Pervasive Computing [[electronic resource] ] : 10th International Conference, Pervasive 2012, Newcastle, UK, June 18-22, 2012. Proceedings / / edited by Judy Kay, Paul Lukowicz, Hideyuki Tokuda, Patrick Olivier, Antonio Krüger |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (496 p. 209 illus.) |
Disciplina | 005.7 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Application software
User interfaces (Computer systems) Computer communication systems Computer security Computer simulation Computers and civilization Information Systems Applications (incl. Internet) User Interfaces and Human Computer Interaction Computer Communication Networks Systems and Data Security Simulation and Modeling Computers and Society |
ISBN | 3-642-31205-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465516803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Pervasive Computing [[electronic resource] ] : 7th International Conference, Pervasive 2009, Nara, Japan, May 11-14, 2009, Proceedings / / edited by Hideyuki Tokuda, Michael Beigl, Adrian Friday, A. J. Bernheim Brush, Yoshito Tobe |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XV, 408 p.) |
Disciplina | 621.39 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computer engineering
Computer communication systems Special purpose computers Computer security Application software Information storage and retrieval Computer Engineering Computer Communication Networks Special Purpose and Application-Based Systems Systems and Data Security Information Systems Applications (incl. Internet) Information Storage and Retrieval |
Soggetto genere / forma |
Kongress.
Nara (2009) |
ISBN | 3-642-01516-6 |
Classificazione |
DAT 610f
DAT 614f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Digital Displays -- Display Blindness: The Effect of Expectations on Attention towards Digital Signage -- Users’ View on Context-Sensitive Car Advertisements -- ReflectiveSigns: Digital Signs That Adapt to Audience Attention -- Navigation -- Realistic Driving Trips For Location Privacy -- Enhancing Navigation Information with Tactile Output Embedded into the Steering Wheel -- Landmark-Based Pedestrian Navigation with Enhanced Spatial Reasoning -- At Home with Pervasive Applications -- The Acceptance of Domestic Ambient Intelligence Appliances by Prospective Users -- Adding GPS-Control to Traditional Thermostats: An Exploration of Potential Energy Savings and Design Challenges -- KidCam: Toward an Effective Technology for the Capture of Children’s Moments of Interest -- Sensors, Sensors, Everywhere -- Mobile Device Interaction with Force Sensing -- Inferring Identity Using Accelerometers in Television Remote Controls -- The Effectiveness of Haptic Cues as an Assistive Technology for Human Memory -- Exploring Privacy Concerns about Personal Sensing -- Working Together -- Enabling Pervasive Collaboration with Platform Composition -- Askus: Amplifying Mobile Actions -- Boxed Pervasive Games: An Experience with User-Created Pervasive Games -- Tagging and Tracking -- RF-Based Initialisation for Inertial Pedestrian Tracking -- PL-Tags: Detecting Batteryless Tags through the Power Lines in a Building -- Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries -- Securing RFID Systems by Detecting Tag Cloning -- Methods and Tools -- Towards Ontology-Based Formal Verification Methods for Context Aware Systems -- Situvis: A Visual Tool for Modeling a User’s Behaviour Patterns in a Pervasive Environment -- Methodologies for Continuous Cellular Tower Data Analysis -- The Importance of Context -- “It’s Just Easier with the Phone” – A Diary Study of Internet Access from Cell Phones -- Does Context Matter ? - A Quantitative Evaluation in a Real World Maintenance Scenario -- On the Anonymity of Home/Work Location Pairs -- Working Overtime: Patterns of Smartphone and PC Usage in the Day of an Information Worker. |
Record Nr. | UNISA-996466258003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Pervasive computing : 7th international conference, Pervasive 2009, Nara, Japan, May 11-14, 2009 ; proceedings / / Hideyuki Tokuda ... [et al.] (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, : Springer, c2009 |
Descrizione fisica | 1 online resource (XV, 408 p.) |
Disciplina | 621.39 |
Altri autori (Persone) | TokudaHideyuki |
Collana | Lecture notes in computer science |
Soggetto topico |
Ubiquitous computing
Mobile computing Portable computers |
ISBN | 3-642-01516-6 |
Classificazione |
DAT 610f
DAT 614f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Digital Displays -- Display Blindness: The Effect of Expectations on Attention towards Digital Signage -- Users’ View on Context-Sensitive Car Advertisements -- ReflectiveSigns: Digital Signs That Adapt to Audience Attention -- Navigation -- Realistic Driving Trips For Location Privacy -- Enhancing Navigation Information with Tactile Output Embedded into the Steering Wheel -- Landmark-Based Pedestrian Navigation with Enhanced Spatial Reasoning -- At Home with Pervasive Applications -- The Acceptance of Domestic Ambient Intelligence Appliances by Prospective Users -- Adding GPS-Control to Traditional Thermostats: An Exploration of Potential Energy Savings and Design Challenges -- KidCam: Toward an Effective Technology for the Capture of Children’s Moments of Interest -- Sensors, Sensors, Everywhere -- Mobile Device Interaction with Force Sensing -- Inferring Identity Using Accelerometers in Television Remote Controls -- The Effectiveness of Haptic Cues as an Assistive Technology for Human Memory -- Exploring Privacy Concerns about Personal Sensing -- Working Together -- Enabling Pervasive Collaboration with Platform Composition -- Askus: Amplifying Mobile Actions -- Boxed Pervasive Games: An Experience with User-Created Pervasive Games -- Tagging and Tracking -- RF-Based Initialisation for Inertial Pedestrian Tracking -- PL-Tags: Detecting Batteryless Tags through the Power Lines in a Building -- Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries -- Securing RFID Systems by Detecting Tag Cloning -- Methods and Tools -- Towards Ontology-Based Formal Verification Methods for Context Aware Systems -- Situvis: A Visual Tool for Modeling a User’s Behaviour Patterns in a Pervasive Environment -- Methodologies for Continuous Cellular Tower Data Analysis -- The Importance of Context -- “It’s Just Easier with the Phone” – A Diary Study of Internet Access from Cell Phones -- Does Context Matter ? - A Quantitative Evaluation in a Real World Maintenance Scenario -- On the Anonymity of Home/Work Location Pairs -- Working Overtime: Patterns of Smartphone and PC Usage in the Day of an Information Worker. |
Altri titoli varianti | Pervasive 2009 |
Record Nr. | UNINA-9910484329703321 |
Berlin, : Springer, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Software Security -- Theories and Systems [[electronic resource] ] : Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers / / edited by Mitsuhiro Okada, Benjamin Pierce, Andre Scedrov, Hideyuki Tokuda, Akinori Yonezawa |
Edizione | [1st ed. 2003.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
Descrizione fisica | 1 online resource (XII, 476 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Operating systems (Computers) Computer communication systems Programming languages (Electronic computers) Computer logic Management information systems Computer science Cryptology Operating Systems Computer Communication Networks Programming Languages, Compilers, Interpreters Logics and Meanings of Programs Management of Computing and Information Systems |
ISBN | 3-540-36532-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security for Pervasive Computing -- Towards Security and Privacy for Pervasive Computing -- Security for Whom? The Shifting Security Assumptions of Pervasive Computing -- Active Authentication for Pervasive Computing Environments -- Security for P2P Systems and Autonomous Distributed Agents -- A Survey of Peer-to-Peer Security Issues -- Autonomous Nodes and Distributed Mechanisms -- Privacy Issues -- Privacy in Sensor Webs and Distributed Information Systems -- Negotiated Privacy -- Secure Software Circulation and Secure C Language -- SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation -- Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure Progress Report -- Securing Programs by Rewriting and Sandboxing -- Types and Effects for Non-interfering Program Monitors -- Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains -- Enforcing Java Run-Time Properties Using Bytecode Rewriting -- Secure Mail System Construction -- AnZenMail: A Secure and Certified E-mail System -- Formalization and Verification of a Mail Server in Coq -- Some Security Systems -- Design and Implementation of Security System Based on Immune System -- Design and Implementation of Access Control System for Smart Office Environment -- Proof-Carrying Code and Type Systems for Security Protocols -- Typing One-to-One and One-to-Many Correspondences in Security Protocols -- Proof-Carrying Code with Untrusted Proof Rules -- Authentication Protocols -- Verification of Authentication Protocols Based on the Binding Relation -- Hiding Names: Private Authentication in the Applied Pi Calculus -- Environmental Requirements for Authentication Protocols -- Multiset Rewriting for Protocol Analysis -- A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis -- Data Access Specification and the Most Powerful Symbolic Attacker in MSR -- Verification Methods and Tools -- A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic -- Formal Analysis of the iKP Electronic Payment Protocols -- CafeOBJ as a Tool for Behavioral System Verification. |
Record Nr. | UNISA-996465764003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Software Security -- Theories and Systems : Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers / / edited by Mitsuhiro Okada, Benjamin Pierce, Andre Scedrov, Hideyuki Tokuda, Akinori Yonezawa |
Edizione | [1st ed. 2003.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
Descrizione fisica | 1 online resource (XII, 476 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Operating systems (Computers) Computer networks Programming languages (Electronic computers) Computer logic Management information systems Computer science Cryptology Operating Systems Computer Communication Networks Programming Languages, Compilers, Interpreters Logics and Meanings of Programs Management of Computing and Information Systems |
ISBN | 3-540-36532-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security for Pervasive Computing -- Towards Security and Privacy for Pervasive Computing -- Security for Whom? The Shifting Security Assumptions of Pervasive Computing -- Active Authentication for Pervasive Computing Environments -- Security for P2P Systems and Autonomous Distributed Agents -- A Survey of Peer-to-Peer Security Issues -- Autonomous Nodes and Distributed Mechanisms -- Privacy Issues -- Privacy in Sensor Webs and Distributed Information Systems -- Negotiated Privacy -- Secure Software Circulation and Secure C Language -- SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation -- Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure Progress Report -- Securing Programs by Rewriting and Sandboxing -- Types and Effects for Non-interfering Program Monitors -- Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains -- Enforcing Java Run-Time Properties Using Bytecode Rewriting -- Secure Mail System Construction -- AnZenMail: A Secure and Certified E-mail System -- Formalization and Verification of a Mail Server in Coq -- Some Security Systems -- Design and Implementation of Security System Based on Immune System -- Design and Implementation of Access Control System for Smart Office Environment -- Proof-Carrying Code and Type Systems for Security Protocols -- Typing One-to-One and One-to-Many Correspondences in Security Protocols -- Proof-Carrying Code with Untrusted Proof Rules -- Authentication Protocols -- Verification of Authentication Protocols Based on the Binding Relation -- Hiding Names: Private Authentication in the Applied Pi Calculus -- Environmental Requirements for Authentication Protocols -- Multiset Rewriting for Protocol Analysis -- A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis -- Data Access Specification and the Most Powerful Symbolic Attacker in MSR -- Verification Methods and Tools -- A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic -- Formal Analysis of the iKP Electronic Payment Protocols -- CafeOBJ as a Tool for Behavioral System Verification. |
Record Nr. | UNINA-9910143877503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
UbiComp 2005: Ubiquitous Computing : 7th International Conference, UbiComp 2005, Tokyo, Japan, September 11-14, 2005, Proceedings / / edited by Michael Beigl, Stephen Intille, Jun Rekimoto, Hideyuki Tokuda |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (XVIII, 398 p.) |
Disciplina | 004 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
User interfaces (Computer systems)
Computer communication systems Software engineering Operating systems (Computers) Application software Computers and civilization User Interfaces and Human Computer Interaction Computer Communication Networks Software Engineering Operating Systems Information Systems Applications (incl. Internet) Computers and Society |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | CarpetLAN: A Novel Indoor Wireless(-like) Networking and Positioning System -- u-Texture: Self-Organizable Universal Panels for Creating Smart Surroundings -- Fast and Robust Interface Generation for Ubiquitous Applications -- Analysis of Chewing Sounds for Dietary Monitoring -- Preventing Camera Recording by Designing a Capture-Resistant Environment -- Self-Mapping in 802.11 Location Systems -- A Study of Bluetooth Propagation Using Accurate Indoor Location Mapping -- A New Method for Auto-calibrated Object Tracking -- Accurate GSM Indoor Localization -- Learning and Recognizing the Places We Go -- Visually Interactive Location-Aware Computing -- DigiDress: A Field Trial of an Expressive Social Proximity Application -- Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service -- Place-Its: A Study of Location-Based Reminders on Mobile Phones -- Time, Ownership and Awareness: The Value of Contextual Locations in the Home -- Living for the Global City: Mobile Kits, Urban Interfaces, and Ubicomp -- From Interaction to Participation: Configuring Space Through Embodied Interaction -- Scanning Objects in the Wild: Assessing an Object Triggered Information System -- Abaris: Evaluating Automated Capture Applied to Structured Autism Interventions -- To Frame or Not to Frame: The Role and Design of Frameless Displays in Ubiquitous Applications -- Picking Pockets on the Lawn: The Development of Tactics and Strategies in a Mobile Game -- ActiveTheatre — A Collaborative, Event-Based Capture and Access System for the Operating Theatre. |
Altri titoli varianti | UbiComp'05 |
Record Nr. | UNISA-996465572503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Ubiquitous Computing Systems [[electronic resource] ] : Second International Symposium, UCS, Tokyo, Japan, November 8-9, 2004, Revised Selected Papers / / edited by Hitomi Murakami, Hideyuki Nakashima, Hideyuki Tokuda, Michiaki Yasumura |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (XIV, 278 p.) |
Disciplina | 004 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computer communication systems
User interfaces (Computer systems) Computer organization Software engineering Special purpose computers Application software Computer Communication Networks User Interfaces and Human Computer Interaction Computer Systems Organization and Communication Networks Software Engineering Special Purpose and Application-Based Systems Information Systems Applications (incl. Internet) |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- The Pervasive Sensor -- From Everyday Things to Everyday Memories: Two Kinds of Interactions with Objects in a House -- Location-aware Computing -- Design, Implementation and Evaluations of a Direction Based Service System for Both Indoor and Outdoor -- Designing Transparent Location-Dependent Web-Based Applications on Mobile Environments -- Position Tracking Using Infra-Red Signals for Museum Guiding System -- Navigation with an Adaptive Mobile Map-Application: User Experiences of Gesture- and Context-Sensitiveness -- Real-World Interaction -- Real-World Interaction with Camera Phones -- Experience-Sharing System Using Ubiquitous Sensing Environments -- Augmented Classroom: A Paper-Centric Approach for Collaborative Learning System -- EnhancedTable: An Augmented Table System for Supporting Face-to-Face Meeting in Ubiquitous Environment -- Systems -- Agents That Coordinate Web Services in Ubiquitous Computing -- Realizing a Secure Federation of Multi-institutional Service Systems -- Middleware Supporting Various Input/Output Devices for Networked Audio and Visual Home Appliances -- Context Awareness -- Bazaar: A Conceptual Framework for Physical Space Applications -- A Unified Application Service Model for ubiHome by Exploiting Intelligent Context-Awareness -- A Behavior-Based Personal Controller for Autonomous Ubiquitous Computing -- Sensors and Tags -- Scanning with a Purpose – Supporting the Fair Information Principles in RFID Protocols -- Towards a Comprehensive Integration and Application Platform for Large-Scale Sensor Networks -- Inexpensive and Automatic Calibration for Acceleration Sensors -- Dependable Coding of Fiducial Tags. |
Record Nr. | UNISA-996465825103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|