3 resultados para Ubiquitous Computing, Pervasive Computing, Internet of Things, Cloud Computing

em Nottingham eTheses


Relevância:

100.00% 100.00%

Publicador:

Resumo:

By considering the spatial character of sensor-based interactive systems, this paper investigates how discussions of seams and seamlessness in ubiquitous computing neglect the complex spatial character that is constructed as a side-effect of deploying sensor technology within a space. Through a study of a torch (`flashlight') based interface, we develop a framework for analysing this spatial character generated by sensor technology. This framework is then used to analyse and compare a range of other systems in which sensor technology is used, in order to develop a design spectrum that contrasts the revealing and hiding of a system's structure to users. Finally, we discuss the implications for interfaces situated in public spaces and consider the benefits of hiding structure from users.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper introduces the Multidisciplinary Assessment of Technology Centre for Healthcare (MATCH) and outlines the problem of integrating a user-centred approach for development of medical devices together with the information and communication technology environments in which they are increasingly required to operate. We highlight some of the regulatory requirements that are relevant to user needs consideration in medical device development. Finally, we reveal a range of limitations in the current practice of the medical device industry in the area of user needs capture, based on responses from interviews with MATCH’s industry partners.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper reports on the use of non-symbolic fragmentation of data for securing communications. Non-symbolic fragmentation, or NSF, relies on breaking up data into non-symbolic fragments, which are (usually irregularly-sized) chunks whose boundaries do not necessarily coincide with the boundaries of the symbols making up the data. For example, ASCII data is broken up into fragments which may include 8-bit fragments but also include many other sized fragments. Fragments are then separated with a form of path diversity. The secrecy of the transmission relies on the secrecy of one or more of a number of things: the ordering of the fragments, the sizes of the fragments, and the use of path diversity. Once NSF is in place, it can help secure many forms of communication, and is useful for exchanging sensitive information, and for commercial transactions. A sample implementation is described with an evaluation of the technology.