Pervasive systems and ubiquitous computing / A. Genco and S. Sorce.
Publication details: Southampton ; Boston : WIT Press, c2010.Description: 141 p. : ill. ; 24 cmISBN:- 9781845644826 (hbk.)
- 9781845644826
- 004.165 GEN GEN 22
Item type | Current library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Book Open Access | Engineering Library | 004.165 GEN 1 (Browse shelf(Opens below)) | 1 | Available | BUML23070551 | |
Book Open Access | Engineering Library | 004.165 GEN 2 (Browse shelf(Opens below)) | 2 | Available | BUML23070552 |
Browsing Engineering Library shelves Close shelf browser (Hides shelf browser)
No cover image available | ||||||||
004.16 VAH 2 Embedded system design : a unified hardware/software introduction / | 004.16078 STA 1 Standard Laboratory for Microcomputer Technology / | 004.165 GEN 1 Pervasive systems and ubiquitous computing / | 004.165 GEN 2 Pervasive systems and ubiquitous computing / | 004.165 WOR 1 PC configuration handbook : a complete guide to assembling, enhancing, and maintaining your PC / | 004.2/1 WHI 1 Systems analysis and design methods / | 004.2 MAN 1 Computer system architecture / |
Chapter 1 Introduction
Chapter 2 Augmented Reality and Virtual World
1 From virtual reality to augmented reality
2 AR technologies
3 AR and VW projects
Chapter 3 Human computer interaction
1 Introduction
2 Implicit and explicit HCI
3 Adaptive and intelligent HCI technologies and methodologies
4 Input/output devices
5 Usability
6 Portability
7 Conclusions
Chapter 4 Disappearing hardware
1 Introduction
2 Invisibility, a key paradigm for ubiquitous systems
3 Evolving hardware
4 Building ubiquitous systems
5 Invisibility: problems and limits
6 Conclusions
Chapter 5 Wireless technologies for pervasive systems
1 Wireless data transmission
2 Bluetooth
3 Wi-Fi
4 IrDA
5 HomeRF
etc
Chapter 6 Positioning in pervasive systems
1 Introduction
2 position detection techniques
3 Properties and features of positioning systems
4 Positioning system
Chapter 7 Security in ubiquitous computing
1 Introduction
2 Security protocols
3 Encryption
4 Bluetooth architecture
5 Authentication systems
etc
Chapter 8 Service discovery
1 Introduction
2 Disk and server scheduling algorithms
3 Context-awareness
Includes bibliographical references and index.
There are no comments on this title.