Uncertainty and Error Handling in Pervasive Computing: A User's Perspective
So you’re the one getting this gift? Lucky you! Someone who knows you has visited the museum. They searched out things they thought you would care about, and they took photos and left messages for you." This is the welcoming message for the Gift app, designed to create a very personal museum visit. Hybrid Museum Experiences use new technologies to augment, expand or alter the physical experie…
Imaging Identity presents potent reflections on the human condition through the prism of portraiture. Taking digital imaging technologies and the dynamic and precarious dimensions of contemporary identity as critical reference points, these essays consider why portraits continue to have such galvanising appeal and perform fundamental work across so many social settings. This multidisciplinary e…
user interfaces; human computer interaction; computers and society
Content Adaptation in Ubiquitous Computing
An approach to representation of type-2 fuzzy sets using computational methods of computer graphics
Caching in Ubiquitous Computing Environments: Light and Shadow
Computational Hydraulics introduces the concept of modeling and the contribution of numerical methods and numerical analysis to modeling. It provides a concise and comprehensive description of the basic hydraulic principles, and the problems addressed by these principles in the aquatic environment. Flow equations, numerical and analytical solutions are included. The necessary steps for building…
A variety of programming models relevant to scientists explained, with an emphasis on how programming constructs map to parts of the computer.What makes computer programs fast or slow? To answer this question, we have to get behind the abstractions of programming languages and look at how a computer really works. This book examines and explains a variety of scientific programming models (progra…
In this chapter we will explore the relationship between crime and computers and networks by answering the following questions: •• Which techniques from computer science can be used to prevent crime? •• Which techniques from computer science can be used to study crime? To address the first question we use the 25 techniques of situational crime prevention to provide a systematic assessme…