• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 198
  • 137
  • 33
  • 19
  • 17
  • 10
  • 4
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 470
  • 470
  • 162
  • 125
  • 111
  • 108
  • 91
  • 86
  • 77
  • 69
  • 67
  • 67
  • 63
  • 60
  • 59
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Semantic-Based Context-Aware Service Discovery in Pervasive-Computing Environments

El-Sayed, Abdur-Rahman January 2006 (has links)
Recent technological advancements are enabling the vision of pervasive or ubiquitous computing to become a reality. Service discovery is vital in such a computing paradigm, where a great number of devices and software components collaborate unobtrusively and provide numerous services. Current service-discovery protocols do not make use of contextual information in discovering services, and as a result, fail to provide the most appropriate and relevant services for users. In addition, current protocols rely on keyword-based search techniques and do not consider the semantic description of services. Thus, they suffer from poor precision and recall. To address the need for a discovery architecture that supports the envisioned scenarios of pervasive computing, we propose a context-aware service-discovery protocol that exploits meaningful contextual information, either static or dynamic, to provide users with the most suitable and relevant services. The architecture relies on a shared, ontology-based, semantic representation of services and context to enhance precision and recall, and to enable knowledge sharing, capability-based search, autonomous reasoning, and semantic matchmaking. Furthermore, the architecture facilitates a dynamic service-selection mechanism to filter and rank matching services, based on their dynamic contextual attributes, which further enhances the discovery process and saves users time and effort. Our empirical results indicate the effectiveness and feasibility of the proposed architecture.
42

Non-Intrusive Computing

Chen, Hao January 2008 (has links)
Pervasive computing is an important trend today. It concerns devices and services in a smart space that interact with users in a simple, natural, and harmonious way. Many problems in this domain have been studied from different perspectives in various projects. However, one important characteristic of pervasive computing, which is how to make it non-intrusive so that users can focus on their tasks, has received little formal attention. Nowadays, many computing entities including smart devices, and software components, are involved in our daily lives, and users need to deal with them as well as with other people. Besides, people are easy to reach with multiple devices. We believe there should be a systematic way to help users avoid intrusive ones. We propose a model for posing and answering two questions: will an interaction intrude on its receiver if delivered, and given that the interaction is deliverable, how can it be delivered effectively and not too overtly? With this model, the intrusion problem is analyzed and the essential factors are identified. A quantitative approach is used, so that factors have quantitative values for comparison and computation. We also apply context to refine them in order to achieve better results. We then illustrate how to materialize the model and build a system whose design is inspired by the Jabber framework that includes a collection of standards, technologies, and projects for instant messaging. The discussion is at a general level that does not depend on Jabber. However, by choosing Jabber in implementation, we reuse existing software and technologies, and benefit from Jabber/XMPP standardization, its low entry barrier for application developers, and its rich community support. The main contributions of our work are two-fold. First, we propose a model for intrusiveness in pervasive computing. Second, we address the problem at the system level by designing and realizing it. We also make use of standardized instant-messaging technologies, more precisely Jabber, in the system instantiation to reuse existing software, making the system more flexible and extensible.
43

Smart assistants for smart homes

Rasch, Katharina January 2013 (has links)
The smarter homes of tomorrow promise to increase comfort, aid elderly and disabled people, and help inhabitants save energy. Unfortunately, smart homes today are far from this vision – people who already live in such a home struggle with complicated user interfaces, inflexible home configurations, and difficult installation procedures. Under these circumstances, smart homes are not ready for mass adoption. This dissertation addresses these issues by proposing two smart assistants for smart homes. The first assistant is a recommender system that suggests useful services (i.e actions that the home can perform for the user). The recommended services are fitted to the user’s current situation, habits, and preferences. With these recommendations it is possible to build much simpler user interfaces that highlight the most interesting choices currently available. Configuration becomes much more flexible: since the recommender system automatically learns user habits, user routines no longer have to be manually described. Evaluations with two smart home datasets show that the correct service is included in the top five recommendations in 90% of all cases. The second assistant addresses the difficult installation procedures. The unique feature of this assistant is that it removes the need for manually describing device functionalities (such descriptions are needed by the recommender system). Instead, users can simply plug in a new device, begin using it, and let the installation assistant identify what the device is doing. The installation assistant has minimal requirements for manufacturers of smart home devices and was successfully integrated with an existing smart home. Evaluations performed with this smart home show that the assistant can quickly and reliably learn device functionalities. / <p>QC 20130924</p>
44

Semantic-Based Context-Aware Service Discovery in Pervasive-Computing Environments

El-Sayed, Abdur-Rahman January 2006 (has links)
Recent technological advancements are enabling the vision of pervasive or ubiquitous computing to become a reality. Service discovery is vital in such a computing paradigm, where a great number of devices and software components collaborate unobtrusively and provide numerous services. Current service-discovery protocols do not make use of contextual information in discovering services, and as a result, fail to provide the most appropriate and relevant services for users. In addition, current protocols rely on keyword-based search techniques and do not consider the semantic description of services. Thus, they suffer from poor precision and recall. To address the need for a discovery architecture that supports the envisioned scenarios of pervasive computing, we propose a context-aware service-discovery protocol that exploits meaningful contextual information, either static or dynamic, to provide users with the most suitable and relevant services. The architecture relies on a shared, ontology-based, semantic representation of services and context to enhance precision and recall, and to enable knowledge sharing, capability-based search, autonomous reasoning, and semantic matchmaking. Furthermore, the architecture facilitates a dynamic service-selection mechanism to filter and rank matching services, based on their dynamic contextual attributes, which further enhances the discovery process and saves users time and effort. Our empirical results indicate the effectiveness and feasibility of the proposed architecture.
45

Non-Intrusive Computing

Chen, Hao January 2008 (has links)
Pervasive computing is an important trend today. It concerns devices and services in a smart space that interact with users in a simple, natural, and harmonious way. Many problems in this domain have been studied from different perspectives in various projects. However, one important characteristic of pervasive computing, which is how to make it non-intrusive so that users can focus on their tasks, has received little formal attention. Nowadays, many computing entities including smart devices, and software components, are involved in our daily lives, and users need to deal with them as well as with other people. Besides, people are easy to reach with multiple devices. We believe there should be a systematic way to help users avoid intrusive ones. We propose a model for posing and answering two questions: will an interaction intrude on its receiver if delivered, and given that the interaction is deliverable, how can it be delivered effectively and not too overtly? With this model, the intrusion problem is analyzed and the essential factors are identified. A quantitative approach is used, so that factors have quantitative values for comparison and computation. We also apply context to refine them in order to achieve better results. We then illustrate how to materialize the model and build a system whose design is inspired by the Jabber framework that includes a collection of standards, technologies, and projects for instant messaging. The discussion is at a general level that does not depend on Jabber. However, by choosing Jabber in implementation, we reuse existing software and technologies, and benefit from Jabber/XMPP standardization, its low entry barrier for application developers, and its rich community support. The main contributions of our work are two-fold. First, we propose a model for intrusiveness in pervasive computing. Second, we address the problem at the system level by designing and realizing it. We also make use of standardized instant-messaging technologies, more precisely Jabber, in the system instantiation to reuse existing software, making the system more flexible and extensible.
46

INCA: An Infrastructure for Capture and Access Supporting the Generation, Preservation and Use of Memories from Everyday Life

Truong, Khai Nhut 13 July 2005 (has links)
Peoples daily lives and experiences often contain memories and information that they may want to recall again at a later time. Human memory, however, has its limitations and many times it alone may not be sufficient. People sometimes have difficulty recalling salient information and can forget important details over time. To complement what they can remember naturally, people must expend much time and manual effort to record desired content from their lives for future retrieval. Unfortunately, manual methods for capturing information are far from ideal. Over the years, ubiquitous computing researchers have constructed devices and applications to support the automated capture of live experiences and access to those records. At Georgia Tech, we have also investigated the benefits of automated capture and access in over half a dozen projects since 1995. As we encountered challenges in developing these systems, we began to understand how the difficulty of building capture and access systems can prevent exploration of the hard issues intertwined with understanding how capture impacts our everyday lives. These challenges illustrate the need for support structures in building this class of ubiquitous computing systems. This dissertation presents a set of abstractions for a conceptual framework and a focused design process that encourages designers to decompose the design of capture and access applications into a set of concerns that will be easier to develop and to manage. In addition, an implementation of the framework called the INCA Toolkit is discussed, along with a number of capture and access applications that have been built with it. These applications illustrate how the toolkit is used in practice and supports explorations of the capture and access design space.
47

An Anonymous Authentication Protocol with Chargeability and Fair Privacy for Mobile Network Environments

Huang, Shi-Ming 26 July 2006 (has links)
Mobile network equipments are widely popularized and advanced mobile communication services are provided increasingly such that ubiquitous computing environments will come true soon. It is a pleasure for mobile users to work or get recreations in the mobile network environments. However, just as the cases in wireline environments, there are a lot of security threats to mobile network systems and their impact on the security is more serious than that in wireline environments owing to the feature of wireless transmissions and the ubiquity property in mobile network systems. The secret personal information, important data, or classified missives which mobile users carry may be stolen by malicious entities. In order to guarantee the quality of the advanced communication services, the security and privacy would be the important issues when mobile users roam to the mobile networks. In this thesis, an anonymous authentication protocol will be proposed to protect both the security of the mobile network system and the privacy of mobile users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also the identity of each user can be kept secret against anyone else including the system. Although the users are anonymously authenticated by the system, it can still make correct bills to charge these anonymous users. Finally, our protocol also achieves the goal of fair privacy which allows the judge to be able to revoke the anonymity and trace the illegal users when they misused the anonymity property such as they committed crimes.
48

Using ubiquitous communication technology to improve pediatric asthma management

Yun, Tae-Jung 20 June 2012 (has links)
Information and communication technologies (ICTs) for chronic care are increasingly being researched in Human-Computer Interaction. One of the current health management areas where ICTs have been employed is in supporting communications between patients and physicians. This is particularly relevant for patients suffering from chronic diseases since there is evidence that better communication leads to better health outcomes. Researchers are investigating different chronic diseases to design and test technology interventions to promote better chronic disease care. However, few have investigated pediatric asthma as a case study for designing communication technologies. The World Health Organization (WHO) estimated in 2008 that 300 million people suffer from asthma, and that asthma is the most common chronic illness among children. Asthma interferes with breathing by preventing airflow into the lungs. It is difficult to determine the actual cause of asthma and to predict who will have asthma. These unique challenges provide opportunities to investigate pediatric asthma management. To address these challenges, I have conducted a series of studies with pediatric asthma patients, families, and healthcare providers to better understand their needs, challenges and strategies regarding the use of technologies. I have conducted interviews, a focus group, and a technology probe study to create and refine initial technology designs for children with asthma and their caregivers. Based on the Health Belief Model (HBM), patient-provider communications, and my findings in the prior studies, I designed a mobile and web service to increase asthma knowledge and symptom/management awareness in the child for better health outcomes, and to affect the perceived quality of interaction with healthcare providers. I show the results of my two field deployment studies with total 65 patients to learn how the system affected their practices and health outcomes. My contributions come from an increased understanding in three areas: physician-patient communication via a mobile and web services; ubiquitous communication technology designs to improve current pediatric asthma practices; and controlled evaluation of a ubiquitous communication technology, SMS, in the field.
49

Evaluation of a domestic photo sharing environment

Sondhi, Gaurav January 2010 (has links)
Ubiquitous computing describes the aspirations of including information systems into the fabric of our daily lives. The emphasis of the user should be on what task needs to be achieved rather than how the system will do it. The interface of applications that are integrated into the home fabric needs to be delicate in the sense that it should give the feeling of being a part of the home rather than a piece of technology. The human computer interaction/interface needs to be cohesive with the environment people live in so as to maximise the interaction possibilities. Photographs are a very affective and efficient way of connecting people to each other. We should not forget the social role photographs have to play. The most important aspect of the picture is the story that it is trying to convey, the people in it, or the place it was taken. Emotions are a very private part of our personal life and how one displays it reflects one’s lifestyle. In recent years increasing efforts have been put into preserving emotions in photos particularly with the advent of digital cameras. Now photographs have become an important part of our lives and have significant social role as they provide an affective communication link between friends and families. This research will be looking at how people relate themselves to pictures and if we could capture their emotions and expressions to store them in a way that is representative of their feelings towards the picture. As emotions can be associated with pictures of family, friends, places, holidays, social gatherings or travel to mention some of the aspects, we will also be analysing as to how emotions change over a period of time and if it could be represented accordingly in association with digital photos. This will allow us to look into the factors, which can make digital photo sharing a more fun and enjoyable experience. This research will involve user based evaluations and a scenario based approach for modelling the photo sharing interface. The creation of photo sharing system, based on this approach, is then investigated using the method of prototyping. The research shows methods, architectures, and tools used to make the development process more efficient and help assess the viability of the system under conditions that simulate to everyday use of the photo sharing software. To generalise and communicate results, the project will seek to simulate the home environment in a laboratory setting, using prototypes based on current high-end computing devices. The .Net technologies used for rapid prototyping is introduced. The aim of this research is to provide a demonstration environment of a photo sharing software for the smart home, which will allow for Reception/Viewing/distribution of photos within the home environment. The data could incorporate Audio/Video/Text/Photos, and user input etc. The research will also help us understand various aspects of how people interact with Digital Photos, what they would like to do, how can storing photos be made simpler, annotation of pictures, how can sharing photo’s made simpler, and how we can design an application which would allow users to attach emotions to pictures. The photo sharing system will provide an effective means to receive and distribute emotional information based on personal and temporal relationships associated with photos. The research also analyses the role of human computer interaction when developing ubiquitous technologies for the smart homes where information is embedded in the environment people live in. The research will present an overview of how photo sharing systems can be developed and evaluated using prototypes and user evaluations.
50

Enabling programmable ubiquitous computing environments: the DAIS middleware

Kabadayi, Sanem 29 August 2008 (has links)
Not available / text

Page generated in 0.0355 seconds