-
1
Ubiquitous Computing for Remote Cardiac Patient Monitoring: A Survey
Published 2008-01-01Get full text
Article -
2
UX Evaluation with Standardized Questionnaires in Ubiquitous Computing and Ambient Intelligence: A Systematic Literature Review
Published 2021-01-01“…About 1 in 4 studies analyzed belong to ubiquitous computing and ambient intelligence fields, in which UEQ increases the percentage of uses when compared to its general percentage, particularly in topics such as IoT and wearable interfaces. …”
Get full text
Article -
3
-
4
-
5
A Service Based Adaptive U-Learning System Using UX
Published 2014-01-01“…One new technology in the development of application systems includes both cloud and ubiquitous computing. Cloud computing can support learning system processes by using services while ubiquitous computing can provide system operation and management via a high performance technical process and network. …”
Get full text
Article -
6
-
7
Selective Cooperative Transmission in Ad Hoc Networks with Directional Antennas
Published 2013-11-01Get full text
Article -
8
Survey on research progress for compute first networking
Published 2021-10-01“…With the development of 5G and mobile Internet technology, cloud computing, edge computing and intelligent terminal devices have been developed rapidly.Computing resources indicate a trend of ubiquitous deployment.How to use ubiquitous computing resources efficiently and collaboratively has become a hot topic at present in network field.In this context, the concept of compute first networking (CFN) has been proposed and attracted wide attention.Its basic idea is to enhance utilization of computing resources and improve user experience of network services, by converging computing and network deeply as well as coordinating distributed computing resources.Firstly the background and research status of CFN were analyzed, and then basic structure, workflow, and key technologies about CFN were explicated.Finally, future research directions and challenges about CFN were summarized.…”
Get full text
Article -
9
What’s going on at the bus stop? The impact of Auckland’s real time passenger information system on patrons timespace perceptions
Published 2007-12-01“…It explores how individuals’ travel experiences are being shaped by interface the RTPISP System provides between the ubiquitous computing background and individuals’ everyday lives. …”
Get full text
Article -
10
Des cités hallucinées à la grille invisible, William Gibson et les métamorphoses du cyberespace
Published 2017-11-01“…More specifically, the novel Spook Country uses the image of the “eversion” of cyberspace to describe the way ubiquitous computing is invading urban space. Cyberspace can simultaneously be a purveyor of simulacra, through virtual reality technology, and an invisible agent ensnaring the city in its wireless nets. …”
Get full text
Article -
11
A Novel 3D Indoor Localization Scheme Using Virtual Access Point
Published 2014-04-01Get full text
Article -
12
Onto: Ontological Context-Aware Model Based on 5W1H
Published 2012-03-01“…Ubiquitous computing is necessary to define models for broad contextual information arising out of surrounding environment. …”
Get full text
Article -
13
Recent Advances in Wireless Indoor Localization Techniques and System
Published 2013-01-01“…The advances in localization based technologies and the increasing importance of ubiquitous computing and context-dependent information have led to a growing business interest in location-based applications and services. …”
Get full text
Article -
14
A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks
Published 2013-01-01“…The ultimate goal of these heterogeneous wireless networks is to provide global connectivity with efficient ubiquitous computing to these MSs based on the Always Best Connected (ABC) principle. …”
Get full text
Article -
15
Applying Dynamic Priority Scheduling Scheme to Static Systems of Pinwheel Task Model in Power-Aware Scheduling
Published 2014-01-01“…This method is more effective than adopting the previous static priority scheduling methods in saving energy consumption and, for the system being still static, it is more tractable and applicable to small sized embedded or ubiquitous computing. Also, we introduce a novel power-aware scheduling algorithm which exploits all slacks under preemptive earliest-deadline first scheduling which is optimal in uniprocessor system. …”
Get full text
Article -
16
DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments
Published 2014-01-01“…Despite the convenience, ubiquitous computing suffers from many threats and security risks. …”
Get full text
Article -
17
User Adaptive and Context-Aware Smart Home Using Pervasive and Semantic Technologies
Published 2016-01-01“…Ubiquitous Computing is moving the interaction away from the human-computer paradigm and towards the creation of smart environments that users and things, from the IoT perspective, interact with. …”
Get full text
Article -
18
Application and prospect of blockchain in Metaverse
Published 2022-08-01“…The metaverse is a new ecology that seamlessly integrates the virtual digital world and the real physical world, and has recently attracted widespread attention from all walks of life.With the maturity of various new IT technologies such as blockchain technology, artificial intelligence technology, VR/AR and sensing technology, mobile communication technology and ubiquitous computing technology, the further development of the Metaverse is possible.At present, research on the Metaverse mainly involves industrial projects, infrastructure, key technologies, privacy and security, etc.Although blockchain technology is covered in these studies, the specific points about the advantages of blockchain applied to the Metaverse are still lacked.Blockchain technology can not only provide an open and free decentralized environment for the Metaverse, but also act as a fair and reasonable digital asset distribution mechanism.The digital identity and digital asset management in the Metaverse empowered by blockchain was studied.The development process and characteristics of the Metaverse were analyzed.And the core technologies and challenges faced by the development of the Metaverse were discussed.Meanwhile, the key technologies of the blockchain were studied, and the feasibility of applying the blockchain to the Metaverse was analyzed from two aspects: the essential characteristics of the blockchain and the advantages of other technology integration.The Metaverse ecosystem architecture was further proposed, and the blockchain-based self-sovereign identity management model, blockchain-NFT workflow and its application in the Metaverse were analyzed in detail.Furthermore, combining the latest research progress of blockchain and the Metaverse, it was pointed out that the application of blockchain to the Metaverse will be from four aspects: infrastructure, communication and computing resource management mechanisms, regulation and privacy protection, and blockchain scalability and interoperability.Then the related challenges ahead and future research directions were presented at last.…”
Get full text
Article -
19
Les Technopères : la carte informatique, un chemin initiatique
Published 2017-11-01“…We will try to identify the aesthetic and narrative devices which permit us to represent what is not representable, the ubiquitous computer science, the hyperconnection, the abolition of time and space as well as the infinitely small inside the machines. …”
Get full text
Article