Academic References for Ambient Intelligence / Ubiquitous & Pervasive Computing

  1. Aarts, E. (2004). "Ambient Intelligence: A Multimedia Perspective." IEEE Multimedia 11(1): 12-19.
  2. Abowd, G., C. Atkeson, et al. (1997). "Cyberguide: A Mobile Context-Aware Tour Guide." Wireless Networks 3(5): 421-433.
  3. Abowd, G. and E. Mynatt (2000). "Charting past, present and future research in ubiquitous computing." ACM Transactions on Computer-Human Interaction 7(1): 29-58.
  4. Abowd, G., E. Mynatt, et al. (2002). "The Human Experience." IEEE Pervasive Computing 1(1): 48-57.
  5. Amigoni, F., N. Gatti, et al. (2005). What Planner for Ambient Intelligence Applications? IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE.
  6. Andersson, M. (2006). Ubiquitous Transport Systems: Negotiating Context Through a Mobile-Stationary Interface. 14th European Conference on Information Systems (ECIS 2006). J. Ljungberg and M. Andersson. Goteborg, Sweden.
  7. Andersson, M. and R. Lindgren (2005). "The Mobile-Stationary Divide in Ubiquitous Computing Environments: Lessons from the Transport Industry." Information Systems Management 22(4): 65-79.
  8. Araya, A. (1995). Questioning Ubiquitous Computing. Proceedings of the 1995 ACM 23rd Annual Conference on Computer Science Nashville, Tennessee, USA.
  9. Banavar, G., J. Beck, et al. (2000). Challenges: An Application Model for Pervasive Computing. Proceedings of the 6th annual international conference on Mobile computing and networking, Boston, Massachusetts, United States ACM Press.
  10. Banavar, G. and A. Bernstein (2002). "Software Infrastructure and Design Challenges for Ubiquitous Computing Applications." Communications of the ACM 45(12): 92-96.
  11. Bannon, L., S. Benford, et al. (2005). "Hybrid Design Creates Innovative Museum Experiences." Communications of the ACM 48(3): 62-65.
  12. Benford, S., C. Magerkurth, et al. (2005). "Bridging the Physical and Digintal in Pervasive Gaming." Communications of the ACM 48(3): 54-57.
  13. Beresford, A. and F. Stajano (2003). "Location Privacy in Pervasive Computing." IEEE Pervasive Computing 2(1): 46-55.
  14. Boddupalli, P., F. Al-Bin-Ali, et al. (2003). Payment Support in Ubiquitous Computing Environments. Fifth IEEE Workshop on Mobile Computing Systems and Applications.
  15. Borriello, G., M. Chalmers, et al. (2005). "Delivering Real-World Ubiquitous Location Systems." Communications of the ACM 48(3): 36-41.
  16. Borriello, G. and R. Want (2000). "Embedded Computation Meets the World Wide Web." Communications of the ACM 43(5): 59-66.
  17. Braun, E. (1998). Technology in Context : Technology Assessment for Managers London ; New York Routledge.
  18. Buderi, R. (2001). "Computing Goes Everywhere." Technology Review 104(1).
  19. Bush, V. (1945). "As We May Think." Atlantic Monthly 176(1): 101-108.
  20. Cadman, J. (2003). Deploying Commercial Location Aware Systems. Proceedings of the 2003 Workshop on Location-Aware Computing.
  21. Chen, G. and D. Kotz (2000). A Survey of Context-Aware Mobile Computing Research. Technical Report TR2000-381, Department of Computer Science, Dartmouth College.
  22. Cheok, A. D., X. Yang, et al. (2002). "Touch-Space: Mixed Reality Game Space Based on Ubiquitous, Tangible, and Social Computing." Personal and Ubiquitous Computing 6(5/6): 430-442.
  23. Chin, J., V. Callaghan, et al. (2004). Pervasive Computing and Urban Development: Issues for the individual and society. The International Research Foundation for Development (IRFD): UN-Habitat World Urban Forum, Barcelona, Spain, .
  24. Consolvo, S., L. Arnstein, et al. (2002). User Study Techniques in the Design and Evaluation of a Ubicomp Environment. Proceedings of the 4th International Conference on Ubiquitous Computing, Lecture Notes in Computer Science.
  25. Cothrel, J. (2000). "Community Will Drive Wireless Web." Inter@ctive Week 7(13): 124.
  26. Cousins, K. C. and D. Robey (2003). Patterns of Use Within Nomadic Computing Environments: An Agency Perspective on Access – Anytime, Anywhere. Workshop on Ubiqutious Computing Environments, Case Western Reserve University, OH, USA.
  27. Coutaz, J., J. L. Crowley, et al. (2005). "Context is Key." Communications of the ACM 48(3): 49-53.
  28. Da Costa, O. and Y. Punie (2003). Ambient Intelligence in Everyday Life: A Function-Oriented Science & Technology Roadmapping Project. New Media and Everyday Life in Europe: EMTEL Final Conference, European Media, Technology and Everyday Life Research Network. London.
  29. Davidyuk, O., J. Riekki, et al. (2004). Context-Aware Middleware for Mobile Multimedia Applications. Proceedings of the 3rd International Conference on Mobile and Ubiquitous Multimedia. College Park, Maryland, USA, ACM.
  30. Davies, N. and H.-W. Gellersen (2002). "Beyond Prototypes: Challenges in Deploying Ubiquitous Computing Systems." IEEE Pervasive Computing 1(1): 26-35.
  31. Davis, G. B. (2002). "Anytime/Anyplace Computing and the Future of Knowledge Work." Communications of the ACM 45(2): 67-73.
  32. Dey, A. (2001). "Understanding and Using Context." Personal and Ubiquitous Computing 5(1): 4-7.
  33. Dey, A. and G. Abowd (2000). Towards a Better Understanding of Context and Context-Awareness. In the Workshop on The What, Who, Where, When, and How of Context-Awareness, as part of the 2000 Conference on Human Factors in Computing Systems (CHI 2000). The Hague, The Netherlands.
  34. Dourish, P. (2004). "What We Talk About When We Talk About Context." Personal and Ubiquitous Computing 8(1): 19-30.
  35. Dryer, D. C., C. Eisbach, et al. (1999). "At What Cost Pervasive? A Social View of Mobile Computing Systems." IBM Systems Journal 38(4): 652-676.
  36. Ducatel, K., Bogdanowicz, et al. (2001). Scenarios for Ambient Intelligence in 2010. ISTAG, European Commission.
  37. Edwards, W. K. and R. E. Grinter (2001). At Home with Ubiquitous Computing: Seven Challenges. Proceedings of the 3rd International Conference on Ubiquitous Computing.
  38. Edwards, W. K., M. W. Newman, et al. (2005). "Bringing Network Effects to Pervasive Spaces." Pervasive Computing 4(3): 15-17.
  39. Esler, M., J. Hightower, et al. (1999). Next Century Challenges: Data-Centric Networking for Invisible Computing: the Portolano project at the University of Washington. Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Seattle, Washington, USA, ACM/IEEE.
  40. Fano, A. and A. Gershman (2002). "The Future of Business Services in the Age of Ubiquitous Computing." Communications of the ACM 45(12): 83-87.
  41. Finin, T., A. Joshi, et al. (2002). "Intelligent Agents for Mobile and Embedded Devices." International Journal of Cooperative Information Systems 11(3/4): 205.
  42. Fleish, E. and C. Tellkamp (2003). The Challenge of Identifying Value-Creating Ubiquitous Computing Applications. in Ubiquitous Commerce Workshop, UbiComp 2003, Seattle, WA, USA.
  43. Fujinami, K., T. Yamabe, et al. (2004). "Take Me With You!": A Case Study of Context-Aware Application Integrating Cyber and Physical Spaces. ACM Symposium on Applied Computing, Nicosia, Cyprus.
  44. Garlan, D., D. Siewiorek, et al. (2002). "Project Aura: Toward Distraction-Free Pervasive Computing." Pervasive Computing 1(2): 22-31.
  45. Gershman, A. and A. Fano (2003). Customer Service with Eyes. in Ubiquitous Commerce Workshop, UbiComp 2003, Seattle, WA, USA.
  46. Gershman, A. and A. Fano (2005). "Examples of Commercial Applications of Ubiquitous Computing." Communications of the ACM 48(3): 71.
  47. Green, N., R. H. R. Harper, et al. (2001). "Configuring the Mobile User: Sociological and Industry Views." Personal and Ubiquitous Computing 5(146-156).
  48. Grover, V. and M. D. Goslar (1993). "The initiation, adoption, and implementation of telecommunications technologies in U.S. organizations." Journal of Management Information Systems 10(1): 141-163.
  49. Gupta, P. and D. Moitra (2004). "Evolving a Pervasive IT Infrastructure: A Technology Integration Approach." Personal and Ubiquitous Computing 8(1): 31-41.
  50. Hagras, H., V. Callaghan, et al. (2004). "Creating an Ambient-Intelligence Environment Using Embedded Agents." IEEE Intelligent Systems 19(6): 12-20.
  51. Hallnas, L. and J. Redstrom (2001). "Slow Technology – Designing for Reflection." Personal and Ubiquitous Computing 5: 201-212.
  52. Harter, A., A. Hopper, et al. (2001). "The Anatomy of a Context-Aware Application." Wireless Networks 8(2-3): 187-197.
  53. Helal, S. (2005). "Programming Pervasive Spaces." Pervasive Computing 4(1): 84-87.
  54. Henricksen, K., J. Indulska, et al. (2001). Infrastrucure for Pervasive Computing: Challenges. Proceedings of the Informatik 2001: Workshop on Pervasive Computing, Vienna.
  55. Hild, S. G. (2001). "Application Hosting for Pervasive Computing." IBM Systems Journal 40(1): 193.
  56. Ichinose, N. (2004). "Mobile E-Ticket and E-Membership Services." NEC Journal of Advanced Technology 1(3): 184-187.
  57. Ishii, H. and B. Ullmer (1997). Tangible Bits: Towards Seamless Interfaces between People, Bits and Atoms. Proceedings of the CHI ’97, ACM.
  58. Islam, N. and M. Fayad (2003). "Toward Ubiquitous Acceptance of Ubiquitous Computing." Communications of the ACM 46(2): 89-92.
  59. Issarny, V., D. Sacchetti, et al. (2005). "Developing Ambient Intelligence Systems: A Solution Based on Web Services." Automated Software Engineering 12: 101-137.
  60. ISTAG (2000). Recommendations of the IST Advisory Group for Workprogramme 2001 and beyond: ‘implementing the vision’. E. C. ISTAG.
  61. ISTAG (2002). "Software technologies, embedded systems and distributed systems: A European strategy towards an Ambient Intelligent environment." ISTAG, July 2002, Available from: ftp://ftp.cordis.lu/pub/ist/docs/istag_kk4402472encfull.pdf.
  62. ISTAG (2002). "Strategic Orientations and priorities for IST in FP6." ISTAG, Available from: ftp://ftp.cordis.lu/pub/ist/docs/istag_kk4402456encfull.pdf.
  63. ISTAG (2002). Trust, dependability, security and privacy for IST in FP6. E. C. ISTAG.
  64. ISTAG (2003). Ambient Intelligence: From Vision to Reality – For Participation in Society and Business. E. Commission.
  65. ISTAG (2003). "Research Results exploitation." Working Group WG3 Final Report, Sept. ’03, Available from: ftp://ftp.cordis.lu/pub/ist/docs/istag-wg3-final-report_en.pdf.
  66. ISTAG (2004). Strategic Orientations for Information and Communications Technologies Research in Europe. E. Commission.
  67. Jessup, L. M. and D. Robey (2002). "The Releveance of Social Issues in Ubiquitous Computing Environments." Communications of the ACM 45(12): 88-91.
  68. Judd, G. and P. Steenkiste (2003). Providing Contextual Information to Pervasive Computing Applications. IEEE International Conference on Pervasive Computing (PERCOM), Dallas, USA, IEEE.
  69. Kelly, D., J. Feller, et al. (2006). Complex Network-Based Information Systems (CNIS) Standards: Towards an Adoption Model. International Federation of Information Processing (IFIP WG8.6); The Transfer and Diffusion of Information Technology for Organizational Resilience, Galway, Ireland, Boston: Springer.
  70. Kelly, D., J. Feller, et al. (2006). Open vs. Closed Standards for Ambient Intelligence: An Exploratory Study of Adoption. Proceedings of the 14th European Conference on Information Systems (ECIS 2006), Gothenburg, Sweden.
  71. Kidd, C. D., R. Orr, et al. (1999). The Aware Home: A Living Laboratory for Ubiquitous Computing Research. Proceedings of the Second International Workshop on Cooperative Buildings, Integrating Information, Organization, and Architecture.
  72. Kouadri Mostefaoui, G. (2003). Security in Pervasive Environments, What’s Next? in the proceedings of the 2003 International Conference on Security and Management (SAM’03), Las Vegas, Nevada, USA.
  73. Kourouthanassis, P. and G. Roussos (2003). Developing the User Experience in Ubiquitous Computing. in Ubiquitous Commerce Workshop, UbiComp 2003, Seattle, WA, USA.
  74. Kourouthanassis, P., D. Spinellis, et al. (2002). Intelligent Cokes and Diapers: MyGROCER Ubiquitous Computing Environment. First International Mobile Business Conference.
  75. Lahlou, S., M. Langheinrich, et al. (2005). "Privacy and Trust Issues with Invisible Computers." Communications of the ACM 48(3): 59-60.
  76. Lai, J., S. Mitchell, et al. (2002). "Ubiquitous Access to Unified Messaging: A Study of Usability and the Use of Pervasive Computing." International Journal of Human-Computer Interaction 14(3/4).
  77. Lalis, S., A. Karypidis, et al. (2005). "Ad-Hoc Composition in Wearable and Mobile Computing." Communications of the ACM 48(3): 67-68.
  78. Lampe, M. and M. Strassner (2003). The Potential of RFID for Moveable Asset Management. Proceedings of Workshop on Ubiquitous Commerce, UbiComp ’03.
  79. Langheinrich, M. (2001). Privacy by Design – Principles of Privacy-Aware Ubiquitous Systems. Lecture Notes in Computer Science, Proceedings of the 3rd International Conference on Ubiquitous Computing. .
  80. Lassila, O. (2002). Serendipitous Interoperability. Semantic Web Kick-Off in Finland. E. Hyvonen. Helsinki, Finland, HIIT Publications: 243-256.
  81. Leug, C. (2002). Representations in Pervasive Computing. in the Proceedings of the Inaugural Asia Pacific Forum on Pervasive Computing, Adelaide, Australia.
  82. Lindwer, M., D. Marculesce, et al. (2003). Ambient Intelligence Visions and Achievements: Linking Abstract Ideas to Real-World Concepts. In Proceedings of the Conference on Design, Automation and Test in Europe (DATE ’03).
  83. Lyytinen, K. and G. M. Rose (2003). "Disruptive Information System Innovation: The Case of Internet Computing." Information Systems Journal 13(4): 301-330.
  84. Lyytinen, K. and Y. Yoo (2002). "Issues and Challenges in Ubiquitous Computing." Communications of the ACM 45(12): 63-65.
  85. Lyytinen, K. and Y. Yoo (2002). "The Next Wave of Nomadic Computing: A Research Agenda for Information Systems Research." Information Systems Research 13(4): 377-388.
  86. Lyytinen, K., Y. Yoo, et al. (2004). "Surfing the Next Wave: Design and Implementation Challenges of Ubiquitous Computing Environments." Communications of the AIS 13: 697-716.
  87. Maekawa, M. (2004). "ITS (Intelligent Transportation Systems) Solutions." NEC Journal of Advanced Technology 1(3): 194-199.
  88. Masuoka, R., B. Parsia, et al. (2003). Task Computing – the Semantic Web meets Pervasive Computing. Proceedings of the 2nd International Semantic Web Conference 2003 ( ISWC 2003), Florida, USA.
  89. Mattern, F. (2004). Ubiquitous Computing: Scenarios for an Informatized World. E-Merging Media – Kommunikation und Medienwirtschaft der Zukunft. A. Zerdick, A. Picot, K. Schrapeet al, Springer-Verlag: 155-174.
  90. Morikawa, H. and T. Aoyama (2004). "Realizing the Ubiquitous Network: the Internet and Beyond." Telecommunications Systems 25(3-4): 449-468.
  91. Mylonopoulos, N. and G. Doukidis (2003). "Introduction to the Special Issue: Mobile Business: Technological Pluralism, Social Assimilation, and Growth." International Journal of Electronic Commerce 8(1): 5-22.
  92. Nagumo, T. (2002). Innovative Business Models in the Era of Ubiquitous Networks.
  93. Nakajima, T., H. Ishikawa, et al. (2002). Technology Challenges for Building Internet-Scale Ubiquitous Computing. The Seventh IEEE Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2002), IEEE.
  94. Pascoe, J. (1998). Adding Generic Contextual Capabilities to Wearable Computers. 2nd International Symposium on Wearable Computers, IEEE.
  95. Pering, T., R. Ballagas, et al. (2005). "Spontaneous Marriages of Mobile Devices and Interactive Spaces." Communications of the ACM 48(9): 53-59.
  96. Pitkanen, O. (2003). Legal Challenges to Ubicommerce. in Ubiquitous Commerce Workshop, UbiComp 2003, Seattle, WA, USA.
  97. Prekop, P. and M. Burnett (2003). "Activities, context and ubiquitous computing." Computer Communications 26: 1168-1176.
  98. Punie, Y. (2003). A social and technological view of Ambient Intelligence in Everyday Life: What bends the trend? I. Technical Report EUR 20975 EN, EMTEL, Directorate General Joint Research Centre, European Commission.
  99. Rao, B. and R. Zimmermann (2005). "Preface to the Focus Theme Section ‘Pervasive Computing / Ambient Intelligence’." Electronic Markets 15(1): 3.
  100. Rehman, K., F. Stajano, et al. (2002). Interfacing with the Invisible Computer. In Proceedings of NordiCHI.
  101. Remagnino, P. and G. L. Foresti (2005). "Ambient Intelligence: A New Multidisciplinary Paradigm." IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 35(1): 1-6.
  102. Riva, G., P. Loreti, et al. (2003). Presence 2010: The Emergence of Ambient Intelligence. Being There: Concepts, Effects and Measurement of User Presence in Synthetic Environments. G. Riva, F. Davide and W. A. Ijsselsteijn Amsterdam, The Netherlands, Ios Press.
  103. Roussos, G., A. Gershman, et al. (2003). Ubiquitous Commerce. in Ubiquitous Commerce Workshop, UbiComp 2003,, Seattle, WA, USA.
  104. Russell, D. M., N. Streitz, et al. (2005). "Building Disappearing Computers." Communications of the ACM 48(3): 42-48.
  105. Saha, D. and A. Mukherjee (2003). "Pervasive Computing: A Paradigm for the 21st Century." IEEE Computer 36(3): 25-31.
  106. Sasaki, H. (2004). "Toward the Realization of a Japan-Initiated Ubiquitous Society." NEC Journal of Advanced Technology 1(1): 63-69.
  107. Satyanarayanan, M. (1996). Fundamental Challenges in Mobile Computing. Annual ACM Symposium on Principles of Distributed Computing, Philadelphia, USA.
  108. Satyanarayanan, M. (2001). "Pervasive Computing: Vision and Challenges." Personal Communications 8(4): 10-17.
  109. Satyanarayanan, M. (2002). "A Catalyst for Mobile and Ubiquitous Computing." IEEE Pervasive Computing 1(1): 2-5.
  110. Scheepers, R. and H. Scheepers (2003). Contexts of Relevance in Explanatory Case Studies in IS: Ubiquitous Information Technology Implementation in Organisations. Proceedings of International Conference on Information Systems, ICIS 2003, Seattle, Washington, USA, Association for Information Systems.
  111. Schilit, B., N. Adams, et al. (1994). Context-Aware Computing Applications. IEEE Workshop on Mobile Computing Systems and Applications, IEEE.
  112. Scholtz, J. (2001). "Ubiquitous Computing Goes Mobile." ACM SIGMOBILE Mobile Computing and Communications Review 5(3): 32-38.
  113. Shin, B. and H. G. Lee (2005). "Ubiquitous Computing-Driven Business Models: A Case of SK Telecom’s Financial Services." Electronic Markets 15(1): 4-12.
  114. Simoncini, L., S. Di Giandomenico, et al. (2004). Architectural Challenges for a Dependable Information Society. In Fault Tolerance for Trustworthy and Dependable Information Infrastructures, WCC 18th IFIP World Computer Congress, Toulouse, France.
  115. Skordas, T. and G. Metakides (2003). "Major Challenges in Ambient Intelligence." Studies in Informatics and Control 12(2): 85-89.
  116. Stajano, F. (2003). "Security for Whom? The Shifting Security Assumptions of Pervasive Computing." Lecture Notes in Computer Science 2609: 16-27.
  117. Stajano, F. and J. Crowcroft (2003). The butt of the iceberg: hidden security problems of ubiquitous systems. Ambient intelligence: impact on embedded system design. MA, USA, Kluwer Academic Publishers: p. 91-101.
  118. Streitz, N. and P. Nixon (2005). "The Disappearing Computer." Communications of the ACM 48(3): 33-35.
  119. Tassey, G. (2000). "Standardization in Technology-Based Markets." Research Policy 29(4-5): 587-602.
  120. Tolmie, P., J. Pycock, et al. (2002). Unremarkable Computing. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems: Changing our world, changing ourselves, Minneapolis, Minnesota, USA
  121. Tsuji, T., S. Kouno, et al. (2004). "Asset Management Solution Based on RFID." NEC Journal of Advanced Technology 1(4): 188-193.
  122. Velastin, S. A., B. A. Boghossian, et al. (2005). "PRISMATICA: Toward Ambient Intelligence in Public Transport Environments." IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 35(1): 164-182.
  123. Want, R., A. Hopper, et al. (1992). "The Active Badge Location System." ACM Transactions on Information Systems 10(1): 91-102.
  124. Want, R., B. Schilit, et al. (1995). "An Overview of the PARCTAB Ubiquitous Computing Experiment." IEEE Personal Communications 2(6): 28-43.
  125. Watson, R. T., L. F. Pitt, et al. (2002). "U-Commerce: Expanding the Universe of Marketing." Journal of the Academy of Marketing Science 30(4): 333.
  126. Weiser, M. (1991). "The Computer for the 21st Century." Scientific American 265(3): 94-104.
  127. Weiser, M. and J. S. Brown (1996). "The Coming Age of Calm Technology (Revision of Weiser & Brown. "Designing Calm Technology")." PowerGrid Journal.
  128. Weyrich, C. (1999). Orientations for Workprogramme 2000 and beyond. A. f. f. f. c. l. p. i. d. i.-.-f. p. European Commission: ISTAG.
  129. Xavier, M. J. (2003). "Customer Insight and Intimacy in the Silent Commerce Era." IIMB Management Review 15(3): 93-98.
  130. Yang, H., Y. Yoo, et al. (2003). Diffusion of Broadband Mobile Services in Korea: The Role of Standards and Its Impact on Diffusion of Complex Technology Systems. The Second Workshop on Ubiquitous Computing Environment. Cleveland, OH USA.
  131. Yoo, Y. and K. Lyytinen (2003). Measuring the Consequences of Ubiquitous Computing in Networked Organizations, Sprouts: Working Papers on Information Environments, Systems and Organizations, .
  132. Zambonelli, F. and M. Mamei (2002). "The Cloak of Invisibility: Challenges and Applications." IEEE Pervasive Computing 1(4): 62-70.

Updated 26th July, ’07