Dissertations / Theses on the topic 'Ubiquitous computing. Computers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Ubiquitous computing. Computers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Schmidt, Albrecht. "Ubiquitous computing : computing in context." Thesis, Lancaster University, 2003. http://eprints.lancs.ac.uk/12221/.
Full textTennent, Paul R. "Augmented analyses : supporting the study of ubiquitous computing systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5307/.
Full textChalmers, Kevin. "Investigating communicating sequential processes for Java to support ubiquitous computing." Thesis, Edinburgh Napier University, 2009. http://researchrepository.napier.ac.uk/Output/3507.
Full textWarshawsky, James Emory. "Umbilical Cord: A system for ubiquitous computing." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2518.
Full textNguyen, Tammy. "Context-aware access control in pervasive computing environments." Online access for everyone, 2005. http://www.dissertations.wsu.edu/Thesis/Summer2005/t%5Fnguyen%5F061005.pdf.
Full textDhomeja, Lachhman Das. "Supporting policy-based contextual reconfiguration and adaptation in ubiquitous computing." Thesis, University of Sussex, 2011. http://sro.sussex.ac.uk/id/eprint/6933/.
Full textZhou, Bo. "SUIDS : a resource-efficient intrusion detection system for ubiquitous computing environments." Thesis, Liverpool John Moores University, 2007. http://researchonline.ljmu.ac.uk/5813/.
Full textSmith, Lisa Min-yi Chen. "Display computers." Texas A&M University, 2006. http://hdl.handle.net/1969.1/3829.
Full textMalkani, Yasir Arfat. "A proof-of-proximity framework for device pairing in ubiquitous computing environments." Thesis, University of Sussex, 2011. http://sro.sussex.ac.uk/id/eprint/6307/.
Full textKu, Azir Ku Nurul Fazira. "Human factors of ubiquitous computing : ambient cueing in the digital kitchen?" Thesis, University of Birmingham, 2014. http://etheses.bham.ac.uk//id/eprint/5518/.
Full textSiu, Po-lam Pauline. "Context-aware state management for supporting mobility in a pervasive environment." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B3147858X.
Full textSpiekermann, Sarah. "User control in ubiquitous computing : design alternatives and user acceptance /." Aachen : Shaker, 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017994540&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textSiu, Po-lam Pauline, and 蕭寶琳. "Context-aware state management for supporting mobility in a pervasive environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B3147858X.
Full textHall, Malcolm. "Contextual mobile adaptation." Thesis, Connect to e-thesis, 2008. http://theses.gla.ac.uk/240/.
Full textPh.D. thesis submitted to the Faculty of Information and Mathematical Sciences, Department of Computing Science, University of Glasgow, 2008. Includes bibliographical references. Print version also available.
Schott, Thomas Jerome. "Rural Virginia Middle School Teachers\' and Students\' Perceptions on the Influence of One-to-one Computers in the Classroom." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/49552.
Full textThe purpose of this study was to examine the perceptions of middle school teachers and students, in a select rural Virginia middle school, on the effect that one-to-one computing had on the frequency and type of instruction that is taking place in the core areas of English, math, science, and social studies. The study also looked at the teachers\' and students\' perceived effect on the educational performance of individual subgroups. A quantitative analysis was done using an electronic survey, which provided information on the perceived frequency and type of educational activities using one-to-one computers and the perceived effect one-to-one computing had on the educational performance of different subgroups. Questions on the survey were developed by correlating the theoretical ideas of Bloom\'s taxonomy / Bloom\'s web 2.0 technology pyramids and then categorizing the questions so the complexity of the questions could be looked at on the range of use chart. The research found, of the students surveyed, 90% of English students, 78% of math students, 75% of science students, and 77% of social studies students found the computers to have a positive effect on their academic performance. Therefore, one major finding of this study was that students\' perceptions of the overall effect of one-to-one computers were positive.
Ed. D.
Kocaballi, Ahmet Baki. "Weighted Granular Best Matching Algorithm For Context-aware Computing Systems." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12605825/index.pdf.
Full textContext-Aware Personal Reminder Agent tool to show the applicability of the new context matching algorithm. The obtained outputs showed that proposed algorithm produces the results which are more sensitive to the user&rsquo
s intention, more adaptive to the characteristics of the contextual information and applicable to a current Context-aware system.
Pinkerton, Michael David. "Ubiquitous computing : extending access to mobile data." Thesis, Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/8242.
Full textSong, Xiang. "Seamless mobility in ubiquitous computing environments." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24671.
Full textCommittee Chair: Ramachandran, Umakishore; Committee Member: Ahamad, Mustaque; Committee Member: Edwards, Keith; Committee Member: Liu, Ling; Committee Member: Suh, Sang-bum
Müller-Tomfelde, Christian. "Soundswork - akustische Repräsentationen für die Mensch-Computer-Interaktion in kooperativen und hybriden Arbeitsumgebungen." [S.l. : s.n.], 2003. http://elib.tu-darmstadt.de/diss/000313.
Full textLiu, Yong. "Service discovery in an open ubiquitous computing environment." [Bloomington, Ind.] : Indiana University, 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3386698.
Full textTitle from PDF t.p. (viewed on Jul 22, 2010). Source: Dissertation Abstracts International, Volume: 70-12, Section: B, page: 7673. Adviser: Kay Connelly.
Wang, Kaining. "Context-based coalition access control for ubiquitous computing." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27193.
Full textTan, Chiu Chiang. "Secure and efficient data extraction for ubiquitous computing applications." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623571.
Full textLiu, Huanjin. "Free roaming: A system for ubiquitous computing." CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/3062.
Full textLiljedahl, Anders. "Evaluation of Multi-Agent Platforms for Ubiquitous Computing." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4540.
Full textUbiquitous Computing kan beskrivas som det 3:e steget i datorns utveckling där varje användare omges med många "datorer". Denna uppsats tillhandahåller en utvärdering av multi-agent platformar för att undersöka deras lämplighet inom Ubiquitous Computing
Pietzowski, Andreas. "Selbstschutz in Organic- und Ubiquitous-Middleware-Systemen unter Verwendung von Computer-Immunologie." kostenfrei kostenfrei, 2008. http://d-nb.info/991492307/34.
Full textDragoi, Octavian Andrei. "The Continuum Architecture: Towards Enabling Chaotic Ubiquitous Computing." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1158.
Full textBaloch, Raheel Ali. "Context dependency analysis in ubiquitous computing." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00714129.
Full textCovington, Michael J. "A flexible security architecture for pervasive computing environments." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-06072004-131113/unrestricted/covington%5Fmichael%5Fj%5F200405%5Fphd.pdf.
Full textJayabharath, Kumar Suri. "Sensor systems for positioning and identification in ubiquitous computing." Thesis, Linköping University, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5767.
Full textTechnologies for position sensing and identification are important to have in ubiquitous computing environments. These technologies can be used to track users, devices, and artefacts in the physical milieu, for example, locating the position of a cellular phone in av physical environment. The aim of this thesis was to survey and classify available technologies for location sensing and identification.
We have made a literature study on both commercial and research-oriented systems and technologies for use in indoor and outdoor environments. We compared the characteristics of the underlying sensing technologies with respect to physical size, sensing method, cost, and accuracy. We conclude the thesis with a set of recommendations to developers and discuss the requirements on future sensing technologies and their use in mobile devices and environments.
Elahi, Haroon. "Cooperation and Integration:Do we need them in Ubiquitous Computing Design?" Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5659.
Full text26 Helsingorsgatan 16 444 Kista Phone: 0046 73 632 3670
Benedicto, Kathryn Flores 1977. "Regions : a scalable infrastructure for scoped service location in ubiquitous computing." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80038.
Full textIncludes bibliographical references (leaves 108-109).
by Kathryn Flores Benedicto.
S.B.and M.Eng.
Heckmann, Dominikus. "Ubiquitous user modeling /." Berlin : Akad. Verl.-Ges. Aka, 2006. http://deposit.d-nb.de/cgi-bin/dokserv?id=2860787&prov=M&dok_var=1&dok_ext=htm.
Full textGrimm, Robert. "System support for pervasive applications /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/6972.
Full textKrishna, Renan. "Constructing runtime models with bigraphs to address ubiquitous computing service composition volatility." Thesis, University of Sussex, 2015. http://sro.sussex.ac.uk/id/eprint/54282/.
Full textO'Keeffe, Daniel Brendan. "Distributed complex event detection for pervasive computing." Thesis, University of Cambridge, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609012.
Full textIngmarsson, Magnus. "Modelling User Tasks and Intentions for Service Discovery in Ubiquitous Computing." Licentiate thesis, Linköping University, Linköping University, MDA - Human Computer Interfaces, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8319.
Full textUbiquitous computing (Ubicomp) increases in proliferation. Multiple and ever growing in numbers, computational devices are now at the users' disposal throughout the physical environment, while simultaneously being effectively invisible. Consequently, a significant challenge is service discovery. Services may for instance be physical, such as printing a document, or virtual, such as communicating information. The existing solutions, such as Bluetooth and UPnP, address part of the issue, specifically low-level physical interconnectivity. Still absent are solutions for high-level challenges, such as connecting users with appropriate services. In order to provide appropriate service offerings, service discovery in Ubicomp must take the users' context, tasks, goals, intentions, and available resources into consideration. It is possible to divide the high-level service-discovery issue into two parts; inadequate service models, and insufficient common-sense models of human activities.
This thesis contributes to service discovery in Ubicomp, by arguing that in order to meet these high-level challenges, a new layer is required. Furthermore, the thesis presents a prototype implementation of this new service-discovery architecture and model. The architecture consists of hardware, ontology-layer, and common-sense-layer. This work addresses the ontology and common-sense layers. Subsequently, implementation is divided into two parts; Oden and Magubi. Oden addresses the issue of inadequate service models through a combination of service-ontologies in concert with logical reasoning engines, and Magubi addresses the issue of insufficient common-sense models of human activities, by using common sense models in combination with rule engines. The synthesis of these two stages enables the system to reason about services, devices, and user expectations, as well as to make suitable connections to satisfy the users' overall goal.
Designing common-sense models and service ontologies for a Ubicomp environment is a non-trivial task. Despite this, we believe that if correctly done, it might be possible to reuse at least part of the knowledge in different situations. With the ability to reason about services and human activities it is possible to decide if, how, and where to present the services to the users. The solution is intended to off-load users in diverse Ubicomp environments as well as provide a more relevant service discovery.
Report code: LiU-Tek-Lic-2007:14.
Mamykina, Lena. "Designing ubiquitous computing for reflection and learning in diabetes management." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28093.
Full textCommittee Chair: Elizabeth D. Mynatt; Committee Member: Abowd, Gregory; Committee Member: Bruckman, Amy; Committee Member: Dourish, Paul; Committee Member: Nersessian, Nancy.
Lu, Heng. "A software testing framework for context-aware applications in pervasive computing." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B41758067.
Full textCurry, D. Bruce. "Developing a Wider View of Educational Technology Through Ubiquitous Computing: A Qualitative Case Study." NSUWorks, 2003. http://nsuworks.nova.edu/gscis_etd/475.
Full textTandler, Peter. "Synchronous collaboration in the age of ubiquitous computing requirements, application models, software architecture." Saarbrücken VDM Verlag Dr. Müller, 2004. http://d-nb.info/989592812/04.
Full textLu, Heng, and 陸恒. "A software testing framework for context-aware applications in pervasive computing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B41758067.
Full textWu, Fan. "Ubiquitous Scalable Graphics: An End-to-End Framework using Wavelets." Worcester, Mass. : Worcester Polytechnic Institute, 2008. http://www.wpi.edu/Pubs/ETD/Available/etd-111908-165451/.
Full textKeywords: Energy Consumption; Perceptual Error Metric; Multiresolution; Wavelets; Mobile Graphics. Includes bibliographical references (p. 109-124).
Delwadia, Vipul. "RemoteME : experiments in thin-client mobile computing : a thesis submitted to the Victoria University of Wellington in fulfilment of the requirements for the degree of Master of Science in Computer Science /." ResearchArchive@Victoria e-Thesis, 2009. http://hdl.handle.net/10063/1260.
Full textFang, Ji, and 方骥. "Development of ubiquitous manufacturing platform with event-driven smart gateway." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B49799587.
Full textpublished_or_final_version
Industrial and Manufacturing Systems Engineering
Doctoral
Doctor of Philosophy
Pour, Shiva Abdi Farzaneh. "User Identification Roadmap towards 2020 : A study of personal identification challenges for ubiquitous computing world." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3485.
Full textThis thesis starts with thinking about the problems of the today’s identification; why we need to carry dozens of different magnetic cards, bunches of keys, or memorizing many digital pins and pass code? To do the study, I observed people at shopping and traveling to find out what and how people interact with tools, what are their behaviors, experiences, or reactions when they need to approve their identity. and what problems they encounter. Informal discussion with designers was the next step of empirical study. The analysis over collected data guided us into problems in today’s identifications: ‘Foreground activity’, ‘Diversity of tools and interactions’, ‘security’, ‘trust’ and ‘being economical’. Last section of the thesis is the investigating on current designs; RFID can be good solution for pervasive identification if the security and privacy of people respected. Mobile will be an inevitable part of every design in future. However, mobile phone designers should think about diversity of interface layouts that may be a barrier for unified identification interactions. Biometrics also seems the inevitable part of future of identification. Apart from technology, social engagement and supports, especially in terms of privacy is one of the most noticeable concerns. Information forensics, and level of awareness should be specified before the benefits of pervasive identifications threaten people’s privacies.
Caon, Maurizio. "Context-aware gestural interaction in the smart environments of the ubiquitous computing era." Thesis, University of Bedfordshire, 2014. http://hdl.handle.net/10547/344619.
Full textRendo, Fernandez Jose Ignacio. "Semantic interoperability in ad-hoc computing environments." Thesis, Loughborough University, 2007. https://dspace.lboro.ac.uk/2134/3072.
Full textJansen, Erwin. "Context-driven programming model for pervasive spaces." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0013044.
Full textCavdar, Davut. "A Certificate Based Authentication Control Model Using Smart Mobile Devices For Ubiquitous Computing Environments." Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613682/index.pdf.
Full textSylverberg, Tomas. "A Framework for Mobile Paper-based Computing." Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8415.
Full textMilitary work-practice is a difficult area of research where paper-based approaches are still extended. This thesis proposes a solution which permits the digitalization of information at the same time as workpractice remains unaltered for soldiers working with maps in the field. For this purpose, a mobile interactive paper-based platform has been developed which permits the users to maintain their current work-flow. The premise of the solution parts from a system consisting of a prepared paper-map, a cellular phone, a desktop computer, and a digital pen with bluetooth connection. The underlying idea is to permit soldiers to take advantage of the information a computerized system can offer, at the same time as the overhead it incurs is minimized. On one hand this implies that the solution must be light-weight, on the other it must retain current working procedures as far as possible. The desktop computer is used to develop new paper-driven applications through the application provided in the development framework, thus allowing the tailoring of applications to the changing needs of military operations. One major component in the application suite is a symbol recognizer which is capable of recognizing symbols parting from a template which can be created in one of the applications. This component permits the digitalization of information in the battlefield by drawing on the paper-map. The proposed solution has been found to be viable, but still there is a need for further development. Furthermore, there is a need to adapt the existing hardware to the requirements of the military to make it usable in a real-world situation.