A "Device Correlator," operates to identify and configure complementary
devices as a combined function of device "touching" and observations of
contextual history of human interaction with the various devices in an
ad-hoc network environment. New devices are brought into a local trust
domain of the network via a "touch-based" process. Further, as each
device is added to the trust domain, a contextual history of user
interaction with each device is recorded. This recorded context history
is evaluated to determine probable device associations. Inter-device
associations and device behaviors for trusted devices are then
automatically configured as a function of both the context history and
the capabilities of the various devices. The result is an automatically
configured invisible computing environment, wherein the only actions
required by the user are to bring new devices into the local area of the
ad-hoc network, and then designate those devices as being trusted.