Search
Search Results
-
UBIFSec: Adding DNEFS to UBIFS
This chapter presents UBIFSec, an implementation of DNEFS with the flash file system UBIFS.We describe our implementation and furthermore integrate... -
Cloud Storage: Background and Related Work
This chapter begins the part on secure deletion for remote storage. We present details on the characteristics of persistent storage, a model of a... -
Project 3: Using Weather Sensors
IoT solutions often employ a number of sensors to observe the world around us and while you’ve explored a project with a simple sensor, you have yet... -
Project 6: Windows IoT and Arduino
If you are just starting to work with hardware and IoT solutions, you may not have encountered the world that is Arduino and microcontrollers. These... -
Windows 10 IoT Development with Python
Now that you have a basic understanding of how to use Visual Studio 2015, you can learn more about some of the languages you may encounter when... -
Robust Key Management for Secure Data Deletion
This chapter considers the problem of an unreliable securely deleting storage medium, that is, one that may lose data, expose data, fail to delete... -
Conclusion and Future Work
This chapter is the conclusive part of this book. We review our contributions and integrate them into our systematization. We present some related... -
Introduction
This chapter explains the scope, motivation and structure of the book. -
Related Work on Secure Deletion
This chapter surveys related work and organizes existing solutions in terms of their interfaces. The chapter further presents a taxonomy of... -
Case Study: Approaching the Learning of Kanji Through Augmented Toys in Japan
Aside from their use in recreation, toys and toy technologies can also be employed in enhanced learning and education. The merging of augmented... -
Mobile Computing Toys: Marketing Challenges and Implications
Global sales of traditional toys such as dolls, action figures, and role-play games are either flat or shrinking. One of the main reasons for the... -
Toy Computing Background
The purpose of this chapter is to provide a background on the fundamental concepts of Toy Computing, including mobile services, physical computing,... -
Advanced Sound Integration for Toy-Based Computing
Despite the growing awareness regarding the importance of sound in the human-computer interface and the potential interaction opportunities it can... -
Introduction to Toy Computing
Toys have evolved over the ages from simple dolls and cars to electronic toys, and more recently have been integrating mobile technologies. Toy... -
Emerging Human-Toy Interaction Techniques with Augmented and Mixed Reality
In this book chapter, we will review the emerging technologies that promote extensive interactions between toys and their players. Cutting-edge... -
Privacy Requirements in Toy Computing
This chapter outlines the privacy requirements for a toy computing environment. The unique architecture of toy computing requires consideration of... -
Toys and Mobile Applications: Current Trends and Related Privacy Issues
A toy is a product that is intended for play. Common examples of toys include dolls, board games and video games. Based on the reports from the 110th... -
Augmented Reality for Mobile Service of Film-Induced Tourism App
A multitude of tourists seek to travel to scenic spots where popular movies and TV dramas have been filmed. Filming tourism has become a popular... -
A Shell-Like Induction Electrical Machine
This paper proposes to recover the concept of spherical induction electrical machines to conceive a shell-like actuator with multi-DOF... -
Strategies to Improve Synchronous Dataflows Analysis Using Map**s between Petri Nets and Dataflows
Over the last decades a large variety of dataflow solutions emerged along with the proposed models of computation (MoC), namely the Synchronous...