on spilled yogurt and injured his kneecap in a Los Angeles supermarket, he sued the store’s management to recover hospitalization costs and lost wages. While the case was ultimately dismissed for lack of evidence, Rivera claims a mediator contacted him

Designing the Invisible Computer - From Radio-Clock to Screenfridge

by Sara Ilstedt Hjelm, Sara Ilstedt Hjelm , 2001
"... This paper willdll1PF the concept of invisible computing in aprod[" dod[ context. Within prodin ddin1F[F[ and add1F[F[]1 d31d is commonlyused tod1PA"AA1 chronologyand semantics. New, unsettling objects can bemad to seemold and familiar, or vice versa, somethingold can acquire a new,"m ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
This paper willdll1PF the concept of invisible computing in aprod[" dod[ context. Within prodin ddin1F[F[ and add1F[F[]1 d31d is commonlyused tod1PA"AA1 chronologyand semantics. New, unsettling objects can bemad to seemold and familiar, or vice versa, somethingold can acquire a new

Pervasive Computing: Vision and Challenges

by M. Satyanarayanan - IEEE Personal Communications , 2001
"... This paper discusses the challenges in computer systems research posed by the emerging field of pervasive computing. It first examines the relationship of this new field to its predecessors: distributed systems and mobile computing. It then identifies four new research thrusts: effective use of smar ..."
Abstract - Cited by 686 (22 self) - Add to MetaCart
of smart spaces, invisibility, localized scalability, and masking uneven conditioning. Next, it sketches a couple of hypothetical pervasive computing scenarios, and uses them to identify key capabilities missing from today's systems. The paper closes with a discussion of the research necessary
Next 10 →
Results 1 - 10 of 903
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University