 | Privacy in Mobile and Pervasive Computing Marc Langheinrich, Florian Schaub It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and s… Publication Date: December, 2018
Read More
|
 | Mobile User Research Sunny Consolvo, Frank R. Bentley, Eric B. Hekler, Sayali S. Phatak This book will give you a practical overview of several methods and approaches for designing mobile technologies and conducting mobile user research, including how to understand behavior and evaluate how such technologies are being (or may be) used o… Publication Date: May, 2017
Read More
|
 | Pervasive Displays Nigel Davies, Sarah Clinch, Florian Alt Fueled by falling display hardware costs and rising demand, digital signage and pervasive displays are becoming ever more ubiquitous. Such systems have traditionally been used for advertising and information dissemination, with digital signage common… Publication Date: 04/01/2014
Read More
|
 | Quality of Service in Wireless Networks Over Unlicensed Spectrum Klara Nahrstedt This Synthesis Lecture presents a discussion of Quality of Service (QoS) in wireless networks over unlicensed spectrum. The topic is presented from the point of view of protocols for wireless networks (e.g., 802.11) rather than the physical layer poi… Publication Date: 01/01/2011
Read More
|
 | Mobile Platforms and Development Environments Sumi Helal, Raja Bose, Wendong Li Mobile platform development has lately become a technological war zone with extremely dynamic and fluid movement, especially in the smart phone and tablet market space. This Synthesis lecture is a guide to the latest developments of the key mobile pl… Publication Date: 01/01/2012
Read More
|
 | Cyber Foraging Jason Flinn This lecture provides an introduction to cyber foraging, a topic that lies at the intersection of mobile and cloud computing. Cyber foraging dynamically augments the computing resources of mobile computers by opportunistically exploiting fixed comput… Publication Date: 01/01/2012
Read More
|
 | The Landscape of Pervasive Computing Standards Sumi Helal This lecture presents a first compendium of established and emerging standards in pervasive computing systems. The lecture explains the role of each of the covered standards and explains the relationship and interplay among them. Hopefully, the lectu… Publication Date: 01/01/2010
Read More
|
 | Replicated Data Management for Mobile Computing Douglas B. Terry Managing data in a mobile computing environment invariably involves caching or replication. In many cases, a mobile device has access only to data that is stored locally, and much of that data arrives via replication from other devices, PCs, and serv… Publication Date: 01/01/2008
Read More
|
 | Location Systems Anthony LaMarca, Eyal de Lara Advances in electronic location technology and the coming of age of mobile computing have opened the door for location-aware applications to permeate all aspects of everyday life. Location is at the core of a large number of high-value applications r… Publication Date: 01/01/2008
Read More
|
 | Application Design for Wearable Computing Dan Siewiorek, Asim Smailagic, Thad Starner, The confluence of decades of computer science and computer engineering research in multimodal interaction (e.g., speech and gesture recognition), machine learning (e.g., classification and feature extraction), software (e.g., web browsers, distribute… Publication Date: 01/01/2008
Read More
|
 | A Practical Guide to Testing Wireless Smartphone Applications Julian Harty Testing applications for mobile phones is difficult, time-consuming, and hard to do effectively. Many people have limited their testing efforts to hands-on testing of an application on a few physical handsets, and they have to repeat the process ever… Publication Date: 01/01/2009
Read More
|
 | RFID Explained Roy Want This lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a p… Publication Date: 01/01/2006
Read More
|
 | Controlling Energy Demand in Mobile Computing Systems Carla Schlatter Ellis This lecture provides an introduction to the problem of managing the energy demand of mobile devices. Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in… Publication Date: 01/01/2007
Read More
|