{"title":"机会网络","authors":"A. Heinemann","doi":"10.4018/9781599048321.ch009","DOIUrl":null,"url":null,"abstract":"A predominant concern in ubiquitous computing (UC) is the natural and effortless interaction of humans with a smart environment in order to carry out a certain task or simply to make life easier. Often, interaction is bootstrapped with a user’s personal, mobile device. Such a device may carry a digital representation in form of a user profile and a key pair that serves as a digital identity. Examples of devices are personal digital assistants (PDAs) or mobile phones. Especially the mobile phone plays a prominent role since it has conquered our everyday life and is basically ubiquitously available for the user. More and more mobile phones and PDAs are equipped with short range wireless communication capabilities. In most cases, either Bluetooth (Bluetooth SIG Inc., 2003-2005) or 802.11b WiFi technology (IEEE, 1999) is integrated. The prevalent use of wireless connectivity is to synchronize personal data between a mobile device and a desktop computer (via Bluetooth) or have easy access to an institution’s network (via a 802.11 WiFi Wireless Access Point) and further to the Internet. But in addition, with the integration of abstract","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"120","resultStr":"{\"title\":\"Opportunistic Networks\",\"authors\":\"A. Heinemann\",\"doi\":\"10.4018/9781599048321.ch009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A predominant concern in ubiquitous computing (UC) is the natural and effortless interaction of humans with a smart environment in order to carry out a certain task or simply to make life easier. Often, interaction is bootstrapped with a user’s personal, mobile device. Such a device may carry a digital representation in form of a user profile and a key pair that serves as a digital identity. Examples of devices are personal digital assistants (PDAs) or mobile phones. Especially the mobile phone plays a prominent role since it has conquered our everyday life and is basically ubiquitously available for the user. More and more mobile phones and PDAs are equipped with short range wireless communication capabilities. In most cases, either Bluetooth (Bluetooth SIG Inc., 2003-2005) or 802.11b WiFi technology (IEEE, 1999) is integrated. The prevalent use of wireless connectivity is to synchronize personal data between a mobile device and a desktop computer (via Bluetooth) or have easy access to an institution’s network (via a 802.11 WiFi Wireless Access Point) and further to the Internet. But in addition, with the integration of abstract\",\"PeriodicalId\":443285,\"journal\":{\"name\":\"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"120\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/9781599048321.ch009\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/9781599048321.ch009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 120
摘要
普适计算(UC)的主要关注点是人类与智能环境之间自然而轻松的交互,以执行特定任务或仅仅是为了使生活更轻松。通常,交互是由用户的个人移动设备引导的。这样的设备可以携带以用户配置文件和作为数字身份的密钥对的形式的数字表示。设备的例子有个人数字助理(pda)或移动电话。尤其是手机扮演了一个突出的角色,因为它已经征服了我们的日常生活,基本上无处不在的用户。越来越多的移动电话和pda配备了短距离无线通信功能。在大多数情况下,集成了蓝牙(Bluetooth SIG Inc., 2003-2005)或802.11b WiFi技术(IEEE, 1999)。无线连接的普遍用途是在移动设备和台式电脑之间(通过蓝牙)同步个人数据,或者轻松访问机构的网络(通过802.11 WiFi无线接入点)并进一步连接到互联网。但除此之外,还与抽象相结合
A predominant concern in ubiquitous computing (UC) is the natural and effortless interaction of humans with a smart environment in order to carry out a certain task or simply to make life easier. Often, interaction is bootstrapped with a user’s personal, mobile device. Such a device may carry a digital representation in form of a user profile and a key pair that serves as a digital identity. Examples of devices are personal digital assistants (PDAs) or mobile phones. Especially the mobile phone plays a prominent role since it has conquered our everyday life and is basically ubiquitously available for the user. More and more mobile phones and PDAs are equipped with short range wireless communication capabilities. In most cases, either Bluetooth (Bluetooth SIG Inc., 2003-2005) or 802.11b WiFi technology (IEEE, 1999) is integrated. The prevalent use of wireless connectivity is to synchronize personal data between a mobile device and a desktop computer (via Bluetooth) or have easy access to an institution’s network (via a 802.11 WiFi Wireless Access Point) and further to the Internet. But in addition, with the integration of abstract