-
2
-
-
0030416439
-
Teaching and learning as multimedia authoring: The classroom 2000 project
-
Abowd GD, Atkeson CG, Feinstein A, Hmelo C, Kooper R, Long S, Sawhney N, Tan M (1996) Teaching and learning as multimedia authoring: The classroom 2000 project. In: Proceedings of ACM Multimedia 1996, pp 187-198
-
(1996)
Proceedings of ACM Multimedia 1996
, pp. 187-198
-
-
Abowd, G.D.1
Atkeson, C.G.2
Feinstein, A.3
Hmelo, C.4
Kooper, R.5
Long, S.6
Sawhney, N.7
Tan, M.8
-
6
-
-
0010602271
-
System software for ubiquitous computing
-
Kindberg T, Fox A (2002) System software for ubiquitous computing. Pervasive Comput 1(1):70-81
-
(2002)
Pervasive Comput
, vol.1
, Issue.1
, pp. 70-81
-
-
Kindberg, T.1
Fox, A.2
-
8
-
-
84976653144
-
Some computer science issues in ubiquitous computing
-
Weiser M (1993) Some computer science issues in ubiquitous computing. Commun ACM 36(7):75-84
-
(1993)
Commun ACM
, vol.36
, Issue.7
, pp. 75-84
-
-
Weiser, M.1
-
9
-
-
84900540372
-
Evolution towards smart home environments: Empirical evaluation of three user interfaces
-
Koskela T, Väänänen-Vainio-Mattila K (2004) Evolution towards smart home environments: Empirical evaluation of three user interfaces. PUC 8(3-4):234-240
-
(2004)
PUC
, vol.8
, Issue.3-4
, pp. 234-240
-
-
Koskela, T.1
Väänänen-Vainio-Mattila, K.2
-
10
-
-
0142218904
-
Tools for studying behavior and technology in natural settings
-
Intille SS, Tapia EM, Rondoni J, Beaudin J, Kukla C, Agarwal S, Bao L (2003) Tools for studying behavior and technology in natural settings. In: Proceedings of UbiComp 2003, pp 157-174
-
(2003)
Proceedings of UbiComp 2003
, pp. 157-174
-
-
Intille, S.S.1
Tapia, E.M.2
Rondoni, J.3
Beaudin, J.4
Kukla, C.5
Agarwal, S.6
Bao, L.7
-
13
-
-
0036360781
-
Routing through the mist: Privacy preserving communication in ubiquitous computing environments
-
Al-Muhtadi J, Campbell R, Kapadia A, Mickunas MD, Seung Yi (2002) Routing through the mist: Privacy preserving communication in ubiquitous computing environments. In: Proceedings of International Conference of Distributed Computing Systems (ICDCS) 2002, pp 65-74
-
(2002)
Proceedings of International Conference of Distributed Computing Systems (ICDCS) 2002
, pp. 65-74
-
-
Al-Muhtadi, J.1
Campbell, R.2
Kapadia, A.3
Mickunas, M.D.4
Seung, Yi.5
-
14
-
-
7644223159
-
Maintaining privacy in pervasive computing - Enabling acceptance of sensor-based services
-
Soppera A, Burbridge T (2004) Maintaining privacy in pervasive computing - enabling acceptance of sensor-based services. BT Technol J 22(3):106-118
-
(2004)
BT Technol J
, vol.22
, Issue.3
, pp. 106-118
-
-
Soppera, A.1
Burbridge, T.2
-
16
-
-
84937411601
-
A privacy awareness system for ubiquitous computing environments
-
Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: Proceedings of UbiComp 2002, pp 237-245
-
(2002)
Proceedings of UbiComp 2002
, pp. 237-245
-
-
Langheinrich, M.1
-
17
-
-
34147215372
-
Murky conceptual waters: The public and the private
-
Marx GT (2001) Murky conceptual waters: The public and the private. Ethics Inf Technol 3(3):157-169
-
(2001)
Ethics Inf Technol
, vol.3
, Issue.3
, pp. 157-169
-
-
Marx, G.T.1
-
18
-
-
0002131454
-
Design for privacy in ubiquitous computing environments
-
Bellotti V, Sellen A (1993) Design for privacy in ubiquitous computing environments. In: Proceedings of ECSCW 1993, pp 77-92
-
(1993)
Proceedings of ECSCW 1993
, pp. 77-92
-
-
Bellotti, V.1
Sellen, A.2
-
19
-
-
19944372788
-
Keeping ubiquitous computing to yourself: A practical model for user control of privacy
-
Price B, Adam K, Nuseibeh B (2005) Keeping ubiquitous computing to yourself: A practical model for user control of privacy. Int J Hum Comput Stud 228-253
-
(2005)
Int J Hum Comput Stud
, pp. 228-253
-
-
Price, B.1
Adam, K.2
Nuseibeh, B.3
-
20
-
-
0033279226
-
Taming the wolf in sheep's clothing: Privacy in multimedia communications
-
Adams A, Sasse MA (1999) Taming the wolf in sheep's clothing: Privacy in multimedia communications. In: Proceedings of ACM Multimedia 1999, pp 101-107
-
(1999)
Proceedings of ACM Multimedia 1999
, pp. 101-107
-
-
Adams, A.1
Sasse, M.A.2
-
23
-
-
84937391117
-
Approximate information flows: Socially-based modeling of privacy in ubiquitous computing
-
Jiang X, Hong JI, Landay JA (2002) Approximate information flows: socially-based modeling of privacy in ubiquitous computing. In: Proceedings of UbiComp 2002, pp 176-1993
-
(2002)
Proceedings of UbiComp 2002
, pp. 176-1993
-
-
Jiang, X.1
Hong, J.I.2
Landay, J.A.3
-
24
-
-
22944469290
-
Everyday privacy in ubiquitous computing environments
-
Presented at the Available onlilne at Last checked Oct 3, 2005
-
Lederer S, Dey AK, Mankoff J (2002) Everyday privacy in ubiquitous computing environments. Presented at the workshop on Socially-informed Design of Privacy-enhancing Solutions in Ubiquitous Computing, Conference on Ubiquitous Computing, Ubicomp 2002. Available onlilne at http://www.guir.berkeley.edu/pubs/ubicomp2002/privacyworkshop/papers/ lederer-ubicomp02-workshop.pdf. Last checked Oct 3, 2005
-
(2002)
Workshop on Socially-informed Design of Privacy-enhancing Solutions in Ubiquitous Computing, Conference on Ubiquitous Computing, Ubicomp 2002
-
-
Lederer, S.1
Dey, A.K.2
Mankoff, J.3
-
25
-
-
53449098946
-
The architecture of privacy
-
In Available online at Last checked Oct 3, 2005
-
Lessig L (2005) The architecture of privacy. In: Proceedings of Taiwan NET 1998. Available online at http://www.lessig.org/content/articles/ works/architecture_priv.pdf. Last checked Oct 3, 2005
-
(2005)
Proceedings of Taiwan NET 1998
-
-
Lessig, L.1
-
27
-
-
0346869574
-
Designing for ubiquity: The perception of privacy
-
Beckwith R (2003) Designing for ubiquity: The perception of privacy. Pervasive Comput 40-46
-
(2003)
Pervasive Comput
, pp. 40-46
-
-
Beckwith, R.1
-
28
-
-
24644520728
-
Towards security and privacy for pervasive computing
-
Campbell R, Al-Muhtadi J, Naldurg P, Sampemane G, Mickunas MD (2003) Towards security and privacy for pervasive computing. In: Proceedings of International Symposium on Software Security - Theories and Systems, 2003, pp 1-15
-
(2003)
Proceedings of International Symposium on Software Security - Theories and Systems, 2003
, pp. 1-15
-
-
Campbell, R.1
Al-Muhtadi, J.2
Naldurg, P.3
Sampemane, G.4
Mickunas, M.D.5
-
29
-
-
84990563923
-
Communication boundary management: A theoretical model of managing disclosure of private information between marital couples
-
Petronio S (1991) Communication boundary management: A theoretical model of managing disclosure of private information between marital couples. Commun Theory 1:311-335
-
(1991)
Commun Theory
, vol.1
, pp. 311-335
-
-
Petronio, S.1
-
30
-
-
84900830868
-
Understanding and using context
-
Dey KA (2001) Understanding and using context. Personal Ubiquitous Comput J 5(1):4-7
-
(2001)
Personal Ubiquitous Comput J
, vol.5
, Issue.1
, pp. 4-7
-
-
Dey, K.A.1
|