Spelling suggestions: "subject:"[een] UBIQUITOUS COMPUTING"" "subject:"[enn] UBIQUITOUS COMPUTING""
121 |
Tailoring Large Interactive Public Displays For University StudentsAmirjani, Mehrnaz January 2013 (has links)
No description available.
|
122 |
Improving Understanding and Trust with Intelligibility in Context-Aware ApplicationsLim, Brian Y. 01 May 2012 (has links)
To facilitate everyday activities, context-aware applications use sensors to detect what is happening and use increasingly complex mechanisms (e.g., by using big rule-sets or machine learning) to infer the user's context and intent. For example, a mobile application can recognize that the user is in a conversation and suppress any incoming calls. When the application works well, this implicit sensing and complex inference remain invisible. However, when it behaves inappropriately or unexpectedly, users may not understand its behavior. This can lead users to mistrust, misuse, or even abandon it. To counter this lack of understanding and loss of trust, context-aware applications should be intelligible, capable of explaining their behavior.
We investigate providing intelligibility in context-aware applications and evaluate its usefulness to improve user understanding and trust in context-aware applications. Specifically, this thesis supports intelligibility in context-aware applications through the provision of explanations that answer different question types, such as: Why did it do X? Why did it not do Y? What if I did W, What will it do? How can I get the application to do Y?
This thesis takes a three-pronged approach to investigating intelligibility by (i) eliciting the user requirements for intelligibility, to identify what explanation types end-users are interested in asking context-aware applications, (ii) supporting the development of intelligible context-aware applications with a software toolkit and the design of these applications with design and usability recommendations, and (iii) evaluating the impact of intelligibility on user understanding and trust under various situations and application reliability, and measuring how users use an interactive intelligible prototype. We show that users are willing to use well-designed intelligibility features, and this can improve user understanding and trust in the adaptive behavior of context-aware applications.
|
123 |
Embodied context models and an approach to re-using context-aware middlewareDahlem, David C.P. 15 April 2008 (has links)
This thesis develops a generalized approach for decoupling how a context model is
defined and executed from how context-aware data is acquired and managed within a
given middleware system. Decoupling the model specification from the data will likely
provide more avenues of context-aware investigations due to an increased flexibility in
the choice of a middleware system for handling context data. We provide a detailed
description of the approach developed for this decoupling task, called Inspect, Adapt,
Model, and Integrate (IAMI). By engaging the steps we show that a context model need
not be specifically tied to a given context-aware middleware. This successful decoupling
will likely add to the future development of context-aware systems by allowing
researchers to build upon existing frameworks as opposed to repeatedly engaging in
ground-up development. Moreover, we submit that this decoupling is important in that
the number of possible ways of representing and expressing a context model is
potentially infinite, but the choice of context-aware middleware systems is limited.
|
124 |
Seamless mobility in ubiquitous computing environmentsSong, Xiang 09 July 2008 (has links)
Nominally, one can expect any user of modern technology to at least carry a handheld device of the class of an iPAQ (perhaps in the form of a cellphone). The availability of technology in the environment (home, office, public spaces) also continues to grow at an amazing pace. With advances in technology, it is feasible to remain connected and enjoy services that we care about, be it entertainment, sports, or plain work, anytime anywhere. We need a system that supports seamless migration of services from handhelds to the environment (or vice versa) and between environments. Virtualization technology is able to support such a migration by providing a common virtualized interface on both source and destination.
In this dissertation, we focus on two levels of virtualization to address issues for seamless mobility. We first identify three different kinds of spaces and three axes to support mobility in these spaces. Then we present two systems that address these dimensions from different perspectives. For middleware level virtualization, we built a system called MobiGo that can capture the application states and restore the service execution with saved states at the destination platform. It provides the architectural elements for efficiently managing different states in the different spaces. Evaluation suggested that the overhead of the system is relatively small and meets user's expectation. On the other hand, for device level virtualization, Chameleon is a Xen-like system level virtualization system to support device level migration and automatic capability adaptation at a lower level. Chameleon is able to capture and restore device states and automatically accommodate the heterogeneity of devices to provide the migration of services. Device level virtualization can address some issues that cannot be addressed in middleware level virtualization. It also has less requirements than middleware level virtualization in order to be applied to existing systems. Through performance measurements, we demonstrate that Chameleon introduces minimal overhead while providing capability adaptation and device state migration for seamless mobility in ubiquitous computing environments.
|
125 |
Secure, privacy assured mechanisms for heterogeneous contextual environmentsVasanta, Harikrishna January 2006 (has links)
Location information is used to provide a diverse range of services to users such as emergency, navigation, billing, security, information and advertising services. This information is derived from a broad range of indoor and outdoor technologies. The location information thus derived is of different granularity, different co-ordination system and is controlled by numerous service providers. In addition to this, broad selections of devices are used for providing these services. Having a diverse range of applications requiring location information at different levels of granularity, the need to export location information across multiple devices and the existence of different location determination technologies necessitates the need for heterogeneous location network. These networks derive location information from multiple sources and provides various location-based services to users irrespective of the medium, device or technology used. Security, user privacy and management of location information are some of the important issues that need to be addressed. The main contribution of this thesis is the design of a secure and privacy assured heterogeneous location architecture. A formal methodology was chosen to design the heterogeneous location architecture. The design of the architecture resulted in a novel key distribution protocol and a model for information flow that can be easily encapsulated into applications or architectures having similar requirements. The research also resulted in the enhancement of a proposed location framework for securing critical infrastructures using context-aware self-defending objects. The proposed enhanced framework helps to negate the security vulnerabilities introduced through the use of general-purpose computer systems in critical infrastructures.
|
126 |
A participatory design approach in the engineering of ubiquitous computing systemsTimothy Cederman-Haysom Unknown Date (has links)
Ubiquitous computing aims to make human-computer interaction as naturalistic and functionally invisible as possible through embedding computing potential within a particular context to support human activity. However, much of ubiquitous computing research is focussed on technical innovation due to the challenges involved with deploying embedded computing, thereby reducing the commitment to the philosophical ideals of ubiquitous computing in research. This dissertation describes the investigation of a participatory approach to technically-complex research in order to understand how our view of the engineering and human challenges changes when the two are approached hand-in-hand. The domain chosen for this system was a dental surgery. Dentistry involves a complex workspace with computer interaction constrained by surgery hygiene. Ubiquitous computing offers a compelling interaction alternative to the keyboard and mouse paradigm in such an environment. A multi-method approach that employed ethnographic research and design prototyping was undertaken with dentists from several different private practices. A series of field studies used ethnographic methods such as observation and interview. Design events explored prototypes with activities such as design games, contextual interviews, role-playing and contextual prototyping. Activities were devised with the aim of providing a level playing field, whereby both designers and participants feel they can contribute equally, with their respective disciplinary knowledge. It was found that methods needed to be carefully chosen, devised and managed, in order to communicate complex concepts with participants and to constrain the design to technically feasible options. The thesis examines the design problem from the perspectives of a variety of different stakeholders within a participatory design framework, reflected upon by means of human-centred action research. Data was gathered through design speculations and observation, and explored using methods such as the Video Card Game and Video Interaction Analysis. Fieldwork was analysed using a multi-stage qualitative analysis process which informed further design collaboration with participants. The analysis of data gathered during design studies with dentists also contributed to the development of a prototype system to validate methodological contributions. The resulting prototype utilised off-the-shelf hardware and software which allowed for innovative customisation and development. In-situ prototyping (defined by the author as “participatory bootstrapping”) and a comprehensive knowledge of the domain afforded the creative application of technology. In addition to contributing to the prototype design, the interpretive understandings drawn from analysis identified how technical ideas were presented and utilised by participants of the studies, and how best to engage busy professionals. The final outcomes of the research were a multimodal ubiquitous computing system for interacting within a dental surgery; the development and implementation of a variety of methods aimed at communicating technical concepts and eliciting user motivations, practices and concerns; and a set of design principles for engineers engaging in design of systems for human use. The research presented within this thesis is primarily part of the field of human-computer interaction, but provides evidence of how engineering development can be influenced by a user-centred participatory approach. The benefits that derive from inclusive methods of design are demonstrated by the evaluation of a prototype that employed such methods. The contribution of this thesis is to demonstrate and delineate methods for developing ubiquitous computing technologies for the context of human use. This led to a set of design principles for the engineering of systems for human use: 1. Technology needs to be robust and simple to appropriate. This allows users to give insights on technology developments and also to allow users to discover for themselves how they would use the technology. 2. An evolving and carefully considered set of methods are needed to elicit communication between practitioners and across disciplines. The gaps in understandings and the different representations that arise across the disciplines provide essential clues to next steps in design. These gaps and differences form tensions that can be exploited productively. 3. Context is important for determining which design steps to take. Rather than abstracting a problem in order to solve it, as is usual in engineering design, the problem should remain grounded in the context of use. It reveals what the real problems are that need to be solved rather than the imagined ones. This requires an appreciation of the situated nature of action and of the variability of work. In turn it also requires an appreciation of what the human can and does do and what the machine should support. 4. Accountability in design is required. There is a fundamental tension between trying to make something work and seeing what really does work; specifically it is necessary to understand when automation is worth it in human machine systems. While engaged in the design process, engineers should ask how much technology should reconfigure human practices because of a useful outcome, rather than attempting to automate and converge devices for its own sake. A clear understanding of the constraints and workings of the work space needs to be balanced with the understandings of the limitations of the technology in order to design a system that improves work practice and empowers the practitioner.
|
127 |
Migrating characters: effective user guidance in instrumented environmentsKruppa, Michael January 2006 (has links)
Zugl.: Saarbrücken, Univ., Diss., 2006
|
128 |
Ubiquitous user modelingHeckmann, Dominikus January 2005 (has links)
Zugl.: Saarbrücken, Univ., Diss., 2005
|
129 |
Geographisches Routing : Grundlagen und Basisalgorithmen /Frey, Hannes. January 2006 (has links)
Universiẗat, Diss., 2006--Trier.
|
130 |
Indexing to situated interactions /Paay, Jeni. January 2006 (has links)
Thesis (Ph.D.)--University of Melbourne, Dept. of Information Systems and Faculty of Architecture, Building and Planning 2006. / Typescript. Includes bibliographical references (leaves 261-275).
|
Page generated in 0.0362 seconds