The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A conceptual framework describes three aspects of designing and analyzing pervasive systems in an urban environment. A systematic approach to designing the urban environment as an integrated system of architecture and pervasive technologies requires drawing on knowledge, theory, and methods from the disciplines of architecture and computer science. Key to this interdisciplinary integration is the...
Traditional software development is based on the closed-world assumption that the boundary between system and environment is known and unchanging. However, this assumption no longer works within today's unpredictable open-world settings, especially in ubiquitous and pervasive computing settings, which demand techniques that let software react to changes by self-organizing its structure and self-adapting...
The trend toward wireless communications and advances in mobile technologies are increasing consumer demand for ubiquitous access to Internet-based information and services. A 3D framework provides a basis for designing, analyzing, and evaluating strategies to address data consistency issues in mobile wireless environments. A proposed relay-peer-based cache consistency protocol offers a generic and...
Mobile computers have the potential to provide a new array of location-based services to drivers as they travel around. The predestination algorithm predicts a driver's destination based on both general trends, such as the likelihood that people will choose various types of destinations, and personalized data such as a list of previously visited locations. We designed the algorithm to run on a vehicle's...
The commoditization of computer hardware and software has enabled a new computing paradigm whereby computers will sense, calculate, and act on our behalf, either with or without human interaction as best fits the circumstances. Further, this will occur in an everyday environment, not just when a person is working at a desk. This paradigm shift was made possible by the inexorable increase in computing...
HomePlug AV powerline communications (PLC), based on the open standards of the HomePlug Powerline Alliance, has become the leading data communications technology for moving data and media over AC wiring. HomePlug AV is designed to provide robust high-speed powerline communications using very low transmit levels that satisfy regulations around the world. Despite the low transmit power in the presence...
We have developed ActivityStudio (http:// activitystudio.sourceforge.net), an open source suite of tools for prototyping and in situ testing of low-cost ubicomp application prototypes. The tool suite's design environment, ActivityDesigner, lets designers create rich ubicomp prototypes in a few hours, using high-level abstractions and techniques such as activity models, storyboards, and programming...
Several research projects pursuing middleware architectures to support pervasive applications on smart phones reveal the importance of careful resource management, lightweight communication protocols, and asynchronous programming.
The ubiquitous deployment of systems for collecting, processing, and sharing personally identifiable information for service delivery makes every person vulnerable to online theft of identity data, thus undermining confidence in information technologies. This has led to the expansion of research on several digital identity management topics, including improving trustworthiness and privacy.
In implementing privacy protection in surveillance systems, designers must maximize privacy while retaining the system's purpose. One way to achieve this is to combine data-hiding techniques with context-aware policies governing access to securely collected and stored data.
The computational thinking view recognizes that underlying computing concepts are integral to our everyday lives and pervasive in many disciplines of study. Computer science, information systems, computer engineering, informatics, software engineering-these are among the smorgasbord of choices available to college students interested in a computing career. The choices for noncomputing-oriented students...
The widespread deployment of technologies like mobile phones continues to drive new applications and to open research opportunities. This article talks about ubiquitous computing and how people understand and interact with computing. Pervasive computing technologies are transparent to users until the system malfunctions. Minor breakdowns are common, and people get used to them. However, when breakdowns...
In this paper, the invisibility of today's technology is often a blessing. Should invisibility be the guiding design goal for ubiquitous computing? The author mentions that invisibility is a narrow design goal. It's not necessarily a bad one, but it doesn't capture the full range of technological or creative possibilities. If the computer scientists and engineers only strive to build invisible systems,...
Cancer-care costs are increasing despite the expansion of disease management and prevention programs. While tremendous scientific progress has led to new tools for diagnosis, treatment, and follow-up, evidence is less complete on the comparative effectiveness of these interventions in actual community practice.
Commodity hardware enables a range of cost-effective ubiquitous computing research, but innovative custom hardware can drive compelling new user experiences. One of the dreams of ubiquitous computing is an ecology of heterogeneous computer systems, built into the environment around us and acting in concert to make our lives easier and more fun. Fundamental to this vision is a movement away from the...
The article discusses five perspectives expressing different facets of IT value. Each perspective has merit, with both proponents and detractors. Some deal more with the actual technology, while others focus on its artifacts. The best way to consider IT is to use multiple perspectives. A single measure such as net present value doesn't adequately explain IT's impact on an organization. Taken together,...
Unobtrusive body-worn sensors can continuously interpret user activity and react proactively in sports, personal health, and many other application areas.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.