2000
DOI: 10.1007/bf02391563
|View full text |Cite
|
Sign up to set email alerts
|

Context-Aware telephony over WAP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0
1

Year Published

2001
2001
2009
2009

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(21 citation statements)
references
References 3 publications
0
20
0
1
Order By: Relevance
“…Therefore, the sensing category consists of sensing algorithm, sensing technology and wearable sensing mechanism. Network requirements category means collecting requirements for the adaptation method which can support seamless computing infrastructures, framework for integration for user services out to the Celentano and Gaggi (2006), Kwon (2006a), Kwon, Yoo, et al (2005), Kwon, Yoo, and Suh (2006), Norrie et al (2007), Signer, Grossniklaus, and Norrie (2007), Wilson, Doyle, Weakliam, Bertolotto, and Lynch (2007) Communication systems Fogarty, Lai, and Christensen (2004), Goularte, Pimentel, and Moreira (2006), Raento, Oulasvirta, Petit, and Toivonen (2005), Ranganathan, Campbell, Ravi, and Mahajan (2002), Schmidt, Takaluoma, and Mantyjarvi (2000), Schilit, Hilbert, and Trevor (2002), Sumi and Mase (2000), Sumi and Nishida (2001) References of user infrastructure layer.…”
Section: Network Layermentioning
confidence: 99%
“…Therefore, the sensing category consists of sensing algorithm, sensing technology and wearable sensing mechanism. Network requirements category means collecting requirements for the adaptation method which can support seamless computing infrastructures, framework for integration for user services out to the Celentano and Gaggi (2006), Kwon (2006a), Kwon, Yoo, et al (2005), Kwon, Yoo, and Suh (2006), Norrie et al (2007), Signer, Grossniklaus, and Norrie (2007), Wilson, Doyle, Weakliam, Bertolotto, and Lynch (2007) Communication systems Fogarty, Lai, and Christensen (2004), Goularte, Pimentel, and Moreira (2006), Raento, Oulasvirta, Petit, and Toivonen (2005), Ranganathan, Campbell, Ravi, and Mahajan (2002), Schmidt, Takaluoma, and Mantyjarvi (2000), Schilit, Hilbert, and Trevor (2002), Sumi and Mase (2000), Sumi and Nishida (2001) References of user infrastructure layer.…”
Section: Network Layermentioning
confidence: 99%
“…Phones generally provide no information about the context of colleagues, and so people may unwittingly call colleagues at awkward or inappropriate times, such as when a person is in a meeting (Schmidt, 2000). Instant messaging clients often use recent computer activity to estimate presence, but many instant messaging sessions start with queries to determine if a colleague is actually present and to ask whether the colleague is available (Voida, 2002).…”
Section: Introductionmentioning
confidence: 99%
“…The user could listen to what the caller was saying and send a sequence of standard answers. Another system that shares the burden of the decision between caller and callee is Context-Call [29]. As with most profile options, the user must remember to update the stated context.…”
Section: Context and Mobile Telephonymentioning
confidence: 99%