- Aarts, E. (2004). "Ambient Intelligence: A Multimedia Perspective." IEEE Multimedia 11(1): 12-19.
- Abowd, G., C. Atkeson, et al. (1997). "Cyberguide: A Mobile Context-Aware Tour Guide." Wireless Networks 3(5): 421-433.
- Abowd, G. and E. Mynatt (2000). "Charting past, present and future research in ubiquitous computing." ACM Transactions on Computer-Human Interaction 7(1): 29-58.
- Abowd, G., E. Mynatt, et al. (2002). "The Human Experience." IEEE Pervasive Computing 1(1): 48-57.
- Amigoni, F., N. Gatti, et al. (2005). What Planner for Ambient Intelligence Applications? IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE.
- Andersson, M. (2006). Ubiquitous Transport Systems: Negotiating Context Through a Mobile-Stationary Interface. 14th European Conference on Information Systems (ECIS 2006). J. Ljungberg and M. Andersson. Goteborg, Sweden.
- Andersson, M. and R. Lindgren (2005). "The Mobile-Stationary Divide in Ubiquitous Computing Environments: Lessons from the Transport Industry." Information Systems Management 22(4): 65-79.
- Araya, A. (1995). Questioning Ubiquitous Computing. Proceedings of the 1995 ACM 23rd Annual Conference on Computer Science Nashville, Tennessee, USA.
- Banavar, G., J. Beck, et al. (2000). Challenges: An Application Model for Pervasive Computing. Proceedings of the 6th annual international conference on Mobile computing and networking, Boston, Massachusetts, United States ACM Press.
- Banavar, G. and A. Bernstein (2002). "Software Infrastructure and Design Challenges for Ubiquitous Computing Applications." Communications of the ACM 45(12): 92-96.
- Bannon, L., S. Benford, et al. (2005). "Hybrid Design Creates Innovative Museum Experiences." Communications of the ACM 48(3): 62-65.
- Benford, S., C. Magerkurth, et al. (2005). "Bridging the Physical and Digintal in Pervasive Gaming." Communications of the ACM 48(3): 54-57.
- Beresford, A. and F. Stajano (2003). "Location Privacy in Pervasive Computing." IEEE Pervasive Computing 2(1): 46-55.
- Boddupalli, P., F. Al-Bin-Ali, et al. (2003). Payment Support in Ubiquitous Computing Environments. Fifth IEEE Workshop on Mobile Computing Systems and Applications.
- Borriello, G., M. Chalmers, et al. (2005). "Delivering Real-World Ubiquitous Location Systems." Communications of the ACM 48(3): 36-41.
- Borriello, G. and R. Want (2000). "Embedded Computation Meets the World Wide Web." Communications of the ACM 43(5): 59-66.
- Braun, E. (1998). Technology in Context : Technology Assessment for Managers London ; New York Routledge.
- Buderi, R. (2001). "Computing Goes Everywhere." Technology Review 104(1).
- Bush, V. (1945). "As We May Think." Atlantic Monthly 176(1): 101-108.
- Cadman, J. (2003). Deploying Commercial Location Aware Systems. Proceedings of the 2003 Workshop on Location-Aware Computing.
- Chen, G. and D. Kotz (2000). A Survey of Context-Aware Mobile Computing Research. Technical Report TR2000-381, Department of Computer Science, Dartmouth College.
- Cheok, A. D., X. Yang, et al. (2002). "Touch-Space: Mixed Reality Game Space Based on Ubiquitous, Tangible, and Social Computing." Personal and Ubiquitous Computing 6(5/6): 430-442.
- Chin, J., V. Callaghan, et al. (2004). Pervasive Computing and Urban Development: Issues for the individual and society. The International Research Foundation for Development (IRFD): UN-Habitat World Urban Forum, Barcelona, Spain, .
- Consolvo, S., L. Arnstein, et al. (2002). User Study Techniques in the Design and Evaluation of a Ubicomp Environment. Proceedings of the 4th International Conference on Ubiquitous Computing, Lecture Notes in Computer Science.
- Cothrel, J. (2000). "Community Will Drive Wireless Web." Inter@ctive Week 7(13): 124.
- Cousins, K. C. and D. Robey (2003). Patterns of Use Within Nomadic Computing Environments: An Agency Perspective on Access – Anytime, Anywhere. Workshop on Ubiqutious Computing Environments, Case Western Reserve University, OH, USA.
- Coutaz, J., J. L. Crowley, et al. (2005). "Context is Key." Communications of the ACM 48(3): 49-53.
- Da Costa, O. and Y. Punie (2003). Ambient Intelligence in Everyday Life: A Function-Oriented Science & Technology Roadmapping Project. New Media and Everyday Life in Europe: EMTEL Final Conference, European Media, Technology and Everyday Life Research Network. London.
- Davidyuk, O., J. Riekki, et al. (2004). Context-Aware Middleware for Mobile Multimedia Applications. Proceedings of the 3rd International Conference on Mobile and Ubiquitous Multimedia. College Park, Maryland, USA, ACM.
- Davies, N. and H.-W. Gellersen (2002). "Beyond Prototypes: Challenges in Deploying Ubiquitous Computing Systems." IEEE Pervasive Computing 1(1): 26-35.
- Davis, G. B. (2002). "Anytime/Anyplace Computing and the Future of Knowledge Work." Communications of the ACM 45(2): 67-73.
- Dey, A. (2001). "Understanding and Using Context." Personal and Ubiquitous Computing 5(1): 4-7.
- Dey, A. and G. Abowd (2000). Towards a Better Understanding of Context and Context-Awareness. In the Workshop on The What, Who, Where, When, and How of Context-Awareness, as part of the 2000 Conference on Human Factors in Computing Systems (CHI 2000). The Hague, The Netherlands.
- Dourish, P. (2004). "What We Talk About When We Talk About Context." Personal and Ubiquitous Computing 8(1): 19-30.
- Dryer, D. C., C. Eisbach, et al. (1999). "At What Cost Pervasive? A Social View of Mobile Computing Systems." IBM Systems Journal 38(4): 652-676.
- Ducatel, K., Bogdanowicz, et al. (2001). Scenarios for Ambient Intelligence in 2010. ISTAG, European Commission.
- Edwards, W. K. and R. E. Grinter (2001). At Home with Ubiquitous Computing: Seven Challenges. Proceedings of the 3rd International Conference on Ubiquitous Computing.
- Edwards, W. K., M. W. Newman, et al. (2005). "Bringing Network Effects to Pervasive Spaces." Pervasive Computing 4(3): 15-17.
- Esler, M., J. Hightower, et al. (1999). Next Century Challenges: Data-Centric Networking for Invisible Computing: the Portolano project at the University of Washington. Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Seattle, Washington, USA, ACM/IEEE.
- Fano, A. and A. Gershman (2002). "The Future of Business Services in the Age of Ubiquitous Computing." Communications of the ACM 45(12): 83-87.
- Finin, T., A. Joshi, et al. (2002). "Intelligent Agents for Mobile and Embedded Devices." International Journal of Cooperative Information Systems 11(3/4): 205.
- Fleish, E. and C. Tellkamp (2003). The Challenge of Identifying Value-Creating Ubiquitous Computing Applications. in Ubiquitous Commerce Workshop, UbiComp 2003, Seattle, WA, USA.
- Fujinami, K., T. Yamabe, et al. (2004). "Take Me With You!": A Case Study of Context-Aware Application Integrating Cyber and Physical Spaces. ACM Symposium on Applied Computing, Nicosia, Cyprus.
- Garlan, D., D. Siewiorek, et al. (2002). "Project Aura: Toward Distraction-Free Pervasive Computing." Pervasive Computing 1(2): 22-31.
- Gershman, A. and A. Fano (2003). Customer Service with Eyes. in Ubiquitous Commerce Workshop, UbiComp 2003, Seattle, WA, USA.
- Gershman, A. and A. Fano (2005). "Examples of Commercial Applications of Ubiquitous Computing." Communications of the ACM 48(3): 71.
- Green, N., R. H. R. Harper, et al. (2001). "Configuring the Mobile User: Sociological and Industry Views." Personal and Ubiquitous Computing 5(146-156).
- Grover, V. and M. D. Goslar (1993). "The initiation, adoption, and implementation of telecommunications technologies in U.S. organizations." Journal of Management Information Systems 10(1): 141-163.
- Gupta, P. and D. Moitra (2004). "Evolving a Pervasive IT Infrastructure: A Technology Integration Approach." Personal and Ubiquitous Computing 8(1): 31-41.
- Hagras, H., V. Callaghan, et al. (2004). "Creating an Ambient-Intelligence Environment Using Embedded Agents." IEEE Intelligent Systems 19(6): 12-20.
- Hallnas, L. and J. Redstrom (2001). "Slow Technology – Designing for Reflection." Personal and Ubiquitous Computing 5: 201-212.
- Harter, A., A. Hopper, et al. (2001). "The Anatomy of a Context-Aware Application." Wireless Networks 8(2-3): 187-197.
- Helal, S. (2005). "Programming Pervasive Spaces." Pervasive Computing 4(1): 84-87.
- Henricksen, K., J. Indulska, et al. (2001). Infrastrucure for Pervasive Computing: Challenges. Proceedings of the Informatik 2001: Workshop on Pervasive Computing, Vienna.
- Hild, S. G. (2001). "Application Hosting for Pervasive Computing." IBM Systems Journal 40(1): 193.
- Ichinose, N. (2004). "Mobile E-Ticket and E-Membership Services." NEC Journal of Advanced Technology 1(3): 184-187.
- Ishii, H. and B. Ullmer (1997). Tangible Bits: Towards Seamless Interfaces between People, Bits and Atoms. Proceedings of the CHI ’97, ACM.
- Islam, N. and M. Fayad (2003). "Toward Ubiquitous Acceptance of Ubiquitous Computing." Communications of the ACM 46(2): 89-92.
- Issarny, V., D. Sacchetti, et al. (2005). "Developing Ambient Intelligence Systems: A Solution Based on Web Services." Automated Software Engineering 12: 101-137.
- ISTAG (2000). Recommendations of the IST Advisory Group for Workprogramme 2001 and beyond: ‘implementing the vision’. E. C. ISTAG.
- ISTAG (2002). "Software technologies, embedded systems and distributed systems: A European strategy towards an Ambient Intelligent environment." ISTAG, July 2002, Available from: ftp://ftp.cordis.lu/pub/ist/docs/istag_kk4402472encfull.pdf.
- ISTAG (2002). "Strategic Orientations and priorities for IST in FP6." ISTAG, Available from: ftp://ftp.cordis.lu/pub/ist/docs/istag_kk4402456encfull.pdf.
- ISTAG (2002). Trust, dependability, security and privacy for IST in FP6. E. C. ISTAG.
- ISTAG (2003). Ambient Intelligence: From Vision to Reality – For Participation in Society and Business. E. Commission.
- ISTAG (2003). "Research Results exploitation." Working Group WG3 Final Report, Sept. ’03, Available from: ftp://ftp.cordis.lu/pub/ist/docs/istag-wg3-final-report_en.pdf.
- ISTAG (2004). Strategic Orientations for Information and Communications Technologies Research in Europe. E. Commission.
- Jessup, L. M. and D. Robey (2002). "The Releveance of Social Issues in Ubiquitous Computing Environments." Communications of the ACM 45(12): 88-91.
- Judd, G. and P. Steenkiste (2003). Providing Contextual Information to Pervasive Computing Applications. IEEE International Conference on Pervasive Computing (PERCOM), Dallas, USA, IEEE.
- Kelly, D., J. Feller, et al. (2006). Complex Network-Based Information Systems (CNIS) Standards: Towards an Adoption Model. International Federation of Information Processing (IFIP WG8.6); The Transfer and Diffusion of Information Technology for Organizational Resilience, Galway, Ireland, Boston: Springer.
- Kelly, D., J. Feller, et al. (2006). Open vs. Closed Standards for Ambient Intelligence: An Exploratory Study of Adoption. Proceedings of the 14th European Conference on Information Systems (ECIS 2006), Gothenburg, Sweden.
- Kidd, C. D., R. Orr, et al. (1999). The Aware Home: A Living Laboratory for Ubiquitous Computing Research. Proceedings of the Second International Workshop on Cooperative Buildings, Integrating Information, Organization, and Architecture.
- Kouadri Mostefaoui, G. (2003). Security in Pervasive Environments, What’s Next? in the proceedings of the 2003 International Conference on Security and Management (SAM’03), Las Vegas, Nevada, USA.
- Kourouthanassis, P. and G. Roussos (2003). Developing the User Experience in Ubiquitous Computing. in Ubiquitous Commerce Workshop, UbiComp 2003, Seattle, WA, USA.
- Kourouthanassis, P., D. Spinellis, et al. (2002). Intelligent Cokes and Diapers: MyGROCER Ubiquitous Computing Environment. First International Mobile Business Conference.
- Lahlou, S., M. Langheinrich, et al. (2005). "Privacy and Trust Issues with Invisible Computers." Communications of the ACM 48(3): 59-60.
- Lai, J., S. Mitchell, et al. (2002). "Ubiquitous Access to Unified Messaging: A Study of Usability and the Use of Pervasive Computing." International Journal of Human-Computer Interaction 14(3/4).
- Lalis, S., A. Karypidis, et al. (2005). "Ad-Hoc Composition in Wearable and Mobile Computing." Communications of the ACM 48(3): 67-68.
- Lampe, M. and M. Strassner (2003). The Potential of RFID for Moveable Asset Management. Proceedings of Workshop on Ubiquitous Commerce, UbiComp ’03.
- Langheinrich, M. (2001). Privacy by Design – Principles of Privacy-Aware Ubiquitous Systems. Lecture Notes in Computer Science, Proceedings of the 3rd International Conference on Ubiquitous Computing. .
- Lassila, O. (2002). Serendipitous Interoperability. Semantic Web Kick-Off in Finland. E. Hyvonen. Helsinki, Finland, HIIT Publications: 243-256.
- Leug, C. (2002). Representations in Pervasive Computing. in the Proceedings of the Inaugural Asia Pacific Forum on Pervasive Computing, Adelaide, Australia.
- Lindwer, M., D. Marculesce, et al. (2003). Ambient Intelligence Visions and Achievements: Linking Abstract Ideas to Real-World Concepts. In Proceedings of the Conference on Design, Automation and Test in Europe (DATE ’03).
- Lyytinen, K. and G. M. Rose (2003). "Disruptive Information System Innovation: The Case of Internet Computing." Information Systems Journal 13(4): 301-330.
- Lyytinen, K. and Y. Yoo (2002). "Issues and Challenges in Ubiquitous Computing." Communications of the ACM 45(12): 63-65.
- Lyytinen, K. and Y. Yoo (2002). "The Next Wave of Nomadic Computing: A Research Agenda for Information Systems Research." Information Systems Research 13(4): 377-388.
- Lyytinen, K., Y. Yoo, et al. (2004). "Surfing the Next Wave: Design and Implementation Challenges of Ubiquitous Computing Environments." Communications of the AIS 13: 697-716.
- Maekawa, M. (2004). "ITS (Intelligent Transportation Systems) Solutions." NEC Journal of Advanced Technology 1(3): 194-199.
- Masuoka, R., B. Parsia, et al. (2003). Task Computing – the Semantic Web meets Pervasive Computing. Proceedings of the 2nd International Semantic Web Conference 2003 ( ISWC 2003), Florida, USA.
- Mattern, F. (2004). Ubiquitous Computing: Scenarios for an Informatized World. E-Merging Media – Kommunikation und Medienwirtschaft der Zukunft. A. Zerdick, A. Picot, K. Schrapeet al, Springer-Verlag: 155-174.
- Morikawa, H. and T. Aoyama (2004). "Realizing the Ubiquitous Network: the Internet and Beyond." Telecommunications Systems 25(3-4): 449-468.
- Mylonopoulos, N. and G. Doukidis (2003). "Introduction to the Special Issue: Mobile Business: Technological Pluralism, Social Assimilation, and Growth." International Journal of Electronic Commerce 8(1): 5-22.
- Nagumo, T. (2002). Innovative Business Models in the Era of Ubiquitous Networks.
- Nakajima, T., H. Ishikawa, et al. (2002). Technology Challenges for Building Internet-Scale Ubiquitous Computing. The Seventh IEEE Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2002), IEEE.
- Pascoe, J. (1998). Adding Generic Contextual Capabilities to Wearable Computers. 2nd International Symposium on Wearable Computers, IEEE.
- Pering, T., R. Ballagas, et al. (2005). "Spontaneous Marriages of Mobile Devices and Interactive Spaces." Communications of the ACM 48(9): 53-59.
- Pitkanen, O. (2003). Legal Challenges to Ubicommerce. in Ubiquitous Commerce Workshop, UbiComp 2003, Seattle, WA, USA.
- Prekop, P. and M. Burnett (2003). "Activities, context and ubiquitous computing." Computer Communications 26: 1168-1176.
- Punie, Y. (2003). A social and technological view of Ambient Intelligence in Everyday Life: What bends the trend? I. Technical Report EUR 20975 EN, EMTEL, Directorate General Joint Research Centre, European Commission.
- Rao, B. and R. Zimmermann (2005). "Preface to the Focus Theme Section ‘Pervasive Computing / Ambient Intelligence’." Electronic Markets 15(1): 3.
- Rehman, K., F. Stajano, et al. (2002). Interfacing with the Invisible Computer. In Proceedings of NordiCHI.
- Remagnino, P. and G. L. Foresti (2005). "Ambient Intelligence: A New Multidisciplinary Paradigm." IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 35(1): 1-6.
- Riva, G., P. Loreti, et al. (2003). Presence 2010: The Emergence of Ambient Intelligence. Being There: Concepts, Effects and Measurement of User Presence in Synthetic Environments. G. Riva, F. Davide and W. A. Ijsselsteijn Amsterdam, The Netherlands, Ios Press.
- Roussos, G., A. Gershman, et al. (2003). Ubiquitous Commerce. in Ubiquitous Commerce Workshop, UbiComp 2003,, Seattle, WA, USA.
- Russell, D. M., N. Streitz, et al. (2005). "Building Disappearing Computers." Communications of the ACM 48(3): 42-48.
- Saha, D. and A. Mukherjee (2003). "Pervasive Computing: A Paradigm for the 21st Century." IEEE Computer 36(3): 25-31.
- Sasaki, H. (2004). "Toward the Realization of a Japan-Initiated Ubiquitous Society." NEC Journal of Advanced Technology 1(1): 63-69.
- Satyanarayanan, M. (1996). Fundamental Challenges in Mobile Computing. Annual ACM Symposium on Principles of Distributed Computing, Philadelphia, USA.
- Satyanarayanan, M. (2001). "Pervasive Computing: Vision and Challenges." Personal Communications 8(4): 10-17.
- Satyanarayanan, M. (2002). "A Catalyst for Mobile and Ubiquitous Computing." IEEE Pervasive Computing 1(1): 2-5.
- Scheepers, R. and H. Scheepers (2003). Contexts of Relevance in Explanatory Case Studies in IS: Ubiquitous Information Technology Implementation in Organisations. Proceedings of International Conference on Information Systems, ICIS 2003, Seattle, Washington, USA, Association for Information Systems.
- Schilit, B., N. Adams, et al. (1994). Context-Aware Computing Applications. IEEE Workshop on Mobile Computing Systems and Applications, IEEE.
- Scholtz, J. (2001). "Ubiquitous Computing Goes Mobile." ACM SIGMOBILE Mobile Computing and Communications Review 5(3): 32-38.
- Shin, B. and H. G. Lee (2005). "Ubiquitous Computing-Driven Business Models: A Case of SK Telecom’s Financial Services." Electronic Markets 15(1): 4-12.
- Simoncini, L., S. Di Giandomenico, et al. (2004). Architectural Challenges for a Dependable Information Society. In Fault Tolerance for Trustworthy and Dependable Information Infrastructures, WCC 18th IFIP World Computer Congress, Toulouse, France.
- Skordas, T. and G. Metakides (2003). "Major Challenges in Ambient Intelligence." Studies in Informatics and Control 12(2): 85-89.
- Stajano, F. (2003). "Security for Whom? The Shifting Security Assumptions of Pervasive Computing." Lecture Notes in Computer Science 2609: 16-27.
- Stajano, F. and J. Crowcroft (2003). The butt of the iceberg: hidden security problems of ubiquitous systems. Ambient intelligence: impact on embedded system design. MA, USA, Kluwer Academic Publishers: p. 91-101.
- Streitz, N. and P. Nixon (2005). "The Disappearing Computer." Communications of the ACM 48(3): 33-35.
- Tassey, G. (2000). "Standardization in Technology-Based Markets." Research Policy 29(4-5): 587-602.
- Tolmie, P., J. Pycock, et al. (2002). Unremarkable Computing. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems: Changing our world, changing ourselves, Minneapolis, Minnesota, USA
- Tsuji, T., S. Kouno, et al. (2004). "Asset Management Solution Based on RFID." NEC Journal of Advanced Technology 1(4): 188-193.
- Velastin, S. A., B. A. Boghossian, et al. (2005). "PRISMATICA: Toward Ambient Intelligence in Public Transport Environments." IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 35(1): 164-182.
- Want, R., A. Hopper, et al. (1992). "The Active Badge Location System." ACM Transactions on Information Systems 10(1): 91-102.
- Want, R., B. Schilit, et al. (1995). "An Overview of the PARCTAB Ubiquitous Computing Experiment." IEEE Personal Communications 2(6): 28-43.
- Watson, R. T., L. F. Pitt, et al. (2002). "U-Commerce: Expanding the Universe of Marketing." Journal of the Academy of Marketing Science 30(4): 333.
- Weiser, M. (1991). "The Computer for the 21st Century." Scientific American 265(3): 94-104.
- Weiser, M. and J. S. Brown (1996). "The Coming Age of Calm Technology (Revision of Weiser & Brown. "Designing Calm Technology")." PowerGrid Journal.
- Weyrich, C. (1999). Orientations for Workprogramme 2000 and beyond. A. f. f. f. c. l. p. i. d. i.-.-f. p. European Commission: ISTAG.
- Xavier, M. J. (2003). "Customer Insight and Intimacy in the Silent Commerce Era." IIMB Management Review 15(3): 93-98.
- Yang, H., Y. Yoo, et al. (2003). Diffusion of Broadband Mobile Services in Korea: The Role of Standards and Its Impact on Diffusion of Complex Technology Systems. The Second Workshop on Ubiquitous Computing Environment. Cleveland, OH USA.
- Yoo, Y. and K. Lyytinen (2003). Measuring the Consequences of Ubiquitous Computing in Networked Organizations, Sprouts: Working Papers on Information Environments, Systems and Organizations, .
- Zambonelli, F. and M. Mamei (2002). "The Cloak of Invisibility: Challenges and Applications." IEEE Pervasive Computing 1(4): 62-70.
Updated 26th July, ’07