Inicio > > Ciencias de la computación > Pervasive Computing
Pervasive Computing

Pervasive Computing

 

65,64 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2009
Materia
Ciencias de la computación
ISBN:
9783642015151
65,64 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Digital Displays.- Display Blindness: The Effect of Expectations on Attention towards Digital Signage.- Users’ View on Context-Sensitive Car Advertisements.- ReflectiveSigns: Digital Signs That Adapt to Audience Attention.- Navigation.- Realistic Driving Trips For Location Privacy.- Enhancing Navigation Information with Tactile Output Embedded into the Steering Wheel.- Landmark-Based Pedestrian Navigation with Enhanced Spatial Reasoning.- At Home with Pervasive Applications.- The Acceptance of Domestic Ambient Intelligence Appliances by Prospective Users.- Adding GPS-Control to Traditional Thermostats: An Exploration of Potential Energy Savings and Design Challenges.- KidCam: Toward an Effective Technology for the Capture of Children’s Moments of Interest.- Sensors, Sensors, Everywhere.- Mobile Device Interaction with Force Sensing.- Inferring Identity Using Accelerometers in Television Remote Controls.- The Effectiveness of Haptic Cues as an Assistive Technology for Human Memory.- Exploring Privacy Concerns about Personal Sensing.- Working Together.- Enabling Pervasive Collaboration with Platform Composition.- Askus: Amplifying Mobile Actions.- Boxed Pervasive Games: An Experience with User-Created Pervasive Games.- Tagging and Tracking.- RF-Based Initialisation for Inertial Pedestrian Tracking.- PL-Tags: Detecting Batteryless Tags through the Power Lines in a Building.- Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries.- Securing RFID Systems by Detecting Tag Cloning.- Methods and Tools.- Towards Ontology-Based Formal Verification Methods for Context Aware Systems.- Situvis: A Visual Tool for Modeling a User’s Behaviour Patterns in a Pervasive Environment.- Methodologies for Continuous Cellular Tower Data Analysis.- The Importance of Context.- 'It’s Just Easier with the Phone' - A Diary Study of Internet Access from Cell Phones.- Does Context Matter ? - A Quantitative Evaluation in a Real World Maintenance Scenario.- On the Anonymity of Home/Work Location Pairs.- Working Overtime: Patterns of Smartphone and PC Usage in the Day of an Information Worker.

Artículos relacionados