Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Export
Sort by: Relevance
  • Research Article
  • Cite Count Icon 16
  • 10.2200/s00106ed1v01y200801mpc003
Application Design for Wearable Computing
  • Jan 1, 2008
  • Synthesis Lectures on Mobile and Pervasive Computing
  • Dan Siewiorek + 2 more

The confluence of decades of computer science and computer engineering research in multimodal interaction (e.g., speech and gesture recognition), machine learning (e.g., classification and feature extraction), software (e.g., web browsers, distributed agents), electronics (e.g., energy-efficient microprocessors, head-mounted displays), design methodology in user-centered design, and rapid prototyping have enabled a new class of computerswearable computers. The lecture takes the viewpoint of a potential designer or researcher in wearable computing. Designing wearable computers requires attention to many different factors because of the computers closeness to the body and its use while performing other tasks. For the purposes of discussion, we have created the UCAMP framework, which consists of the following factors: user, corporal, attention, manipulation, and perception. Each of these factors and their importance is described. A number of example prototypes developed by the authors, as well as by other researchers, are used to illustrate these concepts. Wearable computers have established their first foothold in several application domains, such as vehicle and aircraft maintenance and manufacturing, inspection, language translation, and other areas.

  • Research Article
  • Cite Count Icon 12
  • 10.2200/s00132ed1v01y200807mpc005
Replicated Data Management for Mobile Computing
  • Jan 1, 2008
  • Synthesis Lectures on Mobile and Pervasive Computing
  • Douglas B Terry

Managing data in a mobile computing environment invariably involves caching or replication. In many cases, a mobile device has access only to data that is stored locally, and much of that data arrives

  • Journal Issue
  • 10.2200/mpc.2008.3.issue-1
  • Jan 1, 2008
  • Synthesis Lectures on Mobile and Pervasive Computing

  • Research Article
  • 10.2200/s00089ed1v01y200704mpc002
Controlling Energy Demand in Mobile Computing Systems
  • Jan 1, 2007
  • Synthesis Lectures on Mobile and Pervasive Computing
  • Carla Schlatter Ellis

This lecture provides an introduction to the problem of managing the energy demand of mobile devices. Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in mobile computing and wireless communication. The focus of this lecture is on a systems approach where software techniques exploit state-of-the-art architectural features rather than relying only upon advances in lower-power circuitry or the slow improvements in battery technology to solve the problem. Fortunately, there are many opportunities to innovate on managing energy demand at the higher levels of a mobile system. Increasingly, device components offer low power modes that enable software to directly affect the energy consumption of the system. The challenge is to design resource management policies to effectively use these capabilities.

  • Journal Issue
  • 10.2200/mpc.2007.2.issue-1
  • Jan 1, 2007
  • Synthesis Lectures on Mobile and Pervasive Computing

  • Research Article
  • Cite Count Icon 25
  • 10.2200/s00040ed1v01y200602mpc001
RFID Explained: A Primer on Radio Frequency Identification Technologies
  • Jan 1, 2006
  • Synthesis Lectures on Mobile and Pervasive Computing
  • Roy Want

  • Research Article
  • Cite Count Icon 36
  • 10.2200/s00040ed1v01200607mpc001
RFID Explained: A Primer on Radio Frequency Identification Technologies
  • Jan 1, 2006
  • Synthesis Lectures on Mobile and Pervasive Computing
  • Roy Want

This lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a power source (active tags), and those that are powered by the tag interrogation signal (passive tags); the focus here is on passive tags. An overview of the principles of the technology divides passive tags into devices that use either near field or far field coupling to communicate with a tag reader. The strengths and weaknesses of the approaches are considered, along with the standards that have been put in place by ISO and EPCGlobal to promote interoperability and the ubiquitous adoption of the technology. A section of the lecture has been dedicated to the principles of reading co-located tags, as this represents a significant challenge for a technology that may one day be able to automatically identify all of the items in your shopping cart in a just few seconds. In fact, RFID applications are already quite extensive and this lecture classifies the primary uses. Some variants of modern RFID can also be integrated with sensors enabling the technology to be extended to measure parameters in the local environment, such as temperature & pressure. The uses and applications of RFID sensors are further described and classified. Later we examine important lessons surrounding the deployment of RFID for the Wal-Mart and the Metro AG store experiences, along with deployments in some more exploratory settings. Extensions of RFID that make use of read/write memory integrated with the tag are also discussed, in particular looking at novel near term opportunities. Privacy and social implications surrounding the use of RFID inspire recurring debates whenever there is discussion of large scale deployment; we examine the pros and cons of the issues and approaches for mitigating the problems. Finally, the remaining challenges of RFID are considered and we look to the future possibilities for the technology.

  • Journal Issue
  • 10.2200/mpc.2006.1.issue-1
  • Jan 1, 2006
  • Synthesis Lectures on Mobile and Pervasive Computing