Epidemic algorithms for replicated database maintenance
PODC '87 Proceedings of the sixth annual ACM Symposium on Principles of distributed computing
Answer Garden: a tool for growing organizational memory
COCS '90 Proceedings of the ACM SIGOIS and IEEE CS TC-OA conference on Office information systems
User-tailorable systems: pressing the issues with buttons
CHI '90 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Patterns of sharing customizable software
CSCW '90 Proceedings of the 1990 ACM conference on Computer-supported cooperative work
EAGER: programming repetitive tasks by example
CHI '91 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Triggers and barriers to customizing software
CHI '91 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Twinkling lights and nested loops: distributed problem solving and spreadsheet development
Computer-supported cooperative work and groupware
The role of built-in knowledge in adaptive interface systems
IUI '93 Proceedings of the 1st international conference on Intelligent user interfaces
History-based access control for mobile code
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
The order of things: activity-centered information access
WWW7 Proceedings of the seventh international conference on World Wide Web 7
An epidemic model for information diffusion in MANETs
MSWiM '02 Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems
The evolution of buildings and implications for the design of ubiquitous domestic environments
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
At Home with Ubiquitous Computing: Seven Challenges
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Designing for serendipity: supporting end-user configuration of ubiquitous computing environments
DIS '02 Proceedings of the 4th conference on Designing interactive systems: processes, practices, methods, and techniques
A buddy model of security for mobile agent communities operating in pervasive scenarios
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
A comparison of static, adaptive, and adaptable menus
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 1
On Plug-ins and Extensible Architectures
Queue - Patching and Deployment
Automatically personalizing user interfaces
IJCAI'03 Proceedings of the 18th international joint conference on Artificial intelligence
DigiDress: a field trial of an expressive social proximity application
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Picking pockets on the lawn: the development of tactics and strategies in a mobile game
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
A Model-Based Approach to Supporting Configuration in Ubiquitous Systems
Interactive Systems. Design, Specification, and Verification
Adapting ubicomp software and its evaluation
Proceedings of the 1st ACM SIGCHI symposium on Engineering interactive computing systems
Using semantic descriptions for adaptive mobile games UIs
Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
A population approach to ubicomp system design
Proceedings of the 2010 ACM-BCS Visions of Computer Science Conference
An introduction to pervasive interface automata
FACS'10 Proceedings of the 7th international conference on Formal Aspects of Component Software
Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration
Hi-index | 0.01 |
Social Proximity Applications (SPAs) are a promising new area for ubicomp software that exploits the everyday changes in the proximity of mobile users. While a number of applications facilitate simple file sharing between co–present users, this paper explores opportunities for recommending and sharing software between users. We describe an architecture that allows the recommendation of new system components from systems with similar histories of use. Software components and usage histories are exchanged between mobile users who are in proximity with each other. We apply this architecture in a mobile strategy game in which players adapt and upgrade their game using components from other players, progressing through the game through sharing tools and history. More broadly, we discuss the general application of this technique as well as the security and privacy challenges to such an approach.