Proceedings of the 7th International Conference on Human Computer Interaction With Mobile Devices &Amp; Services 2005
DOI: 10.1145/1085777.1085786
|View full text |Cite
|
Sign up to set email alerts
|

Exploring bluetooth based mobile phone interaction with the hermes photo display

Abstract: One of the most promising possibilities for supporting user interaction with public displays is the use of personal mobile phones. Furthermore, by utilising Bluetooth users should have the capability to interact with displays without incurring personal financial connectivity costs. However, despite the relative maturity of Bluetooth as a standard and its widespread adoption in today's mobile phones, little exploration seems to have taken place in this area -despite its apparent significant potential. This pape… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
60
0

Year Published

2007
2007
2014
2014

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 79 publications
(61 citation statements)
references
References 11 publications
1
60
0
Order By: Relevance
“…Enabling technologies for communication, such as near field communication (NFC), radio frequency identification (RFID) and Bluetooth, can be used to sense the co-location of target devices in the proximity of the user [6,18]. Moreover, different characteristics of proximity in interacting in ubiquitous computing environments have been identified [13].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Enabling technologies for communication, such as near field communication (NFC), radio frequency identification (RFID) and Bluetooth, can be used to sense the co-location of target devices in the proximity of the user [6,18]. Moreover, different characteristics of proximity in interacting in ubiquitous computing environments have been identified [13].…”
Section: Related Workmentioning
confidence: 99%
“…The Migration Platform source device (6) relays this request to the Migration Client of the specif hen invokes the previously injected JavaScript code for ss serialises the document object model (DOM) of the state of the interaction (e.g. content of page elemen ata back to the Migration Platform (7), which saves it t running on the target device is then notified (8), with page to be migrated and automatically opens the page e B.…”
Section: General Architecture Descriptionmentioning
confidence: 99%
“…Thus, in more detail, we consider an instance of a BluScreen installation with a single display screen that is managed by a single marketplace agent 3 . We consider that access to the display screen is divided into discrete advertising cycles, each of length tc, and a first-price sealed bid auction is held immediately prior to the start of each advertising cycle.…”
Section: The Auction Mechanismmentioning
confidence: 99%
“…These displays have typically addressed the needs of a closed set of known users with pre-defined interests and requirements, and have facilitated communication with these users through the active use of handheld devices such as PDAs or phones [3,7]. As such, these systems assume prior knowledge about the target audience, and require either that a single user has exclusive access to the display, or that users carry specific tracking devices so that their presence can be identified [6,11].…”
mentioning
confidence: 99%
“…This has enabled the development of a number of pervasive and ubiquitous computing projects, such as location detection [2], [3], or identifying co-located users [4]. The synergy of combining such near-field wireless technologies with personal devices is now being realized though a number of interactive intelligent displays that support communication with a user through the active use of handheld devices such as PDAs or phones, or to a closed set of known users with pre-defined interests and requirements [5], [6]. Such systems assume prior knowledge about the target audience, and require either that a single user has exclusive access to the display, or that users carry specific tracking devices [7], [8] so that their presence can be identified.…”
Section: Introductionmentioning
confidence: 99%