By Topic

IEEE Pervasive Computing

Issue 4 • Date Oct.-Dec. 2002

Filter Results

Displaying Results 1 - 14 of 14
  • Wearable computing: is it just hype? [From the Editor in Chief]

    Publication Year: 2002, Page(s):2 - 3
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (1022 KB) | HTML iconHTML
    Freely Available from IEEE
  • What knows where you are?

    Publication Year: 2002, Page(s):4 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2357 KB)

    What's been the biggest change when it comes to personal security? Indisputably, the advent of the cellular phone. In daily life as well, whether reporting suspicious activity or touching base with the kids, more and more people rely on their wireless phones. Cellular service in the US has grown slowly and steadily, with subscribers increasing by 30 to 40 per cent a year. However, cellular callers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile and wireless networks and applications [Education & Training]

    Publication Year: 2002, Page(s):9 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2374 KB) | HTML iconHTML

    The author describes an introductory graduate course on mobile and wireless networks and applications at Stanford University. This course has achieved notable success in combining research and education. The course focuses on how the mobility of users and devices affects networks, systems, and applications. The course considers mobility's influence on multiple layers of the protocol stack, from me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wearable computing goes live in industry

    Publication Year: 2002, Page(s):14 - 19
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4568 KB)

    Explores field deployments of wearable pervasive computers, looking to, understand their operational characteristics and gain insight into deployment issues. We study one characteristic group of early adopters among mobile knowledge workers who construct, maintain, and repair technically complex, costly systems such as ships, airliners, and telecommunication networks. While this type of applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application design for wearable and context-aware computers

    Publication Year: 2002, Page(s):20 - 29
    Cited by:  Papers (18)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2978 KB) | HTML iconHTML

    To effectively integrate wearable computers into ubiquitous computing environments, we must address several important challenges. How do we develop social and cognitive application models? How do we integrate input from multiple sensors and map them to users' social and cognitive states? How do we anticipate user needs? How do we interact with users? To address mobile-application design challenges... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The evolution of Army wearable computers

    Publication Year: 2002, Page(s):30 - 40
    Cited by:  Papers (19)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3273 KB)

    In 1989, the US Army envisioned a small wearable computer to assist soldiers with battlefield tasks. The concept has since grown from preliminary prototypes and a demonstration Soldier's Computer into the current Land Warrior program and proposals for future systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing a new form factor for wearable computing

    Publication Year: 2002, Page(s):42 - 48
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB) | HTML iconHTML

    Despite significant improvements in underlying technologies, the wearable computing field is still in its youth. The article offers several methods that can help accelerate the process from vision to product. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless user interface components for personal area networks

    Publication Year: 2002, Page(s):49 - 55
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3327 KB) | HTML iconHTML

    Wireless wearable systems allow new user interface components. We highlight two-TiltType, a wrist-mounted device for text I/O, and phicons, objects whose physical appearances are metaphors for their electronic capabilities. Artifacts like these can create smaller, simpler, easier wearable systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating experiences with wearable computing

    Publication Year: 2002, Page(s):56 - 61
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3780 KB) | HTML iconHTML

    Wearable computing promises to deliver a rich variety of engaging user experiences that enhance everyday activities and situations through context-sensitive media and interaction. A Walk in the Wired Woods illustrates how we might design such experiences and deliver them in collaboration with artists and musicians. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The cloak of invisibility: challenges and applications

    Publication Year: 2002, Page(s):62 - 70
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (852 KB) | HTML iconHTML

    Is it possible to create a cloak of invisibility - a flexible artifact that can make anything inside it invisible and preserve invisibility despite mobility and deformation? Exploring the algorithmic and technological challenges involved reveals tantalizing information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A middleware infrastructure for active spaces

    Publication Year: 2002, Page(s):74 - 83
    Cited by:  Papers (374)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1256 KB) | HTML iconHTML

    The paper discusses the Gaia metaoperating system which extends the reach of traditional operating systems to manage ubiquitous computing habitats and living spaces as integrated programmable environments. Gaia exports services to query, access, and use existing resources and context, and provides a framework to develop user-centric, resource-aware, multidevice, context-sensitive, and mobile appli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The .NET Compact Framework

    Publication Year: 2002, Page(s):84 - 87
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    The .NET Compact Framework lets developers easily and efficiently build robust applications that call XML Web services, thereby letting end users effectively access remote data, cache it locally for use when offline, and interact with it via rich user interfaces. This paper highlights the .NET Compact Framework's design goals, sheds light on what the first version contains, and speculates on futur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attention, memory, and wearable interfaces

    Publication Year: 2002, Page(s):88 - 91
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    The paper considers the limits of human attention and how wearable interfaces should be developed to complement, not interfere, with normal human capabilities. Most interfaces on desktop computers do not have this problem; desktop interface designers can assume that the user is solely concentrating on the digital task. However, a major advantage of a wearable is that users can take it anywhere and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2002 Reviewers

    Publication Year: 2002, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (178 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Pervasive Computing explores the role of computing in the physical world–as characterized by visions such as the Internet of Things and Ubiquitous Computing. Designed for researchers, practitioners, and educators, this publication acts as a catalyst for realizing the ideas described by Mark Weiser in 1988.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Maria R. Ebling, Ph.D.
IBM T. J. Watson Research Center