Lecturer: Professor A. Hopper and others
No. of lectures: 16
Aims
The aim of this course is to broaden the experience of students by asking expert guest lecturers to discuss real-world issues which are of current interest to the computer community.
Lectures
Objectives
At the end of the course students should
Recommended books
Stajano, F.M. (2002). Security for ubiquitous computing. Wiley. ISBN 0-470-84493-0.
Campbell, A. & Nahrstedt, K. (1997). Building QoS into distributed systems. Chapman and Hall. ISBN 0-412-80940-0.
Harter, A., Hopper, A., Steggles, P., Ward, A. & Webster, P. (1999).
The anatomy of a context-aware application. Proceedings of the 5th Annual ACM/IEEE International conference on
Mobile computing and Networking (Mobicom '99), Seattle, Washington, USA,
August 15-20 1999. Available for download from
http://www.uk.research.att.com/abstracts.html
Hopper, A. (1999). Sentient computing.
The Royal Society Clifford Paterson Lecture 1999.
Available for download from http://www.uk.research.att.com/abstracts.html
Yang, S.J., Nieh, J., Selsky, M. & Tiwari, N. (2002).
The performance of remote display mechanisms for thin-client computing. In
Proceedings of the 2002 USENIX Annual Technical Conference, Monterey,
CA, June 10-15, 2002, pp. 131-146.
Global Positioning System Overview:
http://www.colorado.Edu/geography/gcraft/notes/gps/gps_f.html
Brown, C.M. & Terzopoulos, D. (ed.) (1995). Real-time Computer Vision.
Cambridge University Press.
Webb, W. Introduction to Wireless Local Loop. Second Edition:
Broadband and Narrowband Systems.
Broadband Wireless Association:
http://www.broadband-wireless.org/