15,435 Hits in 8.3 sec

Pervasive Web Access via Public Communication Walls [chapter]

Alois Ferscha, Simon Vogl
2002 Lecture Notes in Computer Science  
Multi-user communication and interaction via public displays together the pervasive and seamless access to the WWW in public areas via mobile phones or handheld devices is enabled via the WebWall system  ...  The architecture integrates ubiquitous wireless networks (GSM, IEEE802.11b), allowing a vast community of mobile users to access the WWW via public communication displays in an ad-hoc mode.  ...  With this work we address the potentials of ad-hoc communication in public spaces using a wall metaphor.  ... 
doi:10.1007/3-540-45866-2_8 fatcat:ovecgw62lvhinm2cubnhjeg5sa

Asomnia: AService-Oriented Middleware for Ambient Information Access [chapter]

Karl Rehrl, Wernher Behrendt, Manfred Bortenschlager, Sigi Reich, Harald Rieser, Rupert Westenthaler
2003 Lecture Notes in Computer Science  
With the growing pervasiveness of information systems we are increasingly confronted with integrating heterogeneous end-user devices into existing information infrastructures.  ...  However, the functional units are encapsulated behind the service facade and can only be access via the public interface.  ...  In the area of public transport we are confronted with different multimedia displays such as video walls, information kiosks or also end-user devices like PDAs or smart phones.  ... 
doi:10.1007/978-3-540-45227-0_42 fatcat:cxnabdmmxzhgnk6dyly7js64r4

Keeping it private

Callum Parker, Martin Tomitsch, Judy Kay, Matthias Baldauf
2015 Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers - UbiComp '15  
Due to their situated nature, public displays have the potential to enable a larger cross-section of the public to participate in community consultation processes, compared to focus groups or online surveys  ...  In this paper we propose a formerly introduced interaction method, based upon mobile augmented reality, which promises to enable pervasive participation by making interactions more private and simultaneous  ...  An issue found with this system however was that people did not appreciate posting from a web browser as it was slow to load the web page on a mobile device and accessing it from a computer was inconvenient  ... 
doi:10.1145/2800835.2804401 dblp:conf/huc/ParkerTKB15 fatcat:ytmm5u47b5dixbg7eglew33bdu

Immanent Domain

Dana Cuff
2003 Journal of Architectural Education  
Indeed, these new forms of mobile and ubiquitous systems, called pervasive computing, challenge some of our fundamental ideas about subjectivity, visibility, space, and the distinction between public and  ...  , data, advertisement, investigation, communication, intimacy, and danger.  ...  Anti-surveillance web camera performances in public settings are a similar phenomenon.  ... 
doi:10.1162/104648803322336575 fatcat:5vejqzfacrhmvouv2w4ck3fncq

Sapporo world window Urban interaction through public and private screens

Jaz Hee-jeong Choi, Jan Seeburger
2011 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
can have meaningful experiences of interacting with people and places of Sapporo through mobile phones (keitai) and the public screens in the space.  ...  There are ten large public screens installed in the space, displaying usergenerated videos about various aspects of the city and a real-time map that visualises users' interaction with the city.  ...  However, to support phones without QR code scanning functionality, an individual web address (such as will also be displayed to broaden accessibility.  ... 
doi:10.1109/percomw.2011.5766942 dblp:conf/percom/ChoiS11 fatcat:5p7qe3qb3fgpzm3ns34u2f6tmi

Information Modeling for Virtual and Augmented Reality

Edoardo Patti, Angelo Mollame, David Erba, Daniele Dalmasso, Anna Osello, Enrico Macii, Andrea Acquaviva
2017 IT Professional Magazine  
Nevertheless, how to enable interoperability across devices adopting heterogeneous communication protocols or standards is the object of intensive research.  ...  Our methodology leverages a distributed software architecture composed of underlying middleware services to access sensor data in a hardware-independent way and combine it with BIM models interactively  ...  Spaces (SEEMPubS). 2,6 It lets end users interact with the system to access building information available from multiple pervasive sources.  ... 
doi:10.1109/mitp.2017.43 fatcat:mwtqqw2ed5ezpn33j6c23aljtu

Citizens breaking out of filter bubbles

Marcus Foth, Martin Tomitsch, Laura Forlano, M. Hank Haeusler, Christine Satchell
2016 Proceedings of the 5th ACM International Symposium on Pervasive Displays - PerDis '16  
However, quantity of content does not imply quality, and thus with more sources of content, spread via more digital media channels, to more people, web users started to face the problem of information  ...  Via a web form, we are asking a series of questions intended to capture a variety of personal stories and circumstances that will enhance understanding of broader demographic trends concerning migration  ... 
doi:10.1145/2914920.2915010 dblp:conf/perdis/FothTFHS16 fatcat:gbwxrvfeszcthk6lobcmhuw6r4

Trust and Authorization in Pervasive B2E Scenarios [chapter]

Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta
2003 Lecture Notes in Computer Science  
More specifically, the problem of trustworthiness of unknown devices is one of the major obstacles hindering the acceptance of pervasive applications.  ...  Many pervasive and ubiquitous application scenarios consider the interaction of users with surrounding devices offering services anywhere and anytime as one of the main future challenges.  ...  via that display.  ... 
doi:10.1007/10958513_23 fatcat:7ithdwu335axhglr5fwlvkgklm

SerenA: A Multi-site Pervasive Agent Environment That Supports Serendipitous Discovery in Research [chapter]

Jamie Forth, Thanasis Giannimaras, Geraint A. Wiggins, Robert Stewart, Diana Bental, Ruth Aylett, Deborah Maxwell, Hadi Mehrpouya, Jamie Shek, Mel Woods
2013 Lecture Notes in Computer Science  
Public SerenA Our first demo is of public SerenA. It is conceived in the context of a major UK city library.  ...  Both users are informed, via their notebooks, that the other is present at the conference, and an appropriate web reference is given, to enable them to look each other up.  ... 
doi:10.1007/978-3-642-38073-0_8 fatcat:qvztkmlf6nfkpgjogtbu7wfo6y

Weaving the Pervasive Information Fabric [chapter]

Mark Thompson, David De Roure, Danius Michaelides
2000 Lecture Notes in Computer Science  
As the pervasive computing infrastructure emerges, we consider the impact on information applications and their middleware requirements -what we call the pervasive information fabric.  ...  The Pervasive Computing Fabric The pervasive computing vision was established by work at Xerox around 1989 on 'ubiquitous computing' and brought to public attention through Weiser's Scientific American  ...  Local processes, including the user, always manage local data such that access permissions, publication rights and document selection can be controlled with a high degree of confidence -especially important  ... 
doi:10.1007/3-540-39941-0_11 fatcat:xdg2q24hmvgbxnxu772t6vm7ku

Pervasive maps: Explore and interact with pervasive environments

Geert Vanderhulst, Kris Luyten, Karin Coninx
2010 2010 IEEE International Conference on Pervasive Computing and Communications (PerCom)  
We show how users can model, explore and finally interact with complex pervasive environments using Pervasive Maps.  ...  Pervasive Maps offers user-oriented views on the user's environment based on pictures of this environment.  ...  Using the iPhone, we can now directly access the DigiScores application via the PM application menu.  ... 
doi:10.1109/percom.2010.5466973 dblp:conf/percom/VanderhulstLC10 fatcat:sphcpg6jlbfsdn5zdjabfbuqqu

A framework for comparing perspectives on privacy and pervasive technologies

A.R. Jacobs, G.D. Abowd
2003 IEEE pervasive computing  
The department chair believes that the way to promote departmental cohesion is, as Box 2 suggests, to limit access to the captured lecture materials on the class Web site.  ...  Pervasive computing technologies challenge those norms because they often access information that has long been deemed to fall within the scope of individual privacy.  ... 
doi:10.1109/mprv.2003.1251171 fatcat:zxr3eyzflfgezlyuglityvedvq

En passant Coupon Collection

Alois Ferscha, Wolfram Swoboda, Christoph Wimberger
2009 Jahrestagung der Gesellschaft für Informatik  
in public places like shopping malls, airports, train stops, stations or city centers) as a pervasive advertisement system.  ...  Spontaneous interaction in public places has evolved as crucial concern in interaction design, particularly in the domain of public advertising.  ...  Clearly, pervasive advertisement, like e.g. advertisement via public displays, is a case demanding for principles of implicit interaction.  ... 
dblp:conf/gi/FerschaSW09 fatcat:mte7nbjvwbhrrpdccj4kxx4yhi

MHS: a context‐enabled regulated framework for pervasive services

Evi Syukur, Seng Wai Loke
2010 International Journal of Pervasive Computing and Communications  
The system needs to provide an infrastructure that handles the interaction between a client device that requests a service and a server which responds to the client's request via Web service calls.  ...  Purpose -Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future.  ...  As a result, a comprehensive representation and reasoning of contexts (i.e. using Semantic Web ontology is required).  ... 
doi:10.1108/17427371011033280 fatcat:t3sv2zvdzfe53pvplf6kq5527i

Smart Cities and Cultural Heritage - A Review of Developments and Future Opportunities

Ann Borda, Jonathan P. Bowen
2017 EVA London 2017  
Recently in 2016, StatCounter reported that 51.3% of web browsing worldwide took place via mobiles and tablets, overtaking desktop browsing for the first time.  ...  of IoT data, for instance, via cloud services.  ... 
doi:10.14236/ewic/eva2017.2 dblp:conf/eva/BordaB17 fatcat:n2q7oig7ufendjd5favnc2dnnq
« Previous Showing results 1 — 15 out of 15,435 results