Scalable, secure, mobile computing with location information
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Situated information spaces and spatially aware palmtop computers
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Knowledge-based augmented reality
Communications of the ACM - Special issue on computer augmented environments: back to the real world
Providing location information in a ubiquitous computing environment (panel session)
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
R-trees: a dynamic index structure for spatial searching
SIGMOD '84 Proceedings of the 1984 ACM SIGMOD international conference on Management of data
Composite Event Specification in Active Databases: Model & Implementation
VLDB '92 Proceedings of the 18th International Conference on Very Large Data Bases
Querying in Highly Mobile Distributed Environments
VLDB '92 Proceedings of the 18th International Conference on Very Large Data Bases
BluePoint: a bluetooth-based architecture for location-positioning services
Proceedings of the 2003 ACM symposium on Applied computing
Hi-index | 0.00 |
The aim of current mobile computing systems is to hide the network as far as possible from applications. This paper introduces location aware computing which makes details of the networked computing environment explicitly available to applications. Depending upon where a user is located, and the capabilities of the machines around a user, applications will alter their behaviour. This will automate tasks such as logging-on, screen-locking and telephone re-routing and applications will automatically modify themselves to make best use of a user's computing environment. It is argued that a location aware computing system must address the three main issues of information gathering, data structure and querying and access control. Ideas within these areas are introduced and explained and the concepts of co-location and spheres of influence suggested as paradigms of person-machine interaction.