1 / 4

Pattern Group A – Ubiquitous Computing Genres

Explore cutting-edge patterns in the realm of ubiquitous computing for efficient emergency response. Discover how to leverage technology for enhanced outcomes.

guytonj
Download Presentation

Pattern Group A – Ubiquitous Computing Genres

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Pattern Group A – Ubiquitous Computing Genres Enhanced Emergency Response (A6) Personal Memory Aids (A7) Guides for Exploration and Navigation (A5) Smart Homes (A8) Core Patterns Personal Ubiquitous Computing (A2) Upfront Value Proposition (A1) Ubiquitous Computing for Groups (A3) Ubiquitous Computing for Places (A4) Enabling Mobile Commerce (A12) Enriching Educational Experiences (A9) Streamlining Business Operations (A11) Augmented Reality Games (A10)

  2. Pattern Group B – Physical-Virtual Spaces Topical Information (B2) Active Map (B1) User-Created Content (B4) Find a Place (B5) Find a Friend (B6) Successful Experience Capture (B3) Notifier (B7)

  3. Pattern Group C – Developing Successful Privacy Physical Privacy Zones (C8) Partial Identification (C7) Keeping Personal Data On Personal Devices (C15) Limited Data Retention (C12) Designing and Building Patterns Privacy Sensitive Architecture (C6) Core Patterns Fair Information Practices (C1) Respecting Social Organizations (C2) Building Trust and Credibility (C3) Reasonable Levels of Control (C4) Appropriate Privacy Feedback (C5) Notification on Access of Personal Data (C13) Blur Personal Data (C9) Invisible Mode (C11) Privacy Mirrors (C14) Limited Access to Personal Data (C10)

  4. Pattern Group D – Designing Fluid Interactions Follow-me Displays (D10) Pick and Drop (D11) Core Patterns Scale of Interaction (D1) Context Sensitive I/O (D6) Sensemaking of Services and Devices (D2) Streamlining Repetitive Tasks (D3) Active Teaching (D7) Keeping Users in Control (D4) Resolving Ambiguity (D8) Serendipity in Exploration (D5) Ambient Displays (D9)

More Related