Making Pervasive Computing Technology Pervasive for Health & Wellness in Aging
نویسندگان
چکیده
منابع مشابه
Pervasive Computing in Car Technology
Cars seem to become more and more sophisticated, in terms of mechanics and electronics. This paper reviews the state-of-art pervasive computing utilized in modern car technology. Microprocessors can be found in almost any subsystem of a car, and the applications of embedded computers in enhancing the qualities of cars are discussed in this paper. In addition, it also describes some possible per...
متن کاملAdapting to Pervasive Computing, and Making Great Pedagogy Pervasive
This white paper outlines two major issues for the immediate future of computer science education: First, redefining our educational role in an academy where every field is deeply integrated with computing— adapting to pervasive computing. Second, working to better disseminate the pedagogical best practices developed and piloted in the CS education community—making great pedagogy pervasive. The...
متن کاملPervasive Java - IEEE Pervasive Computing
1536-1268/02/$17.00 © 2002 IEEE T oday, mobile devices and gadgets come with more than just a cool and cutting-edge design; they come equipped with small brains and a common language, making them smarter and more powerful than ever before. Perhaps they’re a little too smart—after all, they can adapt and morph into each other and become many-in-one super devices. Mobile phones with PDA capabilit...
متن کاملMiddleware for Pervasive Computing
This paper investigates the role of middleware in the various pervasive computing scenarios. Middleware can be used provide an important transparency or abstraction layer between applications and lower layers that actually implemention layer between applications and lower layers that actually implement the requested services. Middleware services include messaging, RCP, synchronization and unive...
متن کاملAuthentication for Pervasive Computing
Key management is fundamental to communications security, and for security in pervasive computing sound key management is particularly difficult. However, sound key management itself depends critically on sound authentication. In this paper we review current notions of entity authentication and discuss why we believe these notions are unsuitable for the pervasive domain. We then present our vie...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Public Policy & Aging Report
سال: 2017
ISSN: 1055-3037,2053-4892
DOI: 10.1093/ppar/prx005