메뉴 건너뛰기




Volumn , Issue , 2004, Pages 233-242

Development and evaluation of emerging design patterns for ubiquitous computing

Author keywords

Design; Design patterns; Ubiquitous computing

Indexed keywords

ARCHITECTURAL DESIGN; COMPUTER AIDED LOGIC DESIGN; COMPUTER APPLICATIONS; HEURISTIC METHODS; PROBLEM SOLVING; PROLOG (PROGRAMMING LANGUAGE); STATISTICAL METHODS; WORLD WIDE WEB;

EID: 10044278069     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1013115.1013148     Document Type: Conference Paper
Times cited : (127)

References (25)
  • 3
    • 0012752837 scopus 로고    scopus 로고
    • Putting it all together: Towards a pattern language for interaction design
    • Bayle, E., et al., Putting it all together: towards a pattern language for interaction design, SIGCHI Bulletin, vol. 30(1): pp. 17-23, 1998.
    • (1998) SIGCHI Bulletin , vol.30 , Issue.1 , pp. 17-23
    • Bayle, E.1
  • 12
    • 0042564712 scopus 로고    scopus 로고
    • Design patterns for ubiquitous computing
    • Landay, J.A. and G. Borriello, Design Patterns for Ubiquitous Computing, Computer, vol. 36(8): pp. 93-95, 2003.
    • (2003) Computer , vol.36 , Issue.8 , pp. 93-95
    • Landay, J.A.1    Borriello, G.2
  • 17
    • 0014282747 scopus 로고
    • The social psychology of privacy
    • Schwartz, B., The Social Psychology of Privacy. American Journal of Sociology, 1968. 73(6): p. 741-752.
    • (1968) American Journal of Sociology , vol.73 , Issue.6 , pp. 741-752
    • Schwartz, B.1
  • 24
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • Weiser, M., The Computer for the 21st Century. Scientific American, 1991. 265(3): p. 94-104.
    • (1991) Scientific American , vol.265 , Issue.3 , pp. 94-104
    • Weiser, M.1
  • 25
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • Aug 23-26
    • Whitten, A. and J.D. Tygar. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of 8th USENIX Security Symposium, pp. 169-184, Aug 23-26 1999.
    • (1999) Proceedings of 8th USENIX Security Symposium , pp. 169-184
    • Whitten, A.1    Tygar, J.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.