نتایج جستجو برای: personal computing

تعداد نتایج: 562810  

Journal: :JASIST 2010
Ofer Bergman Steve Whittaker Mark Sanderson Rafi Nachmias Anand Ramamoorthy

Folder navigation is themainway that personal computer users retrieve their own files. People dedicate considerable time to creating systematic structures to facilitate such retrieval. Despite the prevalence of both manual organization and navigation, there is very little systematic data about how people actually carry out navigation, or about the relation between organization structure and ret...

2007
B. Nuseibeh A. Bandara B. Price A. Joinson M. Sloman E. Lupu N. Dulay A. Russo

The age of Ubiquitous Computing is approaching fast: most people in the UK over the age of 8 carry mobile phones [5], which are becoming increasingly sophisticated interactive computing devices. Location-based services are also increasing in popularity and sophistication [6]. There are many tracking and monitoring devices being developed that have a range of potential applications, from support...

2014
John K. Zao Tchin-Tze Gan Chun-Kai You Cheng-En Chung Yu-Te Wang Sergio José Rodríguez Méndez Tim Mullen Chieh Yu Christian Kothe Ching-Teng Hsiao San-Liang Chu Ce-Kuen Shieh Tzyy-Ping Jung

EEG-based Brain-computer interfaces (BCI) are facing basic challenges in real-world applications. The technical difficulties in developing truly wearable BCI systems that are capable of making reliable real-time prediction of users' cognitive states in dynamic real-life situations may seem almost insurmountable at times. Fortunately, recent advances in miniature sensors, wireless communication ...

2008
Muhammad Amin Shabaz Khan Tamleek Ali Saleem Gul

Until recently, all the security measures have addressed servers or networks while clients or network endpoints have missed the required security concerns relatively. Most of the mechanisms safeguarding endpoints (clients) are software based. Making endpoints survive in open and reasonably exposed environments-like internet-demand that client security should stand by a tried and true dependence...

2012
Vijay Laxmi Navdeep Kaur T. D. Braun H. J. Siegel A. A. Maciejewski N. Beck A. I. Reuther J. P. Robertson M. D. Theys C. S. Yeo M. Maheswaran S. Ali D. Hensgen L. L. Boloni B. Yao

In Desktop grid computing environment, range of computing devices coexists starting from personal computers to supercomputers. These devices are inter-connected to provide a variety of computational capabilities in order to execute applications that have diverse requirements. An important decision for such computing infrastructure is how to optimally allocate computational and communication res...

2016
Yaqin Zhang Yushi Shen Ling Wu Shaofeng Liu

Cloud-era Information Technology (IT) contains three main themes: The information hub (cloud), network communications (pipes), and intelligent terminals. In this chapter, the developmental stages of these three main components of cloud computing are discussed, with emphasis on future development. The Internet of things is also examined, which is expected to thrive as a direct result of the deve...

2009
Spyros Veronikis Giannis Tsakonas Christos Papatheodorou

The present chapter introduces digital library services’ utilization through handheld devices, such as personal digital assistants (PDAs) and smartphones. It argues that handheld devices proliferation justifies the term digital library in terms of anywhere-anytime access, and retrieval and management of information. Furthermore, these devices constitute powerful information harvesting tools tha...

Journal: :IJDTIS 2010
Jan-Erik Ekberg

Trusted computing (TC) denotes a set of security-related hardware and software mechanisms that make a computing device work in a consistent manner, even in the presence of external attacks. For personal computers, TC typically is interpreted to be a software architecture designed around the trusted platform module (TPM), a hardware chip residing on the motherboard and implemented according to t...

2002
Manuel Roman Roy H. Campbell

Ubiquitous computing challenges the conventional notion of a user logged into a personal computing device, whether it is a desktop, a laptop, or a digital assistant. When the physical environment of a user contains hundreds of networked computer devices each of which may be used to support one or more user applications, the notion of personal computing becomes inadequate. Further, when a group ...

2003
Manuel Román Roy H. Campbell

Ubiquitous computing challenges the conventional notion of a user logged into a personal computing device, whether it is a desktop, a laptop, or a digital assistant. When the physical environment of a user contains hundreds of networked computer devices each of which may be used to support one or more user applications, the notion of personal computing becomes inadequate. Further, when a group ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید