Results 1 - 10
of
903
Interfacing with the Invisible Computer
, 2002
"... The Ubicomp scenario of wirelessly networked processors embedded in everyday objects has been dubbed "the invisible computer". Users no longer interact with a computer but with familiar objects whose functionality is transparently enhanced by computing features. Using the results of an ext ..."
Abstract
-
Cited by 14 (4 self)
- Add to MetaCart
The Ubicomp scenario of wirelessly networked processors embedded in everyday objects has been dubbed "the invisible computer". Users no longer interact with a computer but with familiar objects whose functionality is transparently enhanced by computing features. Using the results
Secure Invisible Computing
, 2003
"... Invisible computing creates better everyday devices by augmenting them with computation and communication. The native interface of a particular device suffices, with computation and communication occurring transparently to the user. An invisible computing device does not require setup or maintenance ..."
Abstract
- Add to MetaCart
Invisible computing creates better everyday devices by augmenting them with computation and communication. The native interface of a particular device suffices, with computation and communication occurring transparently to the user. An invisible computing device does not require setup
Component Based Invisible Computing
, 2001
"... MMLite is a modular system architecture that is suitable for a wide variety of hardware and applications. The system provides a selection of object-based components that are statically and/or dynamically assembled into a full application system. The virtual memory manager is optional and is loaded o ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
MMLite is a modular system architecture that is suitable for a wide variety of hardware and applications. The system provides a selection of object-based components that are statically and/or dynamically assembled into a full application system. The virtual memory manager is optional and is loaded on demand. Communication with remote peers uses XML/SOAP and standard web services. Components can be easily replaced and reimplemented. Componentization reduced the development time and led to a flexible and understandable system.
The Visible Problems of the Invisible Computer
- First Monday
, 1999
"... The future is said to belong to information appliances, specialized and easy to use devices that will have the car tell the coffee pot to brew a cup of coffee just in time for our arrival home. These gadgets are supposed to eliminate the complexity and resulting frustration of the PC. The thesis of ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
The future is said to belong to information appliances, specialized and easy to use devices that will have the car tell the coffee pot to brew a cup of coffee just in time for our arrival home. These gadgets are supposed to eliminate the complexity and resulting frustration of the PC. The thesis of this essay is that while information appliances will proliferate, they will not lessen the perception of an exasperating electronic environment. The interaction of the coffee pot, the car, the smart fridge, and the networked camera will create a new layer of complexity. In the rush towards the digital era, we will continue to live right on the edge of intolerable frustration. The paradox of information appliances is that while they are presented as products for a mature market, their main effect will be to unleash a tidal wave of innovation. When technology changes rapidly, greater ease of use serves to attract more users and developers, creating new frustrations. The most we can do is ameli...
Shifting Contexts in Invisible Computing Environments
- CHI Workshop on Distributed and Disappearing UIs in Ubiquitous Computing. Available Internet: http://www.teco.edu/chi2001ws/proceedings.html
, 2001
"... Invisible computing systems are highly context-dependent. Consequently, the influence that language has on contex-tual interpretation cannot be ignored by such systems. Rather, once language and other forms of human action are perceived by a system, its interpretative processes will of necessity be ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Invisible computing systems are highly context-dependent. Consequently, the influence that language has on contex-tual interpretation cannot be ignored by such systems. Rather, once language and other forms of human action are perceived by a system, its interpretative processes will of necessity
New Media Literacy INVISIBLE COMPUTING
, 2001
"... Abstract--In this paper, I examine the pervasive quest for invisible computers, applications, and interfaces in order to make a case for resisting the pressure to standardize platforms for delivering on-line courses and other Web-based applications. We need to be especially wary of the argument that ..."
Abstract
- Add to MetaCart
Abstract--In this paper, I examine the pervasive quest for invisible computers, applications, and interfaces in order to make a case for resisting the pressure to standardize platforms for delivering on-line courses and other Web-based applications. We need to be especially wary of the argument
Privacy and trust issues with invisible computers
- Com. ACM
, 2005
"... A set of designer guidelines from the European Union offers the first step in building privacyaware systems. When 59-year-old Robert Rivera slipped on spilled yogurt and injured his kneecap in a Los Angeles supermarket, he sued the store’s management to recover hospitalization costs and lost wages. ..."
Abstract
-
Cited by 28 (4 self)
- Add to MetaCart
A set of designer guidelines from the European Union offers the first step in building privacyaware systems. When 59-year-old Robert Rivera slipped on spilled yogurt and injured his kneecap in a Los Angeles supermarket, he sued the store’s management to recover hospitalization costs and lost wages. While the case was ultimately dismissed for lack of evidence, Rivera claims a mediator contacted him
Designing the Invisible Computer - From Radio-Clock to Screenfridge
, 2001
"... This paper willdll1PF the concept of invisible computing in aprod[" dod[ context. Within prodin ddin1F[F[ and add1F[F[]1 d31d is commonlyused tod1PA"AA1 chronologyand semantics. New, unsettling objects can bemad to seemold and familiar, or vice versa, somethingold can acquire a new,"m ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
This paper willdll1PF the concept of invisible computing in aprod[" dod[ context. Within prodin ddin1F[F[ and add1F[F[]1 d31d is commonlyused tod1PA"AA1 chronologyand semantics. New, unsettling objects can bemad to seemold and familiar, or vice versa, somethingold can acquire a new
Pervasive Computing: Vision and Challenges
- IEEE Personal Communications
, 2001
"... This paper discusses the challenges in computer systems research posed by the emerging field of pervasive computing. It first examines the relationship of this new field to its predecessors: distributed systems and mobile computing. It then identifies four new research thrusts: effective use of smar ..."
Abstract
-
Cited by 686 (22 self)
- Add to MetaCart
of smart spaces, invisibility, localized scalability, and masking uneven conditioning. Next, it sketches a couple of hypothetical pervasive computing scenarios, and uses them to identify key capabilities missing from today's systems. The paper closes with a discussion of the research necessary
Results 1 - 10
of
903