Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,064,594 papers from all fields of science
Search
Sign In
Create Free Account
Ubiquitous computing
Known as:
Pervasive Computing
, Ubiquitous games
, Ubiquitous Software
Expand
Ubiquitous computing (or "ubicomp") is a concept in software engineering and computer science where computing is made to appear anytime and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
3G MIMO
Adaptation (computer science)
Ambient Devices
Automatic identification and data capture
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Location in Ubiquitous Computing
A. Varshavsky
,
Shwetak N. Patel
Ubiquitous Computing
2010
Corpus ID: 17211912
ContentS 7.
Highly Cited
2009
Highly Cited
2009
DWT-SVD Combined Full Band Robust Watermarking Technique for Color Images in YUV Color Space
V. Santhi
,
A. Thangavelu
2009
Corpus ID: 5660341
Abstract- Due to the advancement in Computer technology and readily available tools, it is very easy for the unknown users to…
Expand
Review
2009
Review
2009
Ubiquitous Computing in Education: Invisible Technology, Visible Impact
Leonard G. Trujillo
2009
Corpus ID: 58823051
When first hearing of the title of this text I was eager to acquire it and read it for my own enrichment as well as for the…
Expand
Review
2008
Review
2008
EPC Network Architecture
D. Ranasinghe
,
M. Harrison
,
P. Cole
2008
Corpus ID: 56529213
The concept of a “Networked Physical World” originated from the Auto-ID Center, now called the Auto-ID Labs [1]. Such a “World…
Expand
Highly Cited
2008
Highly Cited
2008
Risk Assessment and Management in Pervasive Computing: Operational, Legal, Ethical, and Financial Perspectives
Varuna Godara
2008
Corpus ID: 55796531
Today, e-businesses are adopting pervasive computing with passion but at the same time aware of the operational, ethical, legal…
Expand
Highly Cited
2005
Highly Cited
2005
Categorisation and modelling of quality in context information
M. A. Razzaque
,
S. Dobson
,
P. Nixon
International Joint Conference on Artificial…
2005
Corpus ID: 16041833
Pervasive Computing environments are dynamic and heterogeneous. They are required to be self-managing and autonomic, demanding…
Expand
Highly Cited
2005
Highly Cited
2005
Security parallels between people and pervasive devices
Stephen A. Weis
Third IEEE International Conference on Pervasive…
2005
Corpus ID: 1646419
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost…
Expand
Highly Cited
2003
Highly Cited
2003
Automating Service Dependency Management in a Service-Oriented Component Model
H. Cervantes
,
R. Hall
2003
Corpus ID: 7018614
This paper describes a mechanism to automate service dependency management in a service-oriented component model. The impetus…
Expand
Highly Cited
2002
Highly Cited
2002
Development of situation-aware application software for ubiquitous computing environments
S. Yau
,
Yu Wang
,
F. Karim
Proceedings 26th Annual International Computer…
2002
Corpus ID: 8909283
Ubiquitous computing represents the concept of computing everywhere, making computing and communication essentially transparent…
Expand
Highly Cited
2000
Highly Cited
2000
Practical Intrusion Detection Handbook
Paul Proctor
2000
Corpus ID: 109760243
From the Publisher: The definitive guide to understanding, selecting, and deploying intrusion detection in the enterprise…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE