default search action
IEEE Pervasive Computing, Volume 2
Volume 2, Number 1, January 2003
- Adam Stone:
The Dark Side of Pervasive Computing. 4-8 - Vince Stanford:
Pervasive Computing Puts Food on the Table. 9-14 - Thad E. Starner:
The Enigmatic Display. 15-18 - Nigel Davies:
Introduction: Security and Privacy. 20 - Paraskevas Kitsos, Nicolas Sklavos, Kyriakos Papadomanolakis, Odysseas G. Koufopavlou:
Hardware Implementation of Bluetooth Security. 21-29 - Trevor Pering, Murali Sundar, John Light, Roy Want:
Photographic Authentication through Untrusted Terminals. 30-36 - Yongsheng Gao, Siu Cheung Hui, Alvis Cheuk M. Fong:
A Multi-View Facial Analysis Technique for Identity Authentication. 38-45 - Alastair R. Beresford, Frank Stajano:
Location Privacy in Pervasive Computing. 46-55 - Ginger Myles, Adrian Friday, Nigel Davies:
Preserving Privacy in Environments with Location-Based Applications. 56-64 - Stuart Goose, Sandra Sudarsky, Xiang Zhang, Nassir Navab:
Speech-Enabled Augmented Reality Supporting Mobile Industrial Maintenance. 65-70 - Gerd Kortuem, Zary Segall:
Wearable Communities: Augmenting Social Networks with Wearable Computers. 71-78 - Vijay Kumar, Srinivas Parimi, Dharma P. Agrawal:
WAP: Present and Future. 79-83 - Scott F. Midkiff:
The First Summer School on Ubiquitous and Pervasive Computing. 84-88 - Diana Marculescu:
E-Textiles: Toward Computational Clothing. 89-95 - Sharath Pankanti, Andrew W. Senior, Lisa M. Brown, Arun Hampapur, Ying-li Tian, Ruud M. Bolle, Florina Almenárez, Andrés Marín, Celeste Campo, R. Carlos García, Rob Van Kranenburg:
Security, Privacy, and Health.
Volume 2, Number 2, April 2003
- Mahadev Satyanarayanan:
Roger Needham, 1935-2003. 2-3 - Laurianne McLaughlin, Shani Murray, Meg McGinity:
News. 4-8 - Vince Stanford:
Pervasive Computing Goes the Last 100 Feet with RFID Systems. 9-14 - Bernard Fong, Predrag B. Rapajic, Guan Yue Hong, Alvis Cheuk M. Fong:
Factors Causing Uncertainties in Outdoor Wireless Wearable Communications. 16-19 - Gregory D. Abowd:
Introduction: The Human Experience. 22-23 - Sunny Consolvo, Miriam Walker:
Using the Experience Sampling Method to Evaluate Ubicomp Applications. 24-31 - Panos E. Kourouthanassis, George Roussos:
Developing Consumer-Friendly Pervasive Retail Systems. 32-39 - Richard Beckwith:
Designing for Ubiquity: The Perception of Privacy. 40-46 - Yuanchun Shi, Weikai Xie, Guangyou Xu, Runting Shi, Enyi Chen, Yanhua Mao, Fang Liu:
The Smart Classroom: Merging Technologies for Seamless Tele-education. 47-55 - Kevin R. Wheeler, Charles Jorgensen:
Gestures as Input: Neuroelectric Joysticks and Keyboards. 56-61 - Edward C. Epp:
Relationship Management: Secure Collaboration in a Ubiquitous Environment. 62-71 - Diomidis Spinellis:
Position-Annotated Photographs: A Geotemporal Web. 72-79 - Cynthia A. Patterson, Richard R. Muntz, Cherri M. Pancake:
Challenges in Location-Aware Computing. 80-89 - Dmitry S. Kochnev, Andrey A. Terekhov:
Surviving Java for Mobiles. 90-95 - Larry Rudolph:
What I Did on My Fall Vacation-A Pervasive Computing Class. 100-104
Volume 2, Number 3, July 2003
- Mahadev Satyanarayanan:
Coping with Uncertainty. 2 - Adam Stone, Shani Murray:
News. 3-7 - Tom L. Martin:
Wearable and Ubiquitous Computing. 8-12 - Vince Stanford:
Beam Me Up, Doctor McCoy. 13-18 - Maribeth Gandy, David A. Ross, Thad E. Starner:
Universal Design: Lessons for Wearable Computing. 19-23 - Dieter Fox, Jeffrey Hightower, Lin Liao, Dirk Schulz, Gaetano Borriello:
Bayesian Filtering for Location Estimation. 24-33 - Steve Benford, Rob Anastasi, Martin Flintham, Adam Drozd, Andy Crabtree, Chris Greenhalgh, Nick Tandavanitj, Matt Adams, Ju Row-Farr:
Coping with Uncertainty in a Location-Based Game. 34-41 - Panu Korpipää, Jani Mäntyjärvi, Juha Kela, Heikki Keränen, Esko-Juhani Malm:
Managing Context Information in Mobile Devices. 42-51 - Vinny Cahill, Elizabeth Gray, Jean-Marc Seigneur, Christian Damsgaard Jensen, Yong Chen, Brian Shand, Nathan Dimmock, Andrew Twigg, Jean Bacon, Colin English, Waleed Wagealla, Sotirios Terzis, Paddy Nixon, Giovanna Di Marzo Serugendo, Ciarán Bryce, Marco Carbone, Karl Krukow, Mogens Nielsen:
Using Trust for Secure Collaboration in Uncertain Environments. 52-61 - Cristina Videira Lopes, Pedro M. Q. Aguiar:
Acoustic Modems for Ubiquitous Computing. 62-71 - Mohan Kumar, Behrooz A. Shirazi, Sajal K. Das, Byung Y. Sung, David Levine, Mukesh Singhal:
PICO: A Middleware Framework for Pervasive Computing. 72-79 - James W. Mickens, Marco Gruteser, Justin Mazzola Paluska, Mary Baker:
MobiSys 2003: On the Cutting Edge in San Francisco. 81-84 - Choonhwa Lee, David Nordstedt, Sumi Helal:
Enabling Smart Spaces with OSGi. 89-94 - Uncertainties, Sensor Motes, Trust Issues. 95-96
Volume 2, Number 4, October 2003
- Mahadev Satyanarayanan:
From the Editor in Chief: Of Smart Dust and Brilliant Rocks. 2-4 - Adam Stone, Meg McGinity:
News. 5-9 - Scott F. Midkiff:
Internet-Scale Sensor Systems: Design and Policy. 10-13 - Rob Holman, John Stanley, Tuba Özkan-Haller:
Applying Video Sensor Networks to Nearshore Environment Monitoring. 14-21 - Phillip B. Gibbons, Brad Karp, Yan Ke, Suman Nath, Srinivasan Seshan:
IrisNet: An Architecture for a Worldwide Sensor Web. 22-33 - Zack J. Butler, Daniela Rus:
Event-Based Motion Control for Mobile-Sensor Networks. 34-42 - Slobodan N. Simic:
A Learning-Theory Approach to Sensor Networks. 44-49 - Jie Liu, Maurice Chu, Juan Liu, James Reich, Feng Zhao:
State-Centric Programming for Sensor-Actuator Network Systems. 50-62 - Alexei Makarenko, Tobias Kaupp, Hugh F. Durrant-Whyte:
Scalable Human-Robot Interactions in Active Sensor Networks. 63-71 - Guerney D. H. Hunt, Keith I. Farkas:
New Products. 72-74 - George Roussos:
Appliance Design for Pervasive Computing. 75-77 - Anne R. Jacobs, Gregory D. Abowd:
A Framework for Comparing Perspectives on Privacy and Pervasive Technologies. 78-84 - Thad E. Starner:
Powerful Change Part 1: Batteries and Possible Alternatives for the Mobile Market. 86-88 - Jean Bacon:
IEEE Distributed Systems Online: Looking to the Future. 96
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.