Making Pervasive Computing Technology Pervasive for Health & Wellness in Aging

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pervasive Computing in Car Technology

Cars seem to become more and more sophisticated, in terms of mechanics and electronics. This paper reviews the state-of-art pervasive computing utilized in modern car technology. Microprocessors can be found in almost any subsystem of a car, and the applications of embedded computers in enhancing the qualities of cars are discussed in this paper. In addition, it also describes some possible per...

متن کامل

Adapting to Pervasive Computing, and Making Great Pedagogy Pervasive

This white paper outlines two major issues for the immediate future of computer science education: First, redefining our educational role in an academy where every field is deeply integrated with computing— adapting to pervasive computing. Second, working to better disseminate the pedagogical best practices developed and piloted in the CS education community—making great pedagogy pervasive. The...

متن کامل

Pervasive Java - IEEE Pervasive Computing

1536-1268/02/$17.00 © 2002 IEEE T oday, mobile devices and gadgets come with more than just a cool and cutting-edge design; they come equipped with small brains and a common language, making them smarter and more powerful than ever before. Perhaps they’re a little too smart—after all, they can adapt and morph into each other and become many-in-one super devices. Mobile phones with PDA capabilit...

متن کامل

Middleware for Pervasive Computing

This paper investigates the role of middleware in the various pervasive computing scenarios. Middleware can be used provide an important transparency or abstraction layer between applications and lower layers that actually implemention layer between applications and lower layers that actually implement the requested services. Middleware services include messaging, RCP, synchronization and unive...

متن کامل

Authentication for Pervasive Computing

Key management is fundamental to communications security, and for security in pervasive computing sound key management is particularly difficult. However, sound key management itself depends critically on sound authentication. In this paper we review current notions of entity authentication and discuss why we believe these notions are unsuitable for the pervasive domain. We then present our vie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Public Policy & Aging Report

سال: 2017

ISSN: 1055-3037,2053-4892

DOI: 10.1093/ppar/prx005