Academic literature on the topic 'Ubiquitous computing. Computers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Ubiquitous computing. Computers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Ubiquitous computing. Computers"

1

Quilici-Gonzalez, J. A., G. Kobayashi, M. C. Broens, and M. E. Q. Gonzalez. "Ubiquitous Computing." International Journal of Technoethics 1, no. 3 (July 2010): 11–23. http://dx.doi.org/10.4018/jte.2010070102.

Full text
Abstract:
In this article, the authors investigate, from an interdisciplinary perspective, possible ethical implications of the presence of ubiquitous computing systems in human perception/action. The term ubiquitous computing is used to characterize information-processing capacity from computers that are available everywhere and all the time, integrated into everyday objects and activities. The contrast in approach to aspects of ubiquitous computing between traditional considerations of ethical issues and the Ecological Philosophy view concerning its possible consequences in the context of perception/action are the underlying themes of this paper. The focus is on an analysis of how the generalized dissemination of microprocessors in embedded systems, commanded by a ubiquitous computing system, can affect the behaviour of people considered as embodied embedded agents.
APA, Harvard, Vancouver, ISO, and other styles
2

Rath, Mamata. "Technical and Operational Utility of Ubiquitous Devices with Challenging Issues in Emerging Ubiquitous Computing." International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics 9, no. 1 (January 2018): 16–35. http://dx.doi.org/10.4018/ijmdwtfe.2018010102.

Full text
Abstract:
Ubiquitous computing is an advanced technology in the age of wireless networks that supports infiltration, activation and interconnectability of all the electronic and sensor-based objects related to everyday issues, and in this manner endeavours to empower a ubiquitous stream of information and data by coordinating learning and training. Ubiquitous computing is the method of enhancing computer-based computations by making use of many computers available throughout the physical environment, but making them effectively invisible to the user. The advanced technology of science and networks is instinctively welcoming the introduction of this revolutionary computing concept that guarantees to profoundly affect the way the authors associate with computing machineries, electronic gadgets, mobile devices, cyber spaces, and related peripherals. This new emerging technology of ubiquitous computing imagines a world where inserted processors, PCs, sensors, and advanced correspondences are reasonable products that are accessible at any time. Ubiquitous computing will encompass clients with an agreeable and helpful data condition that unites physical and computational foundations into incorporated natural surroundings. This living space will include an expansion of hundreds or thousands of computing gadgets and sensors that will give new usefulness, offer specific administrations, and lift efficiency and cooperation. The current research article projects technical and operational utility of ubiquitous devices with challenging issues in emerging ubiquitous computing.
APA, Harvard, Vancouver, ISO, and other styles
3

Al-Roubaiey, Anas, and M. AL-Rhman Alkhiaty. "QoS-Aware Middleware for Ubiquitous Environment: A Review and Proposed Solution." Journal of Computational Engineering 2014 (March 19, 2014): 1–7. http://dx.doi.org/10.1155/2014/725960.

Full text
Abstract:
Ubiquitous computing has introduced a new era of computing. Compared to traditional distributed systems, ubiquitous computing systems feature increased dynamism and heterogeneity. In traditional computing environments (mainframe and PC), users actively choose to interact with computers. Ubiquitous computing applications are likely to be different, where computing systems are available anywhere but not visible. The underlying ubiquitous computing infrastructures are more complex and bring up many issues. In this work we survey the literature to demonstrate, in detail, the characteristics and the challenges of the ubiquitous computing as well as the requirements for building ubiquitous software that brings these characteristics into reality. Furthermore we present some existing middleware solutions for ubiquitous environments, and propose our middleware-based architecture to facilitate the user interaction in such environment. To the best of our knowledge this is the first work proposing DDS-based solution for ubiquitous computing as a unified middleware.
APA, Harvard, Vancouver, ISO, and other styles
4

Aziz, Omer, Benny Lo, Julien Pansiot, Louis Atallah, Guang-Zhong Yang, and Ara Darzi. "From computers to ubiquitous computing by 2010: health care." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366, no. 1881 (July 31, 2008): 3805–11. http://dx.doi.org/10.1098/rsta.2008.0126.

Full text
Abstract:
Over the past decade, miniaturization and cost reduction in semiconductors have led to computers smaller in size than a pinhead with powerful processing abilities that are affordable enough to be disposable. Similar advances in wireless communication, sensor design and energy storage have meant that the concept of a truly pervasive ‘wireless sensor network’, used to monitor environments and objects within them, has become a reality. The need for a wireless sensor network designed specifically for human body monitoring has led to the development of wireless ‘body sensor network’ (BSN) platforms composed of tiny integrated microsensors with on-board processing and wireless data transfer capability. The ubiquitous computing abilities of BSNs offer the prospect of continuous monitoring of human health in any environment, be it home, hospital, outdoors or the workplace. This pervasive technology comes at a time when Western world health care costs have sharply risen, reflected by increasing expenditure on health care as a proportion of gross domestic product over the last 20 years. Drivers of this rise include an ageing post ‘baby boom’ population, higher incidence of chronic disease and the need for earlier diagnosis. This paper outlines the role of pervasive health care technologies in providing more efficient health care.
APA, Harvard, Vancouver, ISO, and other styles
5

Hashemi, Mahdi, and Abolghasem Sadeghi-Niaraki. "A Theoretical Framework for Ubiquitous Computing." International Journal of Advanced Pervasive and Ubiquitous Computing 8, no. 2 (April 2016): 1–15. http://dx.doi.org/10.4018/ijapuc.2016040101.

Full text
Abstract:
You may forget where you left your keys when you need them. In ubiquitous computing space your keys will find you and inform you where they are. Ubiquitous computing, the third generation of computing spaces, following mainframes and personal computers, is in its incipient evolution steps. In ubiquitous computing space, sensors and computing nodes are invisibly, inconspicuously, and overwhelmingly embedded in all real-world objects and are all connected to each other through omnipresent wireless networks. The goal is to make real-world objects seem intelligent and autonomous in providing users with electronic and Internet services with users not even noticing how they are provided with these services. The real world, cyberspace, modeling, and mathematics are identified as the main constituents of ubiquitous computing in this study. These four areas are investigated one-by-one and in combination to show how they create a solid foundation for ubiquitous computing. An application of ubiquitous computing in car navigation systems is used to indicate the reliability of the proposed framework.
APA, Harvard, Vancouver, ISO, and other styles
6

Khalfi, Mohammed Fethi, and Sidi Mohamed Benslimane. "Toward A Generic Infrastructure for Ubiquitous Computing." International Journal of Advanced Pervasive and Ubiquitous Computing 5, no. 1 (January 2013): 66–85. http://dx.doi.org/10.4018/japuc.2013010107.

Full text
Abstract:
The recent technological overhangs have focused on the democratization of wireless networks and the miniaturization of communication devices. In this context, Ubiquitous Computing is a recent paradigm whose objective is to allow users to access data, and make information available anywhere and at any time. In other terms, Pervasive Information Systems (PIS) constitute an emerging class of Information Systems where Information Technology is gradually embedded in the physical environment, capable of accommodating user needs and wants when desired. PIS differ from Desktop Information Systems (DIS) in that they encompass a complex, dynamic environment composed of multiple artifacts instead of Personal Computers only, capable of perceiving contextual information instead of simple user input, and supporting mobility instead of stationary services. In this paper, as an initial step, the authors present PIS novel characteristics compared to traditional desktop information systems; the authors explore this domain by offering a list of challenges and concepts of ubiquitous computing that form the core elements of a pervasive environment. As a result of this work, a generic architecture for intelligent environment has been created. Based on various and related works concerning models and designs. This framework can be used to design any PIS instance.
APA, Harvard, Vancouver, ISO, and other styles
7

Kinser, Kevin. "Ubiquitous Computing: The Universal Use of Computers on College Campuses (review)." Review of Higher Education 27, no. 2 (2004): 279–80. http://dx.doi.org/10.1353/rhe.2003.0063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cherfia, Taha Abdelmoutaleb, and Faïza Belala. "Bigraphical Reactive Systems Based Approaches for Modeling Context-Aware Systems." International Journal of Adaptive, Resilient and Autonomic Systems 5, no. 4 (October 2014): 1–19. http://dx.doi.org/10.4018/ijaras.2014100101.

Full text
Abstract:
In the past few years, context-aware computing has become one of the most promising topics of ubiquitous (pervasive) computing where computers are integrated and vanish in the background of users everyday activities. A context-aware system is a ubiquitous system, which is able to adapt its behavior automatically according to the gathered context information. However, due to the increasing complexity and diversity of such systems, the modeling process has become a major challenge for the ubiquitous computing community. In order to address this critical issue, different bigraphical reactive systems based approaches have been proposed to ease the modeling of some aspects of context-aware systems. Therefore, this paper presents a study attempting to show how bigraphs work under these approaches, and to illustrate the efficiency of our proposed approach in terms of addressing various aspects of context-aware systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Han, Su, and Xin Dai Zhang. "Research of the Multimodal English Teaching in the Cloud Computing Environment." Advanced Materials Research 989-994 (July 2014): 5495–97. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.5495.

Full text
Abstract:
With the rapid development of computers and the Internet, information technology has brought about great changes to our educational field. At present the ubiquitous “cloud service” has brought education into “the cloud era”. Cloud computing has found more applications in our English teaching. Integrating the technology of “cloud computing” with the theory of “multimodal discourse analysis”, this paper researches how to carry out multimodal English teaching in the cloud computing environment.
APA, Harvard, Vancouver, ISO, and other styles
10

Dumitru, Ileana. "Grid Computing." International Journal of Sustainable Economies Management 3, no. 3 (July 2014): 67–78. http://dx.doi.org/10.4018/ijsem.2014070105.

Full text
Abstract:
To calculate the potential impact of grid on the enterprise, one just needs to look back a decade or so ago. Those who remember how LANs developed in company years before the Web was born can easily get a picture of how Grid Computing in corporations may change in the years to come. In the early days of the Internet, there was a strong opposition to linking computers together in a network. Ultimately, however, the Internet has become a ubiquitous tool, and many experts predict the same outcome for Grid Computing on the enterprise. There are still concerns to consider and obstacles to be overcome, but the momentum behind corporate Grid Computing is quickly gathering pace. The integration of Grid Computing technologies into enterprise computing systems can provide a much richer range of possibilities. This integration should provide enhanced capabilities and interoperability to meet current virtual organization demands.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Ubiquitous computing. Computers"

1

Schmidt, Albrecht. "Ubiquitous computing : computing in context." Thesis, Lancaster University, 2003. http://eprints.lancs.ac.uk/12221/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tennent, Paul R. "Augmented analyses : supporting the study of ubiquitous computing systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5307/.

Full text
Abstract:
Ubiquitous computing is becoming an increasingly prevalent part of our everyday lives. The reliance of society upon such devices as mobile phones, coupled with the increasing complexity of those devices is an example of how our everyday human-human interaction is affected by this phenomenon. Social scientists studying human-human interaction must now take into account the effects of these technologies not just on the interaction itself, but also on the approach required to study it. User evaluation is a challenging topic in ubiquitous computing. It is generally considered to be difficult, certainly more so than in previous computational settings. Heterogeneity in design, distributed and mobile users, invisible sensing systems and so on, all add up to render traditional methods of observation and evaluation insufficient to construct a complete view of interactional activity. These challenges necessitate the development of new observational technologies. This thesis explores some of those challenges and demonstrates that system logs, with suitable methods of synchronising, filtering and visualising them for use in conjunction with more traditional observational approaches such as video, can be used to overcome many of these issues. Through a review of both the literature of the field, and the state of the art of computer aided qualitative data analysis software (CAQDAS), a series of guidelines are constructed showing what would be required of a software toolkit to meet the challenges of studying ubiquitous computing systems. It outlines the design and implementation of two such software packages, \textit{Replayer} and \textit{Digital Replay System}, which approach the problem from different angles, the former being focussed on visualising and exploring the data in system logs and the latter focussing on supporting the methods used by social scientists to perform qualitative analyses. The thesis shows through case studies how this technique can be applied to add significant value to the qualitative analysis of ubiquitous computing systems: how the coordination of system logs and other media can help us find information in the data that would otherwise be inaccessible; an ability to perform studies in locations/settings that would otherwise be impossible, or at least very difficult; and how creating accessible qualitative data analysis tools allows people to study particular settings or technologies who could not have studied them before. This software aims to demonstrate the direction in which other CAQDAS packages may have to move in order to support the study of the characteristics of human-computer and human-human interaction in a world increasingly reliant upon ubiquitous computing technology.
APA, Harvard, Vancouver, ISO, and other styles
3

Chalmers, Kevin. "Investigating communicating sequential processes for Java to support ubiquitous computing." Thesis, Edinburgh Napier University, 2009. http://researchrepository.napier.ac.uk/Output/3507.

Full text
Abstract:
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via computational elements. These elements are designed to augment and support our lives, thus allowing us to perform our tasks and goals. The main facet of Ubiquitous Computing is that computational devices are embedded in the environment, and interact with users and themselves to provide novel and unique applications. Ubiquitous Computing requires an underlying architecture that helps to promote and control the dynamic properties and structures that the applications require. In this thesis, the Networking package of Communicating Sequential Processes for Java (JCSP) is examined to analyse its suitability as the underlying architecture for Ubiquitous Computing. The reason to use JCSP Networking as a case study is that one of the proposed models for Ubiquitous Computing, the π-Calculus, has the potential to have its abstractions implemented within JCSP Networking. This thesis examines some of the underlying properties of JCSP Networking and examines them within the context of Ubiquitous Computing. There is also an examination into the possibility of implementing the mobility constructs of the π-Calculus and similar mobility models within JCSP Networking. It has been found that some of the inherent properties of Java and JCSP Networking do cause limitations, and hence a generalisation of the architecture has been made that should provide greater suitability of the ideas behind JCSP Networking to support Ubiquitous Computing. The generalisation has resulted in the creation of a verified communication protocol that can be applied to any Communicating Process Architecture.
APA, Harvard, Vancouver, ISO, and other styles
4

Warshawsky, James Emory. "Umbilical Cord: A system for ubiquitous computing." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2518.

Full text
Abstract:
Ubiquitous computing aims to make computing widely available, easy to use, and completely transparent to the user. Umbilical Cord is intended to be the first step in researching ubiquitous computing at CSUSB. It implements a model scalable network with a client-server architecture that features consistent user interaction and global access to user data. It is based on the Linux operating system which can be leveraged for future research due to the open nature of its source code. It also features a scalable network swap.
APA, Harvard, Vancouver, ISO, and other styles
5

Nguyen, Tammy. "Context-aware access control in pervasive computing environments." Online access for everyone, 2005. http://www.dissertations.wsu.edu/Thesis/Summer2005/t%5Fnguyen%5F061005.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dhomeja, Lachhman Das. "Supporting policy-based contextual reconfiguration and adaptation in ubiquitous computing." Thesis, University of Sussex, 2011. http://sro.sussex.ac.uk/id/eprint/6933/.

Full text
Abstract:
In order for pervasive computing systems to be able to perform tasks which support us in everyday life without requiring attention from the users of the environment, they need to adapt themselves in response to context. This makes context-awareness in general, and context-aware adaptation in particular, an essential requirement for pervasive computing systems. Two of the features of context-awareness are: contextual reconfiguration and contextual adaptation in which applications adapt their behaviour in response to context. We combine both these features of context-awareness to provide a broad scope of adaptation and put forward a system, called Policy-Based Contextual Reconfiguration and Adaptation (PCRA) that provides runtime support for both. The combination of both context-aware reconfiguration and context-aware adaptation provides a broad scope of adaptation and hence allows the development of diverse adaptive context-aware applications. However, another important issue is the choice of an effective means for developing, modifying and extending such applications. The main argument forming the basis of this thesis is that we advocate the use of a policy-based programming model and argue that it provides more effective means for developing, modifying and extending such applications. This thesis addresses other important surrounding issues which are associated with adaptive context-aware applications. These include the management of invalid bindings and the provision of seamless caching support for remote services involved in bindings for improved performance. The bindings may become invalid due to failure conditions that can arise due to network problems or migration of software components, causing bindings between the application component and remote service to become invalid. We have integrated reconfiguration support to manage bindings, and seamless caching support for remote services in PCRA. This thesis also describes the design and implementation of PCRA, which enables development of adaptive context-aware applications using policy specifications. Within PCRA, adaptive context-aware applications are modelled by specifying binding policies and adaptation policies. The use of policies within PCRA simplifies the development task because policies are expressed at a high-level of abstraction, and are expressed independently of each other. PCRA also allows the dynamic modification of applications since policies are independent units of execution and can be dynamically loaded and removed from the system. This is a powerful and useful capability as applications may evolve over time, i.e. the user needs and preferences may change, but re-starting is undesirable. We evaluate PCRA by comparing its features to other systems in the literature, and by performance measures.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Bo. "SUIDS : a resource-efficient intrusion detection system for ubiquitous computing environments." Thesis, Liverpool John Moores University, 2007. http://researchonline.ljmu.ac.uk/5813/.

Full text
Abstract:
The background of the project is based on the notion of ubiquitous computing. Ubiquitous computing was introduced as a prospective view about future usage of computers. Smaller and cheaper computer chips will enable us to embed computing ability into any appliances. Along with the convenience brought by ubiquitous computing, its inherent features also exposed its weaknesses. It makes things too easy for a malicious user to spy on others. An Intrusion Detection System (IDS) is a tool used to protect computer resources against malicious activities. Existing IDSs have several weaknesses that hinder their direct application to ubiquitous networks. These shortcomings are caused by their lack of considerations about the heterogeneity, flexibility and resource constraints of ubiquitous networks. Thus the evolution towards ubiquitous computing demands a new generation of resource-efficient IDSs to provide sufficient protections against malicious activities. SUIDS is the first intrusion detection system proposed for ubiquitous computing environments. It keeps the special requirements of ubiquitous computing in mind throughout its design and implementation. SUIDS adopts a layered and distributed system architecture, a novel user-centric design and service-oriented detection method, a new resource-sensitive scheme, including protocols and strategies, and a novel hybrid metric based algorithm. These novel methods and techniques used in SUIDS set a new direction for future research and development. As the experiment results demonstrated, SUIDS is able to provide a robust and resource-efficient protection for ubiquitous computing networks. It ensures the feasibility of intrusion detection in ubiquitous computing environments.
APA, Harvard, Vancouver, ISO, and other styles
8

Smith, Lisa Min-yi Chen. "Display computers." Texas A&M University, 2006. http://hdl.handle.net/1969.1/3829.

Full text
Abstract:
A Display Computer (DC) is an everyday object: Display Computer = Display + Computer. The “Display” part is the standard viewing surface found on everyday objects that conveys information or art. The “Computer” is found on the same everyday object; but by its ubiquitous nature, it will be relatively unnoticeable by the DC user, as it is manufactured “in the margins”. A DC may be mobile, moving with us as part of the everyday object we are using. DCs will be ubiquitous: “effectively invisible”, available at a glance, and seamlessly integrated into the environment. A DC should be an example of Weiser’s calm technology: encalming to the user, providing peripheral awareness without information overload. A DC should provide unremarkable computing in support of our daily routines in life. The nbaCub (nightly bedtime ambient Cues utility buddy) prototype illustrates a sample application of how DCs can be useful in the everyday environment of the home of the future. Embedding a computer into a toy, such that the display is the only visible portion, can present many opportunities for seamless and nontraditional uses of computing technology for our youngest user community. A field study was conducted in the home environment of a five-year old child over ten consecutive weeks as an informal, proof of concept of what Display Computers for children can look like and be used for in the near future. The personalized nbaCub provided lightweight, ambient information during the necessary daily routines of preparing for bed (evening routine) and preparing to go to school (morning routine). To further understand the child’s progress towards learning abstract concepts of time passage and routines, a novel “test by design” activity was included. Here, the role of the subject changed to primary designer/director. Final post-testing showed the subject knew both morning and bedtime routines very well and correctly answered seven of eight questions based on abstract images of time passage. Thus, the subject was in the process of learning the more abstract concept of time passage, but was not totally comfortable with the idea at the end of the study.
APA, Harvard, Vancouver, ISO, and other styles
9

Malkani, Yasir Arfat. "A proof-of-proximity framework for device pairing in ubiquitous computing environments." Thesis, University of Sussex, 2011. http://sro.sussex.ac.uk/id/eprint/6307/.

Full text
Abstract:
Ad hoc interactions between devices over wireless networks in ubiquitous computing environments present a security problem: the generation of shared secrets to initialize secure communication over a medium that is inherently vulnerable to various attacks. However, these ad hoc scenarios also offer the potential for physical security of spaces and the use of protocols in which users must visibly demonstrate their presence and/or involvement to generate an association. As a consequence, recently secure device pairing has had significant attention from a wide community of academic as well as industrial researchers and a plethora of schemes and protocols have been proposed, which use various forms of out-of-band exchange to form an association between two unassociated devices. These protocols and schemes have different strengths and weaknesses – often in hardware requirements, strength against various attacks or usability in particular scenarios. From ordinary user‟s point of view, the problem then becomes which to choose or which is the best possible scheme in a particular scenario. We advocate that in a world of modern heterogeneous devices and requirements, there is a need for mechanisms that allow automated selection of the best protocols without requiring the user to have an in-depth knowledge of the minutiae of the underlying technologies. Towards this, the main argument forming the basis of this dissertation is that the integration of a discovery mechanism and several pairing schemes into a single system is more efficient from a usability point of view as well as security point of view in terms of dynamic choice of pairing schemes. In pursuit of this, we have proposed a generic system for secure device pairing by demonstration of physical proximity. Our main contribution is the design and prototype implementation of Proof-of-Proximity framework along with a novel Co- Location protocol. Other contributions include a detailed analysis of existing device pairing schemes, a simple device discovery mechanism, a protocol selection mechanism that is used to find out the best possible scheme to demonstrate the physical proximity of the devices according to the scenario, and a usability study of eight pairing schemes and the proposed system.
APA, Harvard, Vancouver, ISO, and other styles
10

Ku, Azir Ku Nurul Fazira. "Human factors of ubiquitous computing : ambient cueing in the digital kitchen?" Thesis, University of Birmingham, 2014. http://etheses.bham.ac.uk//id/eprint/5518/.

Full text
Abstract:
This thesis is concerned with the uses of Ubiquitous Computing (UbiComp) in everyday domestic environments. The concept of UbiComp promises to shift computing away from the desktop into everyday objects and settings. It has the twin goals of providing ‘transparent’ technologies where the information has been thoroughly embedded into everyday activities and objects (thus making the computer invisible to the user) and also (and more importantly) of seamless integration of these technologies into the activities of their users. However, this raises the challenge of how best to support interaction with a ‘transparent’ or ‘invisible’ technology; if the technology is made visible, it will attract the user's attention to it and away from the task at hand, but if it is hidden, then how can the user cope with malfunctions or other problems in the technology? We approach the design of Human-Computer Interaction in the ubiquitous environment through the use of ambient displays, i.e. the use of subtle cueing, embedded in the environment which is intended to guide human activity. This thesis draws on the concept of stimulus-response compatibility and applies this to the design ambient display. This thesis emphasizes the need to understand the users’ perspectives and responses in any particular approach that has been proposed. Therefore, the main contributions of this thesis focus on approaches to improve human performance in the ubiquitous environment through ambient display.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Ubiquitous computing. Computers"

1

Everyware: The dawning age of ubiquitous computing. Berkeley, CA: New Riders, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ekman, Ulrik. Ubiquitous computing, complexity and culture. New York: Routledge, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wŏn, Kwang-yŏn. Sangho unyonghyŏng weŏrŏbŭl yubikʻwŏtʻŏsŭ kʻŏmpʻyutʻŏ tanmalgi kisul kaebal. [Seoul]: Chŏngbo Tʻongsinbu, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Throughout: Art and culture emerging with ubiquitous computing. Cambridge, MA: MIT Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Weber, Stefan G. Multilaterally secure pervasive cooperation: Privacy protection, accountability and secure communication for the age of pervasive computing. Amsterdam: IOS Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pervasive 2010 (2010 Helsinki, Finland). Pervasive computing: 8th international conference, Pervasive 2010, Helsinki, Finland, May 17-20, 2010 : proceedings. Berlin: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pervasive 2004 (2004 Linz, Austria, and Vienna, Austria). Pervasive computing: Second international conference, Pervasive 2004, Linz/Vienna, Austria, April 18-23, 2004 : proceedings. Berlin: Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pervasive computing: Second international conference, PERVASIVE 2004, Linz/Vienna, Austria, April 18-23, 2004 ; proceedings. Berlin: Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

International Symposium on Handheld and Ubiquitous Computing (1st 1999 Karlsruhe, Germany). Handheld and ubiquitous computing: First International Symposium, HUC '99, Karlsruhe, germany, September 1999 : proceedings. Berlin: Springer, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Greenfield, Adam. Everyware. Upper Saddle River: Peachpit Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Ubiquitous computing. Computers"

1

Smit, Gerard J. M., Ties Bos, Paul J. M. Havinga, Sape J. Mullender, and Jaap Smit. "Chameleon — Reconfigurability in Hand-Held Multimedia Computers." In Handheld and Ubiquitous Computing, 340–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48157-5_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mikhak, Bakhtiar, Fred Martin, Mitchel Resnick, Robbie Berg, and Brian Silverman. "The Children’s Machines: Handheld and Wearable Computers Too." In Handheld and Ubiquitous Computing, 31–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48157-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Masui, Toshiyuki. "POBox: An Efficient Text Input Method for Handheld and Ubiquitous Computers." In Handheld and Ubiquitous Computing, 289–300. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48157-5_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lamming, Mik, and Denis Bohm. "SPECs: Another Approach to Human Context and Activity Sensing Research, Using Tiny Peer-to-Peer Wireless Computers." In UbiComp 2003: Ubiquitous Computing, 192–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39653-6_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pechnikov, Gennadii A., and Vladimir M. Shinkaruk. "Computing Systems (Computers) and Criminal Trial." In Ubiquitous Computing and the Internet of Things: Prerequisites for the Development of ICT, 265–74. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-13397-9_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mattern, Friedemann. "Vom Verschwinden des Computers — Die Vision des Ubiquitous Computing." In Xpert.press, 1–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-642-55550-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Duval, Sébastien, and Hiromichi Hashizume. "Perception of Wearable Computers for Everyday Life by the General Public: Impact of Culture and Gender on Technology." In Embedded and Ubiquitous Computing – EUC 2005, 826–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596356_82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lin, Sheng-Zheng, and Fang-Yie Leu. "Firewall Services Provided by Edge Computers Under AMF and gNB in 5G." In Innovative Mobile and Internet Services in Ubiquitous Computing, 503–13. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22263-5_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Leu, Fang-Yie, and Ping-Hung Chou. "A Study on Firewall Services with Edge Computers of vEPC in 5G Networks." In Innovative Mobile and Internet Services in Ubiquitous Computing, 576–84. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93554-6_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Čas, Johann. "Ubiquitous Computing, Privacy and Data Protection: Options and Limitations to Reconcile the Unprecedented Contradictions." In Computers, Privacy and Data Protection: an Element of Choice, 139–69. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-0641-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Ubiquitous computing. Computers"

1

Lu Yan and Zheng Liang. "Reconfigurable Computing in Ubiquitous Computers: A Roadmap." In Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05). IEEE, 2005. http://dx.doi.org/10.1109/pdcat.2005.195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abowd, G. D., A. K. Dey, R. Orr, and J. Brotherton. "Context-awareness in wearable and ubiquitous computing." In Digest of Papers. First International Symposium on Wearable Computers. IEEE, 1997. http://dx.doi.org/10.1109/iswc.1997.629943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hahn, R., and H. Reichl. "Batteries and power supplies for wearable and ubiquitous computing." In Digest of Papers. Third International Symposium on Wearable Computers. IEEE, 1999. http://dx.doi.org/10.1109/iswc.1999.806705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Peixoto, Maria Joelma, Pedro Pinto, Fernando Trinta, Wellington Ferreira Sarmento, and Windson Viana. "Lucy: An Environment for Practical Ubiquitous Computing Classes." In XXVIII Simpósio Brasileiro de Informática na Educação - SBIE (Brazilian Symposium on Computers in Education). Brazilian Computer Society (Sociedade Brasileira de Computação - SBC), 2017. http://dx.doi.org/10.5753/cbie.sbie.2017.364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Horva´th, Imre, Zolta´n Rusa´k, Eliab Z. Opiyo, and Adrie Kooijman. "Towards Ubiquitous Design Support." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87573.

Full text
Abstract:
Efficient computer support of product innovation processes has become an important issue of industrial competitiveness in the last forty years. As a consequence, there has been a growing demand for new computer-based tools and system. Various hardware, software and knowledge technologies have been used over the years as the basis of design support systems. With the appearance of network technologies, the conventional standalone workstation paradigm has been replaced by the paradigm of web-interconnected collaborative environments. Currently, the emerging and rapidly proliferating mobile and ubiquitous computing technologies create a technological push again. These technologies force us to reconsider not only the digital information processing devices and their interconnection, but also the way of obtaining, processing and communicating product design information. Many researches and laboratories are engaged with the development of novel concepts, architectures, tools and methods for next-generation design support environments. They will integrate many resources of the current collaborative design environments with pervasive computing functionality and large-scale mobility in a volatile manner. Part of the design support tools will have fixed location, but will be remotely accessible through wireless networks. Other part of the tools will be moving with the designers as portable, embedded, wearable and transferable devices, and will feature ad hoc connectivity. These not only offer new ways for aggregation, processing and presentation of design information, but also enable alternative ways of completing design activities. Our current research concentrates on three interrelated main issues: (i) studying workflow scenarios for future design support environment, (ii) investigation and integration of multiple technologies into an ad hoc interconnected heterogeneous infrastructure, and (iii) exploring efficient methods for utilizing new affordances in supporting product innovation. In this paper we report on the results of our recent technology study that analyzed the current results and trends of ubiquitous technology development, and tried to form a vision about the possible manifestation of future ubiquitous design support environments. Essentially, they have been conceptualized as ad hoc and volatile networks of fixed and mobile information collection, processing and communication units. This network functions as a complex service provider system, with special attention to the on-demand information management in the fuzzy front end of design projects.
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Su, Jo Chong, Byoung Jung, Min Kang, and Dan Sung. "Energy-Aware Communication Module Selection through ZigBee Paging for Ubiquitous Wearable Computers with Multiple Radio Interfaces." In 2007 2nd International Symposium on Wireless Pervasive Computing. IEEE, 2007. http://dx.doi.org/10.1109/iswpc.2007.342570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Adepu, Sushma, and Rachel F. Adler. "A comparison of performance and preference on mobile devices vs. desktop computers." In 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2016. http://dx.doi.org/10.1109/uemcon.2016.7777808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Matthews, Suzanne J., and Aaron St Leger. "Leveraging single board computers for anomaly detection in the smart grid." In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON). IEEE, 2017. http://dx.doi.org/10.1109/uemcon.2017.8249031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Anderl, Reiner, and Orkun Yaman. "Architecture for the Integration of High Performance Computing Applications in PLM." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-35185.

Full text
Abstract:
High Performance Computing (HPC) has become ubiquitous for simulations in the industrial context. To identify the requirements for integration of HPC-relevant data and processes a survey has been conducted concerning the German car manufacturers and service and component suppliers. This contribution presents the results of the evaluation and suggests an architecture concept to integrate data and workflows related with CAE and HPC-facilities in PLM. It describes the state of the art of HPC-applications within the simulation domain. Intensive efforts are currently invested on CAE-data management. However, an approach to systematic data management of HPC does not exist. This study states importance of an integrating approach for data management of HPC-applications and develops an architectural framework to implement HPC-data management into the existing PLM landscape. Requirements on key functionalities and interfaces are defined as well as a framework for a reference information model is conceptualized.
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Xiao, Qinke Peng, and Libin Han. "A Data Parallel Strategy for Haplotype Assembly Problem on Multi-core Computers." In 2013 IEEE International Conference on High Performance Computing and Communications (HPCC) & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (EUC). IEEE, 2013. http://dx.doi.org/10.1109/hpcc.and.euc.2013.203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography