[1]
|
Bashir, R.N., Qadri, S., Saleem, R.M., Naeem, M. and Ghafoor, Y. (2014) Human Computer Interaction (HCI) in Ubiquitous Computing. International Journal of Innovation and Applied Studies, 9, 534.
|
[2]
|
Weiser, M. (1991) The Computer for the 21st Century. Scientific American, 265, 94-104. http://dx.doi.org/10.1038/scientificamerican0991-94
|
[3]
|
Fouad, R., Hashem, M., Badr, N. and Talha, H. (2011) Exploring a Hybrid of Geospatial Semantic Information in Ubi- quitous Computing Environments. Global Journal of Computer Science and Technology, 11(19).
|
[4]
|
Brodersen, C. and Kristensen, J.F. (2004) Interaction through Negotiation. Proceedings of the 3rd Nordic Conference on Human-Computer Interaction, 259-268. http://dx.doi.org/10.1145/1028014.1028054
|
[5]
|
Sandhu, R. (2013) Shifting Paradigm from Mobile Computing to Ubiquitous/Pervasive Computing. Indexing Journal Indexing: Our Journal Has Recently Joined International Database for Indexing with DOAJ, Index Copernicus, Open J Gate, CAS, Google Scholar.
|
[6]
|
(2013) Pervasive Computing. IEEE Computer Society, 12, 18-20.
|
[7]
|
Sharifi, A. and Abdulahshah, M.K. (2013). Security Attacks and Solutions on Ubiquitous Computing Network. International Journal of Engineering and Innovative Technology (IJEIT), 3, 40-45.
|
[8]
|
Ye, J. and Dobson, S. Pervasive Computing Needs Better Situation—Awareness. Awareness Magazine.http://dx.doi.org/10.2417/3201201.003943
|
[9]
|
Ismail, A., Hajjar, A.E.S.A. and Ismail, Z. (2011) A New System Architecture for Pervasive Computing. arXiv Preprint arXiv:1108.2389.
|
[10]
|
Abowd, G.D. and Mynatt, E.D. (2000) Charting Past, Present, and Future Research in Ubiquitous Computing. ACM Transactions on Computer-Human Interaction (TOCHI), 7, 29-58. http://dx.doi.org/10.1145/344949.344988
|
[11]
|
Joshi, Y. and Prasad, L. (2012) Pervasive Computing Goals and Its Challenges for Modern Era. International Journal of Computer Science and Network (IJCSN), Volume 1, Issue 3, ISSN 2277-5420. www.ijcsn.org
|
[12]
|
Nielsen, J. (1993) Noncommand User Interfaces. Communications of the ACM, 36, 83-99. http://dx.doi.org/10.1145/255950.153582
|
[13]
|
Morariu, A., Clipa, B.D., De Lausnay, S., De Strycker, L. and Pentiuc, S. (2011) Combining Natural Human-Computer Interaction and Wireless Communication. Journal of Applied Computer Science & Mathematics, 5, 47-52.
|
[14]
|
Schmidt, A. (2013) Context-Aware Computing: Context-Awareness, Context-Aware User Interfaces, and Implicit Interaction. In: Soegaard, M. and Dam, R.F., Eds., The Encyclopedia of Human-Computer Interaction, 2nd Edition, The Interaction Design Foundation, Aarhus.
|
[15]
|
Chihani, B., Bertin, E. and Crespi, N. (2011) A Comprehensive Framework for Context-Aware Communication Services. Proceedings of the 15th International Conference on Intelligence in Next Generation Networks (ICIN), Berlin, 4-7 October 2011, 52-57. http://dx.doi.org/10.1109/icin.2011.6081102
|
[16]
|
Chihani, B., Bertin, E., Jeanne, F. and Crespi, N. (2011) Context-Aware Systems: A Case Study. In: Cherifi, H., Zain, J.M. and El-Qawasmeh, E., Eds., Digital Information and Communication Technology and Its Applications, Springer, Berlin, 718-732. http://dx.doi.org/10.1007/978-3-642-22027-2_60
|
[17]
|
Karray, F., Alemzadeh, M., Saleh, J.A. and Arab, M.N. (2008) Human-Computer Interaction: Overview on State of the Art. International Journal on Smart Sensing and Intelligent Systems.
|
[18]
|
Hachman, M. (2002) Canesta Says “Virtual Keyboard” Is Reality. http://www.extremetech.com/extreme/51958-canesta-says-virtual-keyboard-is-reality
|
[19]
|
Grudin, J. (2011) A Moving Target: The Evolution of HCI. In: Jacko, J., Ed., The Human-Computer Interaction Handbook, 3rd Edition, Taylor & Francis, New York.
|
[20]
|
Oviatt, S., Cohen, P., Wu, L., Duncan, L., Suhm, B., Bers, J., et al. (2000) Designing the User Interface for Multimodal Speech and Pen-Based Gesture Applications: State-of-the-Art Systems and Future Research Directions. Human-Computer Interaction, 15, 263-322. http://dx.doi.org/10.1207/S15327051HCI1504_1
|
[21]
|
Gavrila, D.M. (1999) The Visual Analysis of Human Movement: A Survey. Computer Vision and Image Understanding, 73, 82-98. http://dx.doi.org/10.1006/cviu.1998.0716
|
[22]
|
Sibert, L.E. and Jacob, R.J. (2000) Evaluation of Eye Gaze Interaction. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, The Hague, 1-6 April 2000, 281-288.
|
[23]
|
Zacharia, K., Elias, E.P. and Varghese, S.M. (2011) Modelling Gesture Based Ubiquitous Applications. http://arxiv.org/abs/1112.2044
|
[24]
|
Poslad, S. (2011) Ubiquitous Computing: Smart Devices, Environments and Interactions. John Wiley & Sons, Chichester.
|
[25]
|
Chandini, N., Reddy, N.C.S. and Bashwanth, N. (2014) Pervasive Computing Goals and Its Challenges for New Epoch. International Journal of Advanced Research in Computer and Communication Engineering, 3, 6437-6439.
|
[26]
|
Rao, D.H. (2014) A Scenario Based Approach for Dealing with Challenges in a Pervasive Computing Environment. http://arxiv.org/ftp/arxiv/papers/1405/1405.6661.pdf
|
[27]
|
Das, S.K., Kant, K. and Zhang, N. (2012) Handbook on Securing Cyber-Physical Critical Infrastructure. Elsevier, Amsterdam.
|
[28]
|
Roy, N., Misra, A., Julien, C., Das, S.K. and Biswas, J. (2011) An Energy-Efficient Quality Adaptive Framework for Multi-Modal Sensor Context Recognition. Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom), Seattle, 21-25 March 2011, 63-73. http://dx.doi.org/10.1109/percom.2011.5767596
|
[29]
|
Rajkumar, R. and Lee, I. (2006) NSF Workshop on Cyber-Physical Systems. 16-17 October 2006, Austin.http://varma.ece.cmu.edu/CPS/
|
[30]
|
Hayes, G.R., Poole, E.S., Iachello, G., Patel, S.N., Grimes, M., Abowd, G.D. and Truong, K.N. (2007) Physical, Social, and Experiential Knowledge in Pervasive Computing Environments. IEEE Pervasive Computing, 6, 56-63. http://dx.doi.org/10.1109/MPRV.2007.82
|
[31]
|
Campbell, A.T., Eisenman, S.B., Lane, N.D., Miluzzo, E., Peterson, R., Lu, H., et al. (2008) The Rise of People-Centric Sensing. IEEE Internet Computing, 12, 12-21. http://dx.doi.org/10.1109/MIC.2008.90
|
[32]
|
Leung, A., Sheng, Y. and Cruickshank, H. (2007) The Security Challenges for Mobile Ubiquitous Services. Information Security Technical Report, 12, 162-171. http://dx.doi.org/10.1016/j.istr.2007.05.001
|
[33]
|
Pallapa, G., Kumar, M. and Das, S.K. (2007) Privacy Infusion in Ubiquitous Computing. Proceedings of the Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, Philadelphia, 6-10 August, 1-8. http://dx.doi.org/10.1109/mobiq.2007.4451030
|
[34]
|
Ganesh, M. and Krishna, S.M. (2010) Privacy Enhanced Context-Aware Architecture for Ubiquitous Computing. International Journal of Electronics and Computer Science Engineering, 2, 53-64.
|
[35]
|
Khiabani, H., Sidek, Z.M. and Manan, J.L.A. (2010) Towards a Unified Trust Model in Pervasive Systems. Proceedings of the 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Perth, 20-23 April 2010, 831-835. http://dx.doi.org/10.1109/waina.2010.144
|
[36]
|
Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G. and Mickunas, M.D. (2003) Towards Security and Privacy for Pervasive Computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H. and Yonezawa, A., Eds., Software Security—Theories and Systems, Springer, Berlin, 1-15. http://dx.doi.org/10.1007/3-540-36532-X_1
|
[37]
|
Forné, J., Hinarejos, F., Marín, A., Almenárez, F., Lopez, J., Montenegro, J.A., et al. (2010) Pervasive Authentication and Authorization Infrastructures for Mobile Users. Computers & Security, 29, 501-514.http://dx.doi.org/10.1016/j.cose.2009.09.001
|
[38]
|
Wang, G., Zhou, W. and Yang, L.T. (2013) Trust, Security and Privacy for Pervasive Applications. The Journal of Supercomputing, 64, 661-663. http://dx.doi.org/10.1007/s11227-013-0953-4
|
[39]
|
Zhou, B., Shi, Q. and Merabti, M. (2007) Towards Energy-Efficient Intrusion Detection in Pervasive Computing. Proceedings of the IEEE International Conference on Communications, Glasgow, 24-28 June 2007, 1417-1422. http://dx.doi.org/10.1109/icc.2007.238
|
[40]
|
Bharadwaj, S., Vatsa, M. and Singh, R. (2014) Biometric Quality: A Review of Fingerprint, Iris, and Face. EURASIP Journal on Image and Video Processing, 2014, 34. http://dx.doi.org/10.1186/1687-5281-2014-34
|