What makes for good application- led research in ubiquitous computing?
暂无分享,去创建一个
Bernt Schiele | George Coulouris | Kasim Rehman | Darmstadt Albrecht Schmidt | B. Schiele | G. Coulouris | K. Rehman
[1] Bernt Schiele,et al. Design, Implementation and Testing of a Wearable Sensing System for Professional Downhill Skiing in Cooperation with Trainers , 2005 .
[2] Frederick P. Brooks. The Mythical Man-Month: After 20 years , 1995, IEEE Software.
[3] Andrew L. Kun,et al. Computers in police cruisers , 2004, IEEE Pervasive Computing.
[4] Anind K. Dey,et al. Heuristic evaluation of ambient displays , 2003, CHI '03.
[5] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[6] Jesper Kjeldskov,et al. Is It Worth the Hassle? Exploring the Added Value of Evaluating the Usability of Context-Aware Mobile Systems in the Field , 2004, Mobile HCI.
[7] Susan R. Fussell,et al. The book as user interface: lowering the entry cost to email for elders , 2005, CHI EA '05.
[8] Anoop K. Sinha,et al. Suede: a Wizard of Oz prototyping tool for speech user interfaces , 2000, UIST '00.
[9] Gregory D. Abowd,et al. The context toolkit: aiding the development of context-enabled applications , 1999, CHI '99.
[10] Gordon S. Blair,et al. Developing a Context Sensitive Tourist Guide , 1998 .
[11] Anoop K. Sinha,et al. Multimodal theater: extending low fidelity paper prototyping to multimodal applications , 2002, CHI Extended Abstracts.
[12] A Sattineni,et al. A Case Study: Using the Wearable Computer in the Construction Industry , 2002 .
[13] Hiroshi Ishii,et al. The metaDESK: models and prototypes for tangible user interfaces , 1997, UIST '97.
[14] Morten Kyng,et al. Design at Work , 1992 .
[15] Laurent Ciarletta,et al. Using Intelligent Agents to assess Pervasive Computing Technologies , 2001 .
[16] Karen Holtzblatt,et al. Contextual design , 1997, INTR.
[17] Keith Cheverst,et al. Developing a context-aware electronic tourist guide: some issues and experiences , 2000, CHI.
[18] David Garlan,et al. Project Aura: Toward Distraction-Free Pervasive Computing , 2002, IEEE Pervasive Comput..
[19] Christian Heath,et al. Mobility in collaboration , 1998, CSCW '98.
[20] Mark Weiser,et al. Designing Calm Technology , 2004 .
[21] Mark Weiser. How computers will be used differently in the next twenty years , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[22] David R. Karger,et al. Wide-area cooperative storage with CFS , 2001, SOSP.
[23] Richard Sharp,et al. Using visual tags to bypass Bluetooth device discovery , 2005, MOCO.
[24] Keith Cheverst,et al. Experiences of developing and deploying a context-aware tourist guide: the GUIDE project , 2000, MobiCom '00.
[25] David Garlan,et al. Toward Distraction-Free Pervasive Computing , 2002 .
[26] Barry W. Boehm,et al. A spiral model of software development and enhancement , 1986, Computer.
[27] Sean W. Smith,et al. Grand challenges in information security: process and output , 2004, IEEE Security & Privacy Magazine.
[28] Albrecht Schmidt,et al. Applying wearable sensors to avalanche rescue , 2003, Comput. Graph..
[29] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[30] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[31] Golden G. Richard,et al. Physically Locating Wireless Intruders , 2004, ITCC.
[32] Jakob E. Bardram,et al. Applications of context-aware computing in hospital work: examples and design principles , 2004, SAC '04.
[33] R. Ascherl,et al. Rapid Prototyping , 1997, IEEE Robotics & Automation Magazine.
[34] John J. Barton,et al. UBIWISE, A Simulator for Ubiquitous Computing Systems Design , 2003 .
[35] Yang Li,et al. Topiary: a tool for prototyping location-enhanced applications , 2004, UIST '04.
[36] I. Lakatos. History of Science and Its Rational Reconstructions , 1970, PSA: Proceedings of the Biennial Meeting of the Philosophy of Science Association.
[37] Arne Jönsson,et al. Wizard of Oz studies: why and how , 1993, IUI '93.
[38] Tim Kindberg. Implementing physical hyperlinks using ubiquitous identifier resolution , 2002, WWW '02.
[39] Fan Yang,et al. Conventions in human-human multi-threaded dialogues: a preliminary study , 2005, IUI '05.
[40] Egon Börger,et al. The ASM Ground Model Method as a Foundation for Requirements Engineering , 2003, Verification: Theory and Practice.
[41] Sharon L. Oviatt,et al. A rapid semi-automatic simulation technique for investigating interactive speech and handwriting , 1992, ICSLP.
[42] Gregory D. Abowd,et al. Rapid prototyping of mobile context-aware applications: the Cyberguide case study , 1996, MobiCom '96.
[43] Bill N. Schilit,et al. Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.
[44] Christine Reid,et al. The Myth of the Paperless Office , 2003, J. Documentation.
[45] M. A. Smith,et al. Object auras: a mobile retail and product annotation system , 2004, EC '04.
[46] Andy Hopper,et al. A new location technique for the active office , 1997, IEEE Wirel. Commun..
[47] Albrecht Schmidt,et al. Building intelligent environments with Smart-Its , 2004, IEEE Computer Graphics and Applications.
[48] Kent L. Beck,et al. Extreme programming explained - embrace change , 1990 .
[49] Allen Newell,et al. The psychology of human-computer interaction , 1983 .
[50] Jakob Nielsen,et al. User involvement in the design process: why, when & how? , 1993, INTERCHI.
[51] James A. Landay,et al. An Infrastructure Approach to Context-Aware Computing , 2001, Hum. Comput. Interact..
[52] Fredrik Espinoza,et al. GeoNotes: Social and Navigational Aspects of Location-Based Information Systems , 2001, UbiComp.
[53] Scott R. Klemmer,et al. Papier-Mache: toolkit support for tangible input , 2004, CHI.
[54] Gregory D. Abowd,et al. The Aware Home: A Living Laboratory for Ubiquitous Computing Research , 1999, CoBuild.
[55] Bing Jiang,et al. I Sense a Disturbance in the Force: Unobtrusive Detection of Interactions with RFID-tagged Objects , 2004, UbiComp.
[56] Philip Robinson,et al. Privacy, Security and Trust within the Context of Pervasive Computing (The Kluwer International Series in Engineering and Computer Science) , 2004 .
[57] Philip Robinson,et al. Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments , 2003, SPC.
[58] Armando Fox,et al. System Software for Ubiquitous Computing , 2022 .
[59] Bill N. Schilit,et al. The Parctab Ubiquitous Computing Experiment , 1994, Mobidata.
[60] John Krumm,et al. The NearMe Wireless Proximity Server , 2004, UbiComp.
[61] Roy Want,et al. The Personal Server: Changing the Way We Think about Ubiquitous Computing , 2002, UbiComp.
[62] Nigel Davies,et al. Evaluating a location-based application: a hybrid test and simulation environment , 2004, IEEE Pervasive Computing.
[63] Konrad Tollmar,et al. Activity Zones for Context-Aware Computing , 2003, UbiComp.
[64] Gregory D. Abowd,et al. Securing context-aware applications using environment roles , 2001, SACMAT '01.
[65] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[66] Bill N. Schilit,et al. Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.
[67] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.