-
3
-
-
33646040128
-
Picking pockets on the lawn: The development of tactics and strategies in a mobile game
-
Barkhuus, L. et al., Picking Pockets on the Lawn: The Development of Tactics and Strategies in a Mobile Game Proc. Ubicomp 2005, 358-374.
-
(2005)
Proc. Ubicomp
, pp. 358-374
-
-
Barkhuus, L.1
-
4
-
-
51349144621
-
On plug-ins und extensible architectures
-
March
-
Birsan, D. On Plug-ins und Extensible Architectures. ACM Queue 3(2) March 2005
-
(2005)
ACM Queue
, vol.3
, Issue.2
-
-
Birsan, D.1
-
5
-
-
0042504684
-
The order of things: Activity-centred information access
-
Chalmers, M., et al., The Order of Things: Activity-Centred Information Access. Proc. WWW 1998. 359-367.
-
Proc. WWW 1998
, pp. 359-367
-
-
Chalmers, M.1
-
6
-
-
84941148305
-
Poblano: A distributed trust model for peer-to-peer networks
-
Chen, F. and Yeager, W., Poblano: A Distributed Trust Model for Peer-to-Peer Networks, JXTA Security White Paper, 2001.
-
(2001)
JXTA Security White Paper
-
-
Chen, F.1
Yeager, W.2
-
7
-
-
84941159987
-
The role of built-in knowledge in adaptive interface systems
-
Crow, D., Smith, B., The role of built-in knowledge in adaptive interface systems. Proc. ACM IU1 1993, 91-104
-
Proc. ACM IU1 1993
, pp. 91-104
-
-
Crow, D.1
Smith, B.2
-
8
-
-
84900561794
-
EAGER: Programming repetitive tasks by example
-
Cypher, A., EAGER: programming repetitive tasks by example, ACM CHI 1991, 33-39.
-
ACM CHI 1991
, pp. 33-39
-
-
Cypher, A.1
-
11
-
-
84945564256
-
At home with ubiquitous computing: Seven challenges
-
Springer LNCS
-
Edwards, W.K., Grinter, R. At Home with Ubiquitous Computing: Seven Challenges. Proc. Ubicomp 2001, Springer LNCS, 256-272
-
Proc. Ubicomp 2001
, pp. 256-272
-
-
Edwards, W.K.1
Grinter, R.2
-
12
-
-
4544268870
-
A comparison of static, adaptive and adaptable menus
-
Findlater, L, McGrenere, J. A comparison of static, adaptive and adaptable menus. Proc. ACM CHI 2004, 89-96.
-
Proc. ACM CHI 2004
, pp. 89-96
-
-
Findlater, L.1
McGrenere, J.2
-
13
-
-
84869142129
-
Distributive immunization of networks against viruses using the 'honey-pot' architecture
-
December
-
Goldenberg, J., Shavitt, Y., Shir, E. & Solomon, S. Distributive immunization of networks against viruses using the 'honey-pot' architecture. Nature Physics, 1(3), December 2005, 184-188.
-
(2005)
Nature Physics
, vol.1
, Issue.3
, pp. 184-188
-
-
Goldenberg, J.1
Shavitt, Y.2
Shir, E.3
Solomon, S.4
-
14
-
-
0142156639
-
Playing with the bits: User-configuration of ubiquitous domestic environments
-
Springer LNCS
-
Humble, J. et al., Playing with the Bits: User-configuration of Ubiquitous Domestic Environments, Proc. UbiComp 2003, Springer LNCS, 256-263.
-
Proc. UbiComp 2003
, pp. 256-263
-
-
Humble, J.1
-
15
-
-
33646824096
-
An epidemic model for information diffusion in MANETs
-
Khelil, A, Becker, C. et al. An Epidemic Model for Information Diffusion in MANETs, Proc. ACM MSWiM, 2002
-
(2002)
Proc. ACM MSWiM
-
-
Khelil, A.1
Becker, C.2
-
16
-
-
84945163508
-
Patterns of sharing customizable software
-
Mackay, W. Patterns of Sharing Customizable Software. Proc. ACM CSCW 1990, 209-221.
-
Proc. ACM CSCW 1990
, pp. 209-221
-
-
Mackay, W.1
-
17
-
-
84900565522
-
Triggers and barriers to customizing software
-
Mackay, W. Triggers and barriers to customizing software. Proc. ACM CHl 1991, 153-160
-
Proc. ACM CHl 1991
, pp. 153-160
-
-
Mackay, W.1
-
18
-
-
85041751780
-
User-tailorable systems: Pressing the issues with buttons
-
MacLean, A., et al. User-Tailorable Systems: Pressing the Issues with Buttons. Proc. ACM CHI 1990, 175-182.
-
Proc. ACM CHI 1990
, pp. 175-182
-
-
MacLean, A.1
-
19
-
-
0011747279
-
Twinkling lights and nested loops: Distributed problem solving and spreadsheet development
-
Academic Press
-
Nardi, B.A. and Miller, J. Twinkling Lights and Nested Loops: Distributed Problem Solving and Spreadsheet Development, CSCW and Groupware, Academic Press, 1991, 29-52
-
(1991)
CSCW and Groupware
, pp. 29-52
-
-
Nardi, B.A.1
Miller, J.2
-
20
-
-
77953077071
-
Designing for serendipity: Supporting end-user configurations of ubiquitous computing environments
-
Newman, M., et al. Designing for Serendipity: Supporting End-User Configurations of Ubiquitous Computing Environments, Proc. ACM DIS 2002, 147-156.
-
Proc. ACM DIS 2002
, pp. 147-156
-
-
Newman, M.1
-
21
-
-
14544308109
-
A buddy model of security for mobile agent communities operating in pervasive scenarios
-
CRPIT
-
Page, J., Zaslavsky, A. & Indrawan, M. A buddy model of security for mobile agent communities operating in pervasive scenarios. Proc. Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32. CRPIT 2004.
-
(2004)
Proc. Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
, vol.32
-
-
Page, J.1
Zaslavsky, A.2
Indrawan, M.3
-
22
-
-
33646038907
-
DigiDress: A field trial of an expressive social proximity application
-
Persson, P. et al., DigiDress: A Field Trial of an Expressive Social Proximity Application. Proc. Ubicomp 2005, 195-212.
-
Proc. Ubicomp 2005
, pp. 195-212
-
-
Persson, P.1
-
23
-
-
0031078841
-
Trusting mobile user devices and security modules
-
February
-
Pfitzmann, A., Pfitzmann, B. & Waidner, M. Trusting Mobile User Devices and Security Modules. Computer, February 1997, 30(2), 61-68.
-
(1997)
Computer
, vol.30
, Issue.2
, pp. 61-68
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
24
-
-
4444331720
-
Security as a new dimension in embedded system design
-
June
-
Ravi, S. et al., Security as a new dimension in embedded system design. Proc. Design Automation, June 2004
-
(2004)
Proc. Design Automation
-
-
Ravi, S.1
-
25
-
-
0038375715
-
The evolution of buildings and implications for the design of ubiquitous domestic environments
-
Rodden, T., Benford, S. The evolution of buildings and implications for the design of ubiquitous domestic environments. Proc. ACM CHI 2003, 9-16.
-
Proc. ACM CHI 2003
, pp. 9-16
-
-
Rodden, T.1
Benford, S.2
-
26
-
-
84941160369
-
Protecting mobile agents against malicious host attacks using threat diagnostic AND/OR tree
-
Saeb, M., Hamza, M. & Soliman, A. Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree. Proc. sOc 2003
-
Proc. SOc 2003
-
-
Saeb, M.1
Hamza, M.2
Soliman, A.3
-
27
-
-
33144488563
-
Automatically personalizing user interfaces
-
Morgan Kaufmann
-
Weld, D. et al. Automatically personalizing user interfaces. Proc IJCAI 2003, Morgan Kaufmann, 1613-1619
-
Proc IJCAI 2003
, pp. 1613-1619
-
-
Weld, D.1
|