Results 1 - 10
of
178
UbiComp: Becoming Superhuman
"... Abstract. UbiComp aims to offer superhuman capabilites to users. By referring to fictional superhuman skills, we can provide users with interaction paradigms that are easy to understand, and which work across many UbiComp applications. ..."
Abstract
- Add to MetaCart
Abstract. UbiComp aims to offer superhuman capabilites to users. By referring to fictional superhuman skills, we can provide users with interaction paradigms that are easy to understand, and which work across many UbiComp applications.
Situating UbiComp in the Home
, 2003
"... as. (Edited and emphasis added) Our studies set out to explicate the organization that the home already has in order to inform and sensitise designers to the social circumstances ubiquitous computing will be situated in, and to root the development of ubicomp in the day-to-day reality of domestic l ..."
Abstract
- Add to MetaCart
as. (Edited and emphasis added) Our studies set out to explicate the organization that the home already has in order to inform and sensitise designers to the social circumstances ubiquitous computing will be situated in, and to root the development of ubicomp in the day-to-day reality of domestic life. Our approach might best be articulated by example. A Practical Example: The Interactional Work of Mail Handling in the Home Handling mail is a commonplace activity in the home and of great importance to the day-to-day running of the household. Through handling mail household members orient to, arrange, concert, and accomplish a diverse range of activities including, for example, the timely payment of household bills, attending important meetings, to more ludic pursuits such as going to concerts and parties. The timeliness of such accomplishments is not accidental but provided for and guaranteed through the social organization of mail in the home [4]. The following, somewhat condensed,
Context-Adaptive Information Security for UbiComp Environments
, 2004
"... this paper, we have proposed a novel, to the best of our knowledge, security paradigm which tries to maximize the trade-off between data availability and its security and privacy protection in the UbiComp world. We draw from the human behavior, which we believe is very effective within the reasoning ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
this paper, we have proposed a novel, to the best of our knowledge, security paradigm which tries to maximize the trade-off between data availability and its security and privacy protection in the UbiComp world. We draw from the human behavior, which we believe is very effective within
Middleware Services for Federating UbiComp Environments
"... The Ubiquitous Computing model, which has always been applied to environments bounded to a singular physical site, has now to scale to large enterprises that have several offices, spread over a wide geographic area, each one equipped with an own WLAN, and interconnected by the internet. In this case ..."
Abstract
- Add to MetaCart
. In this case, it is possible to architect the environment as a federation of classic UbiComp environments i. e., each physical site is equipped with an UbiComp environment. All UbiComp environments are federated and coordinated in order i) to compose a wide-area, virtually unique, UbiComp environment and ii
Smart Objects as Components of UbiComp Applications
"... This paper presents a component-oriented programming model and middleware support services for building ubiquitous computing (UbiComp) applications that are composed out of smart objects on demand. Applications are realized as graphs representing smart objects and their services binding. Services ar ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
This paper presents a component-oriented programming model and middleware support services for building ubiquitous computing (UbiComp) applications that are composed out of smart objects on demand. Applications are realized as graphs representing smart objects and their services binding. Services
UbiComp in opportunity spaces: challenges for participatory design
- In Procs of PDC'06
, 2006
"... The rise of ubiquitous computing (UbiComp), where pervasive, wireless and disappearing technologies offer hitherto unavailable means of supporting activity, increasingly opens up ‘opportunity spaces’. These are spaces where there is no urgent problem to be solved, but much potential to augment and e ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
The rise of ubiquitous computing (UbiComp), where pervasive, wireless and disappearing technologies offer hitherto unavailable means of supporting activity, increasingly opens up ‘opportunity spaces’. These are spaces where there is no urgent problem to be solved, but much potential to augment
Security in UbiComp: Protection through Commandments
"... The increasing potential to combine devices with different capabilities and purposes leads to new security issues. Traditional security prescribes what has to be prohibited and is thus too inflexible to cope with a constantly changing context. In this paper, we propose an alternative approach to for ..."
Abstract
- Add to MetaCart
to formulating security policies in UbiComp based on the notion of commandments. In essence, commandments formulate situations that should occur within an indefinite time span, thus being conceptually similar to, albeit qualitative distinct from, the notion of obligation. Here, we focus on the characteristics
Tracing Technological Intimacies: UbiComp Assemblages
"... Intimacy need not be located in specific technologies or in the relationships they afford, but may be traced through particular spaces, times and relations mobilised during the design and use of ubiquitous computing. In this short paper, I draw out the concepts of ‘intimacy ’ and ‘closeness, ’ as we ..."
Abstract
- Add to MetaCart
to the research and development of a wide variety of technologies. By understanding these intimate assemblages, I believe we may better understand the emerging social and cultural aspects of UbiComp, and design for greater accountability and responsibility.
Leveraging the Web of Things for Rapid Prototyping of UbiComp Applications
"... An increasing number of real-world entities is currently being connected to the Internet and the World Wide Web. We argue that this development is the precursor of a Web of Things (WoT), which in turn provides a promising way to prototype UbiComp applications, by significantly lowering the technical ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
An increasing number of real-world entities is currently being connected to the Internet and the World Wide Web. We argue that this development is the precursor of a Web of Things (WoT), which in turn provides a promising way to prototype UbiComp applications, by significantly lowering
Audio Fingerprinting in UbiComp Environments – Performance Measurements and Applications
"... Abstract—We propose an audio-based mechanism for device authentication. The method is feasible with low-end microphones and can be extended to further UbiComp application domains as improved location estimation of sensor nodes or arlarming. Measurement results obtained in a preparatory study demon-s ..."
Abstract
- Add to MetaCart
Abstract—We propose an audio-based mechanism for device authentication. The method is feasible with low-end microphones and can be extended to further UbiComp application domains as improved location estimation of sensor nodes or arlarming. Measurement results obtained in a preparatory study demon
Results 1 - 10
of
178