loading
Documentation
  • Login
  • Sign-Up

Research.Publish.Connect.

Proceedings

Proceedings of the 2nd International Workshop on Ubiquitous Computing

May 24-28, 2005, in Miami, United States

ISBN: 972-8865-24-4

Conference Link: http://www.iceis.org

Foreword: The increased availability and connectivity of computing and communication devices opens up a new era of "anywhere" and "anytime" computing. As such devices become more widespread and accepted by the user community, these devices are likely to become so pervasive that most users will take them for granted. This is the general vision of Ubiquitous Computing (UC) -- essentially to push computational services out of conventional desktop computers into environments characterised by transparent forms of interactivity. Significant research and commercial effort is necessary to fully realise the UC vision. The support technologies for achieving UC are improving at an impressive pace. Most of the research and development activities are currently aimed at improving the devices themselves and the technologies these devices will use to communicate. In addition to the hardware and communications infrastructure needed to support UC, it is also necessary to fully understand (and appreciate) the requirements of users and developers who will utilise/develop on top of this infrastructure. It is necessary to support developers with software environments and tools to help then make better use of UC infrastructure. Many of these tools do not exist at present -- and often add-ons to existing software design tools are made use of. Issues of coordination and interaction between a community or network of such devices also becomes significant. Such de-centralised management approaches need to be analysed and investigated in more depth. On the other hand, it is also important to identify additional applications that may become available on UC infrastructure to encourage new business opportunities for end-users. A large number of papers were submitted to this workshop, and covered a range of topics ranging from application examples to core UC infrastructure. A, rather coarse, classification of the papers accepted for this workshop is provided below. Some papers stride across multiple topics -- hence the intention here is primarily to provide some guidance to a reader. Our coverage and selection of papers is also intended to reflect the key research questions in the UC area. Papers cover: • Trust, Security, and Privacy Issues. • Interoperability and Semantics Issues. • Reliability, Performance, and Error Tolerance Issues. • Access Control, Discovery, and Location Issues. • Applications. We would like to thank all the authors who submitted papers to this workshop. In addition, we would like to thank the anonymous referees for their time and efforts to review submissions. Finally, our thanks go to Vitor Pedrosa or his great support. (More)

Volumes:

Vol. 1 - 972-8865-24-4

Show papers

P. 94 - 100
DOI:10.5220/0002571300940100

Show authors