Results 11 - 20
of
41,780
Context-aware applications for a Pocket PC
, 2007
"... After one and a half years ’ studying for this Master’s degree, I learned one thing, that I could never have any of these accomplishments without the supports and encouragements from a lot of people whom I would like to give my sincerely appreciation. First and foremost, I would like to express my d ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
After one and a half years ’ studying for this Master’s degree, I learned one thing, that I could never have any of these accomplishments without the supports and encouragements from a lot of people whom I would like to give my sincerely appreciation. First and foremost, I would like to express my deepest gratitude to my adviser and examiner: Professor Gerald Q. Maguire. You are not only advising me in an academic way which is the right path for a Master’s engineer, but also you are guiding and helping me to build the success for my future career. I can not imagine how much time you spent for commenting my report, which gives me so many valuable feedbacks and advises. Also I can not forget the lectures you gave me for how to be a person that does not afraid of any challenges. If I do take the academic path, I only hope that I am able to do half of what you have done to me. I would also like to thank Athanasios Karapantelakis as being the technical stuff to help me with my implementation and explaining so many questions that I am not clear of. I felt quite lucky of being in such a good research environment with so many nice people, such as Alisa Devlic. This thesis is part of the project which consists of three Master thesis. So here I would like
G.: MIAT-WM5: forensic acquisition for Windows mobile PocketPC
- In: 2008 Workshop on Security and High Performance Computing Systems, part of HPCS
, 2008
"... A PocketPC equipped with phone capabilities could be seen as an advanced smartphone, providing more computational power and available resources. Even though several technologies have emerged for PDAs and Smartphones forensic acquisition and analysis, only few technologies and products are capable of ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
A PocketPC equipped with phone capabilities could be seen as an advanced smartphone, providing more computational power and available resources. Even though several technologies have emerged for PDAs and Smartphones forensic acquisition and analysis, only few technologies and products are capable
COMPARISON OF DETAILED AND GENERALIZED CAMPUS MAPS USED WITH A POCKET PC ABSTRACT
"... Map services have been integrated with mobile device services to allow users to get information at any place and at any time. Simple maps for small mobile device screens are necessary. Map generalization is a method for producing less complicated maps with more desirable properties. For this study, ..."
Abstract
- Add to MetaCart
programs were also examined. After making maps for the mobile device, the generalized maps were evaluated through usability tests. The study participants explored the original maps and the generalized maps with a pocket PC and carried out navigation tasks. They also evaluated whether the generalized
PocketHouseAR- An approach to use a Pocket PC as interaction tool for Augmented Reality
"... Today Augmented Reality is one of the most promising technologies in the field of computer graphics. The enrichment of the real world with virtual content can be useful in a large number of applications. Depending on the particular application, the user is more or less immersed in the virtual world. ..."
Abstract
- Add to MetaCart
. Therefore the best method of user interaction may be different in every case. Obviously there is still a lot of research which has to be done to increase the usability of Augmented Reality applications. At the same time, new ways of human-computer interaction are becoming common, for example the Pocket PC
A Viability Analysis of a Secure VoIP and Instant Messaging System on a Pocket PC Platform
"... Abstract:- We propose a secure full-duplex VoIP and instant messaging system on a Pocket PC platform, allowing for session key transport using a public-key protocol and encrypted text or voice communication using a private-key algorithm. The full-duplex VoIP scheme presents good performance for long ..."
Abstract
- Add to MetaCart
Abstract:- We propose a secure full-duplex VoIP and instant messaging system on a Pocket PC platform, allowing for session key transport using a public-key protocol and encrypted text or voice communication using a private-key algorithm. The full-duplex VoIP scheme presents good performance
Digital Game-Based Learning
"... [Green and Bavelier, 2003] has grabbed national attention for suggesting that playing “action ” video and computer games has the positive effect of enhancing students ’ visual selective attention. But that finding is just one small part of a more important message that all parents and educators need ..."
Abstract
-
Cited by 519 (0 self)
- Add to MetaCart
[Green and Bavelier, 2003] has grabbed national attention for suggesting that playing “action ” video and computer games has the positive effect of enhancing students ’ visual selective attention. But that finding is just one small part of a more important message that all parents and educators need to hear: Video games are not the enemy, but the best opportunity we have to engage our kids in real learning.
A survey of context-aware mobile computing research
, 2000
"... Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information (such as user location, time of day, nearby people and devices, and user activity). Since it was proposed about a decade ago, many researchers have studied this topi ..."
Abstract
-
Cited by 683 (2 self)
- Add to MetaCart
Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information (such as user location, time of day, nearby people and devices, and user activity). Since it was proposed about a decade ago, many researchers have studied this topic and built several context-aware applications to demonstrate the usefulness of this new technology. Context-aware applications (or the system infrastructure to support them), however, have never been widely available to everyday users. In this survey of research on context-aware systems and applications, we looked in depth at the types of context used and models of context information, at systems that support collecting and disseminating context, and at applications that adapt to the changing context. Through this survey, it is clear that context-aware research is an old but rich area for research. The difficulties and possible solutions we outline serve as guidance for researchers hoping to make context-aware computing a reality. 1.
Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment
- In IEEE Infocom
, 2001
"... Energy-aware design and evaluation of network protocols requires knowledge of the energy consumption behavior of actual wireless interfaces. But little practical information is available about the energy consumption behavior of well-known wireless network interfaces and device specifications do not ..."
Abstract
-
Cited by 655 (3 self)
- Add to MetaCart
Energy-aware design and evaluation of network protocols requires knowledge of the energy consumption behavior of actual wireless interfaces. But little practical information is available about the energy consumption behavior of well-known wireless network interfaces and device specifications do not provide information in a form that is helpful to protocol developers. This paper describes a series of experiments which obtained detailed measurements of the energy consumption of an IEEE 802.11 wireless network interface operating in an ad hoc networking environment. The data is presented as a collection of linear equations for calculating the energy consumed in sending, receiving and discarding broadcast and pointto -point data packets of various sizes. Some implications for protocol design and evaluation in ad hoc networks are discussed. Keywords---energy consumption, IEEE 802.11, ad hoc networks I.
Cyberguide: A Mobile Context-Aware Tour Guide
, 1996
"... Future computing environments will free the user from the constraints of the desktop. Applications for a mobile environment should take advantage of contextual information, suach as position, to offer greater services to the user. In his paper, we present the Cyberguide project, in which we are buil ..."
Abstract
-
Cited by 642 (24 self)
- Add to MetaCart
Future computing environments will free the user from the constraints of the desktop. Applications for a mobile environment should take advantage of contextual information, suach as position, to offer greater services to the user. In his paper, we present the Cyberguide project, in which we are building prototypes of a mobile context-aware tour guide. Knowledge of the user's current location, as well as a history of past locations, are used to provide more of the kind of services that we come to expect from a real tour guide. We describe the architecture and features of a variety of Cyberguide prototypes developed for indoor and outdoor use on a number of different hand-held platforms. We also discuss the general research issues that have emerged in our context-aware applications development in a mobile environment.
Results 11 - 20
of
41,780