Results 21 to 30 of about 73,546 (289)

Infrastructural Speculations: Tactics for Designing and Interrogating Lifeworlds [PDF]

open access: yes, 2020
This paper introduces “infrastructural speculations,” an orientation toward speculative design that considers the complex and long-lived relationships of technologies with broader systems, beyond moments of immediate invention and design.
Bennett Cynthia L.   +48 more
core   +1 more source

Empowering CH experts to produce IoT-enhanced visits [PDF]

open access: yes, 2017
This demo presents EFESTO-5W, a platform for the definition of IoT-enhanced visits to Cultural-Heritage (CH) sites. Its main characteristic is an End-User Development paradigm applied to the IoT technologies and customized for the CH domain, which allows
Ardito, Carmelo   +3 more
core   +4 more sources

Design Fiction Diegetic Prototyping: A Research Framework for Visualizing Service Innovations [PDF]

open access: yes, 2019
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Purpose: This paper presents a design fiction diegetic prototyping methodology and research framework for ...
Belk, Russell   +2 more
core   +1 more source

Risk perceptions about personal Internet-of-Things: Research directions from a multi-panel Delphi study

open access: yesJournal of Cybersecurity Education, Research & Practice, 2023
Internet-of-Things (IoT) research has primarily focused on identifying IoT devices' organizational risks with little attention to consumer perceptions about IoT device risks.
Paul M. Di Gangi   +4 more
doaj  

Just-in-Time Memoryless Trust for Crowdsourced IoT Services

open access: yes, 2020
We propose just-in-time memoryless trust for crowdsourced IoT services. We leverage the characteristics of the IoT service environment to evaluate their trustworthiness. A novel framework is devised to assess a service's trust without relying on previous
Bahutair, Mohammed   +2 more
core   +1 more source

Paper Gaming: Creating IoT Paper Interactions with Conductive Inks and Web-connectivity through EKKO [PDF]

open access: yes, 2015
Paper is ubiquitous. It forms a substantial part of our everyday activities and interactions; ranging from our take-away coffee cups -- to wallpaper -- to rail tickets -- to board and card games.
Egglestone, Paul   +3 more
core   +1 more source

Caching-Aided Collaborative D2D Operation for Predictive Data Dissemination in Industrial IoT [PDF]

open access: yes, 2018
Industrial automation deployments constitute challenging environments where moving IoT machines may produce high-definition video and other heavy sensor data during surveying and inspection operations.
Andreev, Sergey   +6 more
core   +2 more sources

Being Hacked:Understanding Victims' Experiences of IoT Hacking [PDF]

open access: yes, 2022
From light bulbs to smart locks, IoT is increasingly embedded into our homes and lives. This opens up new vulnerabilities as IoT devices can be hacked and manipulated to cause harm or discomfort. In this paper we document users' experiences of having their IoT systems hacked through 210 self-reports from Reddit, device support forums, and Amazon review
Rostami, Asreen   +3 more
openaire   +2 more sources

Using the Internet of Things to Teach Good Software Engineering Practice to High School Students [PDF]

open access: yes, 2019
This paper describes a course to introduce high school students to software engineering in practice using the Internet Of Things (IoT). IoT devices allow students to get quick, visible results without watering down technical aspects of programming ...
Julien, Christine
core   +1 more source

Evaluation of Burst Failure Robustness of Control Systems in the Fog [PDF]

open access: yes, 2020
This paper investigates the robustness of control systems when a controller is run in a Fog environment. Control systems in the Fog are introduced and a discussion regarding relevant faults is presented.
Mandrioli, Claudio, Vreman, Nils
core   +1 more source

Home - About - Disclaimer - Privacy