{"title":"用户与移动中的机器交互:位置感知计算","authors":"Giles J. Nelson","doi":"10.1109/ENABL.1995.484560","DOIUrl":null,"url":null,"abstract":"The aim of current mobile computing systems is to hide the network as far as possible from applications. This paper introduces location aware computing which makes details of the networked computing environment explicitly available to applications. Depending upon where a user is located, and the capabilities of the machines around a user, applications will alter their behaviour. This will automate tasks such as logging-on, screen-locking and telephone re-routing and applications will automatically modify themselves to make best use of a user's computing environment. It is argued that a location aware computing system must address the three main issues of information gathering, data structure and querying and access control. Ideas within these areas are introduced and explained and the concepts of co-location and spheres of influence suggested as paradigms of person-machine interaction.","PeriodicalId":275450,"journal":{"name":"Proceedings 4th IEEE Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE '95)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1995-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"User interaction with machines on the move: location aware computing\",\"authors\":\"Giles J. Nelson\",\"doi\":\"10.1109/ENABL.1995.484560\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The aim of current mobile computing systems is to hide the network as far as possible from applications. This paper introduces location aware computing which makes details of the networked computing environment explicitly available to applications. Depending upon where a user is located, and the capabilities of the machines around a user, applications will alter their behaviour. This will automate tasks such as logging-on, screen-locking and telephone re-routing and applications will automatically modify themselves to make best use of a user's computing environment. It is argued that a location aware computing system must address the three main issues of information gathering, data structure and querying and access control. Ideas within these areas are introduced and explained and the concepts of co-location and spheres of influence suggested as paradigms of person-machine interaction.\",\"PeriodicalId\":275450,\"journal\":{\"name\":\"Proceedings 4th IEEE Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE '95)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1995-04-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 4th IEEE Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE '95)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ENABL.1995.484560\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 4th IEEE Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE '95)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ENABL.1995.484560","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
User interaction with machines on the move: location aware computing
The aim of current mobile computing systems is to hide the network as far as possible from applications. This paper introduces location aware computing which makes details of the networked computing environment explicitly available to applications. Depending upon where a user is located, and the capabilities of the machines around a user, applications will alter their behaviour. This will automate tasks such as logging-on, screen-locking and telephone re-routing and applications will automatically modify themselves to make best use of a user's computing environment. It is argued that a location aware computing system must address the three main issues of information gathering, data structure and querying and access control. Ideas within these areas are introduced and explained and the concepts of co-location and spheres of influence suggested as paradigms of person-machine interaction.