首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12篇
  免费   0篇
无线电   2篇
自动化技术   10篇
  2006年   1篇
  2005年   1篇
  2004年   2篇
  2003年   2篇
  2002年   2篇
  2001年   1篇
  1999年   2篇
  1994年   1篇
排序方式: 共有12条查询结果,搜索用时 31 毫秒
1.
Internet-enabled cell phones typically accommodate only three to 12 text lines, and their design emphasizes portability. Web interaction has, so far, been a secondary concern. For the most part, automated techniques to address the feature gap between the desktop and these phonetops rely on the notion of transducing-translating HTML and images into formats compatible with small devices, which typically cannot handle HTML content. The authors have developed a Web browsing model that supports navigation and action in separate interfaces, To demonstrate the model, they created m-Links, a middleware proxy system that retrieves Web documents using HTTP, lets users navigate and apply services to Web content, and delivers a suitable user interface to a variety of small Web-capable wireless devices.  相似文献   
2.
Schilit  B.N. 《Computer》2003,36(2):97-99
Despite their apparent simplicity, invisible technologies represent the pinnacle of engineering accomplishments in digital design, networking, user interfaces, and machine learning as well as in the social science disciplines of psychology and anthropology. It takes a lot of science to move technology from the foreground to the background. This paper focuses on leading-edge science that is inspiring the next generation of pervasive computing. It considers how computers are becoming pervasive in part because megahertz, megabits per second, and megabytes have become utilities much like water, gas, and electricity.  相似文献   
3.
Technology for care networks of elders   总被引:1,自引:0,他引:1  
Computer-supported coordinated care uses technology to aid the network of people who support an elder living at home. CSCC supports improved communication among individuals and a balanced distribution of responsibilities to allow the elder to live at home despite increasing care needs. The problem of coordinating the care of elders living at home hasn't been well defined or explored. We focus on using technology to aid the elder's entire support network. To distinguish this space from the broader research issues of computer-supported cooperative work, we call it computer-supported coordinated care and propose that it is a meaningful focus for the pervasive computing, CSCW, and human-computer interaction (HCI) communities.  相似文献   
4.
As networked devices become increasingly ubiquitous, the potential benefits to users increase exponentially. However, this potential can't be fully realized if it is entirely up to developers and manufacturers to expose the combined functionality buried in the expanding network. Recipes for digital living - created and modified by users themselves - offer an easy-to-understand, logically consistent way to capture and share the various ensembles possible in the expanding world of networked components.  相似文献   
5.
Expanding the horizons of location-aware computing   总被引:1,自引:0,他引:1  
Want  R. Schilit  B. 《Computer》2001,34(8):31-34
  相似文献   
6.
Schilit  B. Hong  J. Gruteser  M. 《Computer》2003,36(12):135-137
After more than two decades of hype, computing and communication technologies are finally converging. Java-enabled cell phones run a host of powerful applications including mobile Internet access, while many notebook computers offer high-speed wireless connectivity as a standard feature. The big decision when purchasing a PDA is whether to get integrated cellular service or Wi-Fi capability. Location-based services are emerging as the next killer app in personal wireless devices, but there are few safeguards on location privacy. In fact, the demand for improved public safety is pushing regulation in the opposite direction. Today, when a person reports an emergency from a landline phone by dialing 911 in the United States or 112 in Europe, the system displays the caller's phone number and address to the dispatcher. The US Federal Communications Commission has mandated that, by December 2005, all cellular carriers be able to identify the location of emergency callers using mobile phones to within 50 to 100 meters. However, how cellular carriers and other businesses will use this capability remains open to question. The article looks at some of the areas this capability affects, including: privacy risks; economic damages; location-based spam; intermittent connectivity; user interfaces; network privacy; and privacy protection.  相似文献   
7.
Context-aware communication   总被引:1,自引:0,他引:1  
This article describes how the changing information about an individual's location, environment, and social situation can be used to initiate and facilitate people's interactions with one another, individually and in groups. Context-aware communication is contrasted with other forms of context-aware computing, and we characterize applications in terms of design decisions along two dimensions: the extent of autonomy in context sensing and the extent of autonomy in communication action. A number of context-aware communication applications from the research literature are presented in five application categories. Finally, a number of issues related to the design of context-aware communication applications are presented.  相似文献   
8.
Disseminating active map information to mobile hosts   总被引:10,自引:0,他引:10  
The article describes an active map service (AMS) that supports context-aware computing by providing clients with information about located-objects and how those objects change over time. The authors focus on the communication issues of disseminating information from an active map server to its clients, and in particular, address how to deal with various overload situations that can occur. Simple unicast callbacks to interested clients work well enough if only a few located-objects are moving at any given time and only a few clients wish to know about any given move. However, if many people are moving about in the same region and many clients are interested in their motion, then the AMS may experience overload due to the quadratic nature of the communications involved. This overload affects both the server as well as any slow communications links being used. Mobile distributed computing enables users to interact with many different mobile and stationary computers over the course of the day. Navigating a mobile environment can be aided by active maps that describe the location and characteristics of objects within some region as they change over time  相似文献   
9.
In the 1970s, Alan Kay and his colleagues at Xerox PARC envisioned a dynamic, interactive electronic book. Now, nearly 30 years later, that vision has become a reality. A new kind of personal information appliance-the reading appliance-is emerging as a tool for serious readers. But is the world ready for reading appliances? The authors believe that these appliances are indeed viable. Advances in mobile hardware have made it possible to build the necessary hardware. Additionally, the Web has created a market for online reading by introducing millions of people to it, and books, magazines, newspapers, advertisements, and other printed matter can be produced and read at very low cost. Network based digital libraries increase the availability of information, but people still tend to print the documents to work with them. Electronic book and document readers will neither replace paper nor will they replace desktop computers. Instead, they will occupy their own unique and valuable role in our lives, bringing the paper and computer worlds closer together  相似文献   
10.
Schilit  B.N. Want  R. 《Computer》2005,38(2):99-101
Mobile devices are becoming smarter and less reliant on wireless communication, giving users real-time access to an entire digital world. The exponential growth in flash and disk storage is likely to continue for several years as manufacturers digitally encode more types of media and demand increasingly compact formats.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号