Journal articles on the topic 'Ubiquitous Computing Environments'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Ubiquitous Computing Environments.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Barbosa, Jorge Luis Victória, Débora Nice Ferrari Barbosa, and André Wagner. "Learning in Ubiquitous Computing Environments." International Journal of Information and Communication Technology Education 8, no. 3 (July 2012): 64–77. http://dx.doi.org/10.4018/jicte.2012070108.
Full textSATOH, I. "Mobile Applications in Ubiquitous Computing Environments." IEICE Transactions on Communications E88-B, no. 3 (March 1, 2005): 1026–33. http://dx.doi.org/10.1093/ietcom/e88-b.3.1026.
Full textPark, Min-Ho, Ju-Hyung Son, and Seung-Woo Seo. "Anonymous Communication in Ubiquitous Computing Environments." Wireless Personal Communications 56, no. 1 (November 28, 2009): 21–36. http://dx.doi.org/10.1007/s11277-009-9884-z.
Full textAl-Roubaiey, Anas, and M. AL-Rhman Alkhiaty. "QoS-Aware Middleware for Ubiquitous Environment: A Review and Proposed Solution." Journal of Computational Engineering 2014 (March 19, 2014): 1–7. http://dx.doi.org/10.1155/2014/725960.
Full textSatoh, Ichiro. "Location-based services in ubiquitous computing environments." International Journal on Digital Libraries 6, no. 3 (April 7, 2006): 280–91. http://dx.doi.org/10.1007/s00799-006-0006-1.
Full textPark, Kyung-Lang, Uram H. Yoon, and Shin-Dug Kim. "Personalized Service Discovery in Ubiquitous Computing Environments." IEEE Pervasive Computing 8, no. 1 (January 2009): 58–65. http://dx.doi.org/10.1109/mprv.2009.12.
Full textAbawajy, J. H. "Human‐computer interaction in ubiquitous computing environments." International Journal of Pervasive Computing and Communications 5, no. 1 (April 3, 2009): 61–77. http://dx.doi.org/10.1108/17427370910950311.
Full textHansen, Kai. "Designing responsive environments through User Experience research." International Journal of Architectural Computing 14, no. 4 (September 26, 2016): 372–85. http://dx.doi.org/10.1177/1478077116670745.
Full textMoon, Aekyung, Hyoungsun Kim, Hyun Kim, and Soowoo Lee. "Context-Aware Active Services in Ubiquitous Computing Environments." ETRI Journal 29, no. 2 (April 9, 2007): 169–78. http://dx.doi.org/10.4218/etrij.07.0106.0075.
Full textTacconi, David, Daniele Miorandi, Iacopo Carreras, Francesco De Pellegrini, and Imrich Chlamtac. "Cooperative evolution of services in ubiquitous computing environments." ACM Transactions on Autonomous and Adaptive Systems 6, no. 3 (September 2011): 1–24. http://dx.doi.org/10.1145/2019583.2019587.
Full textEl-Khatib, K., Zhen E. Zhang, N. Hadibi, and G. v. Bochmann. "Personal and service mobility in ubiquitous computing environments." Wireless Communications and Mobile Computing 4, no. 6 (September 2004): 595–607. http://dx.doi.org/10.1002/wcm.231.
Full textSchmidt, A., F. Alt, D. Wilhelm, J. Niggemann, and H. Feussner. "Experimenting with ubiquitous computing technologies in productive environments." e & i Elektrotechnik und Informationstechnik 123, no. 4 (April 2006): 135–39. http://dx.doi.org/10.1007/s00502-006-0328.
Full textZhang, Daqiang, Zhijun Yang, Hongyu Huang, and Qin Zou. "Decentralized Checking Context Inconsistency in Ubiquitous Mobile Computing Environments." Physics Procedia 25 (2012): 700–707. http://dx.doi.org/10.1016/j.phpro.2012.03.146.
Full textCousins, Karlene C., and Upkar Varshney. "Designing ubiquitous computing environments to support work life balance." Communications of the ACM 52, no. 5 (May 2009): 117–23. http://dx.doi.org/10.1145/1506409.1506438.
Full textJessup, Leonard M., and Daniel Robey. "The relevance of social issues in ubiquitous computing environments." Communications of the ACM 45, no. 12 (December 2002): 88–91. http://dx.doi.org/10.1145/585597.585621.
Full textChang, Chin-Chen, Iuon-Chang Lin, and Chia-Chi Wu. "A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments." Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/934716.
Full textSilva, José Luís, José Creissac Campos, and Michael D. Harrison. "Prototyping and analysing ubiquitous computing environments using multiple layers." International Journal of Human-Computer Studies 72, no. 5 (May 2014): 488–506. http://dx.doi.org/10.1016/j.ijhcs.2014.02.001.
Full textAl-Muhtadi, Jalal, Raquel Hill, and Sumayah Al-Rwais. "Access control using threshold cryptography for ubiquitous computing environments." Journal of King Saud University - Computer and Information Sciences 23, no. 2 (July 2011): 71–78. http://dx.doi.org/10.1016/j.jksuci.2011.05.003.
Full textLiu, Jinshan, and Valérie Issarny. "An incentive compatible reputation mechanism for ubiquitous computing environments." International Journal of Information Security 6, no. 5 (June 29, 2007): 297–311. http://dx.doi.org/10.1007/s10207-007-0029-7.
Full textLyytinen, Kalle, and Youngjin Yoo. "Designing and implementing effectively high impact ubiquitous computing environments." Information Systems and e-Business Management 4, no. 4 (March 29, 2006): 395–97. http://dx.doi.org/10.1007/s10257-005-0001-x.
Full textNakata, Keiichi, and Stuart Moran. "A Semiotic Analysis of a Model for Understanding User Behaviours in Ubiquitously Monitored Environments." International Journal of Information Systems and Social Change 2, no. 3 (July 2011): 36–47. http://dx.doi.org/10.4018/jissc.2011070103.
Full textEl Khaddar, Mehdia Ajana, Mhammed Chraibi, Hamid Harroud, Mohammed Boulmalf, Mohammed Elkoutbi, and Abdelilah Maach. "A policy-based middleware for context-aware pervasive computing." International Journal of Pervasive Computing and Communications 11, no. 1 (April 7, 2015): 43–68. http://dx.doi.org/10.1108/ijpcc-07-2014-0039.
Full textAndersson, Magnus, and Rikard Lindgren. "Inscribing Interpretive Flexibility of Context Data in Ubiquitous Computing Environments." International Journal of Advanced Pervasive and Ubiquitous Computing 1, no. 2 (April 2009): 1–18. http://dx.doi.org/10.4018/japuc.2009040101.
Full textMalkani, Yasir Arfat. "A Generic Framework for Device Pairing in Ubiquitous Computing Environments." International Journal of Network Security & Its Applications 4, no. 2 (March 31, 2012): 1–20. http://dx.doi.org/10.5121/ijnsa.2012.4201.
Full textYAMADA, S. "Access Control for Security and Privacy in Ubiquitous Computing Environments." IEICE Transactions on Communications E88-B, no. 3 (March 1, 2005): 846–56. http://dx.doi.org/10.1093/ietcom/e88-b.3.846.
Full textMowafi, Yaser A., and Guisseppi Forgionne. "Determining Decision Values of Context Awareness in Ubiquitous Computing Environments." Journal of Multi-Criteria Decision Analysis 18, no. 3-4 (May 2011): 203–18. http://dx.doi.org/10.1002/mcda.466.
Full textAnderson, Christoph, Isabel Hübener, Ann-Kathrin Seipp, Sandra Ohly, Klaus David, and Veljko Pejovic. "A Survey of Attention Management Systems in Ubiquitous Computing Environments." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, no. 2 (July 5, 2018): 1–27. http://dx.doi.org/10.1145/3214261.
Full textFriday, Adrian, Nigel Davies, Nat Wallbank, Elaine Catterall, and Stephen Pink. "Supporting Service Discovery, Querying and Interaction in Ubiquitous Computing Environments." Wireless Networks 10, no. 6 (November 2004): 631–41. http://dx.doi.org/10.1023/b:wine.0000044024.54833.cb.
Full textOgiela, Marek R., Aniello Castiglione, and Ilsun You. "Soft computing for security services in smart and ubiquitous environments." Soft Computing 18, no. 9 (August 7, 2014): 1655–58. http://dx.doi.org/10.1007/s00500-014-1380-z.
Full textYou, Ilsun, Marek R. Ogiela, Yuh-Shyan Chen, and Qingfeng Huang. "Mobile and internet services in ubiquitous and pervasive computing environments." Information Sciences 230 (May 2013): 1–2. http://dx.doi.org/10.1016/j.ins.2013.01.026.
Full textKrüger, Antonio, Albrecht Schmidt, and Jörg Müller. "Technological and Research Perspectives of Old-Age Ubiquitous Computing." GeroPsych 23, no. 2 (June 2010): 99–105. http://dx.doi.org/10.1024/1662-9647/a000012.
Full textJoshi, Anupam, Tim Finin, Lalana Kagal, Jim Parker, and Anand Patwardhan. "Security policies and trust in ubiquitous computing." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366, no. 1881 (July 31, 2008): 3769–80. http://dx.doi.org/10.1098/rsta.2008.0142.
Full textG.S., Thyagaraju, and U. P. Kulkarni. "Algorithms to Resolve Conflict in Multiuser Context Aware Ubiquitous Environment." International Journal of Advanced Pervasive and Ubiquitous Computing 4, no. 3 (July 2012): 42–62. http://dx.doi.org/10.4018/japuc.2012070103.
Full textLee, Jaeseung, Yunsick Sung, and Jong Park. "Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments." Sensors 16, no. 12 (December 1, 2016): 2044. http://dx.doi.org/10.3390/s16122044.
Full textKIM, Jangseong, Joonsang BAEK, Jianying ZHOU, and Taeshik SHON. "An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments." IEICE Transactions on Information and Systems E95-D, no. 1 (2012): 117–25. http://dx.doi.org/10.1587/transinf.e95.d.117.
Full textRosales, Ricardo, Donald Rodriguez, Dora-Luz Flores, Luis Palafox, Manuel Castanon-Puga, and Carelia Gaxiola-Pacheco. "Model of Interaction Among Embedded Fuzzy Agents in Ubiquitous Computing Environments." International Journal for Infonomics Special 1, no. 1 (March 1, 2013): 806–10. http://dx.doi.org/10.20533/iji.1742.4712.2013.0095.
Full textKang, Saehoon, Daewong Kim, Younghee Lee, Soon J. Hyun, Dongman Lee, and Ben Lee. "A Semantic Service Discovery Network for Large-Scale Ubiquitous Computing Environments." ETRI Journal 29, no. 5 (October 9, 2007): 545–58. http://dx.doi.org/10.4218/etrij.07.0106.0281.
Full textYakin, Ilker, and Ayse Gunay. "Selection of Ubiquitous Computing Technologies and Environments as Performance Improvement Interventions." Ubiquitous Learning: An International Journal 6, no. 2 (2014): 1–13. http://dx.doi.org/10.18848/1835-9795/cgp/v06i02/40390.
Full textChoi, Jong-Sun, Jae-Young Choi, and Yong-Yun Cho. "A Layered Architecture for Robot Automated Services on Ubiquitous Computing Environments." Journal of Korea Robotics Society 6, no. 4 (November 30, 2011): 353–64. http://dx.doi.org/10.7746/jkros.2011.6.4.353.
Full textCai, Haibin, Fang Pu, Runcai Huang, and Qiying Cao. "A novel ANN-based service selection model for ubiquitous computing environments." Journal of Network and Computer Applications 31, no. 4 (November 2008): 944–65. http://dx.doi.org/10.1016/j.jnca.2007.01.004.
Full textKim, Kyung-Il, Taegu Kim, Nam-Wook Cho, and Minsoo Kim. "Toll Fraud Detection of VoIP Service Networks in Ubiquitous Computing Environments." International Journal of Distributed Sensor Networks 11, no. 9 (January 2015): 276408. http://dx.doi.org/10.1155/2015/276408.
Full textZapater, Marina, Cesar Sanchez, Jose L. Ayala, Jose M. Moya, and José L. Risco-Martín. "Ubiquitous Green Computing Techniques for High Demand Applications in Smart Environments." Sensors 12, no. 8 (August 3, 2012): 10659–77. http://dx.doi.org/10.3390/s120810659.
Full textPark, Yoosang, Yongseong Cho, Jongsun Choi, and Jaeyoung Choi. "A Context Classification for Collecting Situational Information on Ubiquitous Computing Environments." KIISE Transactions on Computing Practices 22, no. 8 (August 15, 2016): 387–92. http://dx.doi.org/10.5626/ktcp.2016.22.8.387.
Full textSatoh, Ichiro. "SpatialAgents: integrating user mobility and program mobility in ubiquitous computing environments." Wireless Communications and Mobile Computing 3, no. 4 (2003): 411–23. http://dx.doi.org/10.1002/wcm.126.
Full textKIM, J. g., G. S. KIM, and Y. I. EOM. "Design of the Mobile Agent Anonymity Framework in Ubiquitous Computing Environments." IEICE Transactions on Information and Systems E89-D, no. 12 (December 1, 2006): 2990–93. http://dx.doi.org/10.1093/ietisy/e89-d.12.2990.
Full textKim, Jung-Eun, Junghee Han, and Chang-Gun Lee. "Optimal 3-Coverage with Minimum Separation Requirements for Ubiquitous Computing Environments." Mobile Networks and Applications 14, no. 5 (December 9, 2008): 556–70. http://dx.doi.org/10.1007/s11036-008-0122-9.
Full textBoukerche, Azzedine, and Yonglin Ren. "A trust-based security system for ubiquitous and pervasive computing environments." Computer Communications 31, no. 18 (December 2008): 4343–51. http://dx.doi.org/10.1016/j.comcom.2008.05.007.
Full textLouta, Malamati, Angelos Michalas, Ioannis Anagnostoupoulos, and Dimitrios Vergados. "Trust management framework for intelligent agent negotiations in ubiquitous computing environments." Telecommunication Systems 41, no. 2 (April 23, 2009): 141–57. http://dx.doi.org/10.1007/s11235-009-9155-z.
Full textSarivougioukas, John, Aristides Vagelatos, and Isaac Lagaris. "Administration of Medical Contexts with Denotational Mathematics in Ubiquitous Computing Home Environments." International Journal of Software Science and Computational Intelligence 7, no. 2 (April 2015): 1–30. http://dx.doi.org/10.4018/ijssci.2015040101.
Full textIbrahim, Ismail Khalil. "Norms for Modeling Agents' Interaction in Ubiquitous Environments." Mobile Information Systems 4, no. 1 (2008): 69–76. http://dx.doi.org/10.1155/2008/960375.
Full text