• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 283
  • 183
  • 43
  • 40
  • 17
  • 13
  • 7
  • 6
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • Tagged with
  • 674
  • 572
  • 199
  • 139
  • 127
  • 124
  • 118
  • 91
  • 88
  • 88
  • 82
  • 79
  • 79
  • 73
  • 71
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
241

Improving Understanding and Trust with Intelligibility in Context-Aware Applications

Lim, Brian Y. 01 May 2012 (has links)
To facilitate everyday activities, context-aware applications use sensors to detect what is happening and use increasingly complex mechanisms (e.g., by using big rule-sets or machine learning) to infer the user's context and intent. For example, a mobile application can recognize that the user is in a conversation and suppress any incoming calls. When the application works well, this implicit sensing and complex inference remain invisible. However, when it behaves inappropriately or unexpectedly, users may not understand its behavior. This can lead users to mistrust, misuse, or even abandon it. To counter this lack of understanding and loss of trust, context-aware applications should be intelligible, capable of explaining their behavior. We investigate providing intelligibility in context-aware applications and evaluate its usefulness to improve user understanding and trust in context-aware applications. Specifically, this thesis supports intelligibility in context-aware applications through the provision of explanations that answer different question types, such as: Why did it do X? Why did it not do Y? What if I did W, What will it do? How can I get the application to do Y? This thesis takes a three-pronged approach to investigating intelligibility by (i) eliciting the user requirements for intelligibility, to identify what explanation types end-users are interested in asking context-aware applications, (ii) supporting the development of intelligible context-aware applications with a software toolkit and the design of these applications with design and usability recommendations, and (iii) evaluating the impact of intelligibility on user understanding and trust under various situations and application reliability, and measuring how users use an interactive intelligible prototype. We show that users are willing to use well-designed intelligibility features, and this can improve user understanding and trust in the adaptive behavior of context-aware applications.
242

Embodied context models and an approach to re-using context-aware middleware

Dahlem, David C.P. 15 April 2008 (has links)
This thesis develops a generalized approach for decoupling how a context model is defined and executed from how context-aware data is acquired and managed within a given middleware system. Decoupling the model specification from the data will likely provide more avenues of context-aware investigations due to an increased flexibility in the choice of a middleware system for handling context data. We provide a detailed description of the approach developed for this decoupling task, called Inspect, Adapt, Model, and Integrate (IAMI). By engaging the steps we show that a context model need not be specifically tied to a given context-aware middleware. This successful decoupling will likely add to the future development of context-aware systems by allowing researchers to build upon existing frameworks as opposed to repeatedly engaging in ground-up development. Moreover, we submit that this decoupling is important in that the number of possible ways of representing and expressing a context model is potentially infinite, but the choice of context-aware middleware systems is limited.
243

Exploring the potential of mobile technology and NFC for creating music collaboratively

Real Delgado, Yeray January 2015 (has links)
Nowadays, mobile devices offer a wide variety of features and sensor capabilitiesthat can be applied into everyday problems. This is being used by the commu-nity in order to provide more intuitive tools that facilitate users to tackle theseproblems. In this thesis, I present my work which aims at providing an afford-able, non-intrusive, easy to use and intuitive tool that enables users withoutany musical background to create music collaboratively and enjoy this activityby using NFC enabled mobile devices and NFC tags. I introduce the "Rela-tive Position Awareness" which is utilized to allow users to create a music piecebased on the relative position of the devices. To do that, I implement a proto-type that includes Near Field Communication (NFC) and study whether NFCis a suitable technology for supporting the positioning awareness system. Inaddition, I also study the interactions that occur while users are collaborativelycreating music pieces. I run several user studies that indicate my prototype issuitable for supporting music creation collaborative activities, that NFC pro-vides a high level of accuracy when it comes to support the relative positioningsystem and that the prototype fosters social interaction among the users. Partof the results from this research effort have been presented in Fifth Workshopon Ubiquitous Music (V UbiMus) and can be found in Exploring the potentialof mobile technology for creating music collaboratively [1]
244

Ubiquitous Semantic Applications

Ermilov, Timofey 14 January 2015 (has links) (PDF)
As Semantic Web technology evolves many open areas emerge, which attract more research focus. In addition to quickly expanding Linked Open Data (LOD) cloud, various embeddable metadata formats (e.g. RDFa, microdata) are becoming more common. Corporations are already using existing Web of Data to create new technologies that were not possible before. Watson by IBM an artificial intelligence computer system capable of answering questions posed in natural language can be a great example. On the other hand, ubiquitous devices that have a large number of sensors and integrated devices are becoming increasingly powerful and fully featured computing platforms in our pockets and homes. For many people smartphones and tablet computers have already replaced traditional computers as their window to the Internet and to the Web. Hence, the management and presentation of information that is useful to a user is a main requirement for today’s smartphones. And it is becoming extremely important to provide access to the emerging Web of Data from the ubiquitous devices. In this thesis we investigate how ubiquitous devices can interact with the Semantic Web. We discovered that there are five different approaches for bringing the Semantic Web to ubiquitous devices. We have outlined and discussed in detail existing challenges in implementing this approaches in section 1.2. We have described a conceptual framework for ubiquitous semantic applications in chapter 4. We distinguish three client approaches for accessing semantic data using ubiquitous devices depending on how much of the semantic data processing is performed on the device itself (thin, hybrid and fat clients). These are discussed in chapter 5 along with the solution to every related challenge. Two provider approaches (fat and hybrid) can be distinguished for exposing data from ubiquitous devices on the Semantic Web. These are discussed in chapter 6 along with the solution to every related challenge. We conclude our work with a discussion on each of the contributions of the thesis and propose future work for each of the discussed approach in chapter 7.
245

人が放置する物体の動的認識

渡辺, 崇, WATANABE, Takashi, 前田, 優樹, MAEDA, Yuki 08 1900 (has links)
No description available.
246

Seamless mobility in ubiquitous computing environments

Song, Xiang 09 July 2008 (has links)
Nominally, one can expect any user of modern technology to at least carry a handheld device of the class of an iPAQ (perhaps in the form of a cellphone). The availability of technology in the environment (home, office, public spaces) also continues to grow at an amazing pace. With advances in technology, it is feasible to remain connected and enjoy services that we care about, be it entertainment, sports, or plain work, anytime anywhere. We need a system that supports seamless migration of services from handhelds to the environment (or vice versa) and between environments. Virtualization technology is able to support such a migration by providing a common virtualized interface on both source and destination. In this dissertation, we focus on two levels of virtualization to address issues for seamless mobility. We first identify three different kinds of spaces and three axes to support mobility in these spaces. Then we present two systems that address these dimensions from different perspectives. For middleware level virtualization, we built a system called MobiGo that can capture the application states and restore the service execution with saved states at the destination platform. It provides the architectural elements for efficiently managing different states in the different spaces. Evaluation suggested that the overhead of the system is relatively small and meets user's expectation. On the other hand, for device level virtualization, Chameleon is a Xen-like system level virtualization system to support device level migration and automatic capability adaptation at a lower level. Chameleon is able to capture and restore device states and automatically accommodate the heterogeneity of devices to provide the migration of services. Device level virtualization can address some issues that cannot be addressed in middleware level virtualization. It also has less requirements than middleware level virtualization in order to be applied to existing systems. Through performance measurements, we demonstrate that Chameleon introduces minimal overhead while providing capability adaptation and device state migration for seamless mobility in ubiquitous computing environments.
247

Creating & Enabling the Useful Service Discovery Experience : The Perfect Recommendation Does Not Exist / Att skapa och möjliggöra en användbar upplevelse för att upptäcka erbjudna servicar och enheter : Den perfekta rekommendationen finns inte

Ingmarsson, Magnus January 2013 (has links)
We are rapidly entering a world with an immense amount of services and devices available to humans and machines. This is a promising future, however there are at least two major challenges for using these services and devices: (1) they have to be found and (2) after being found, they have to be selected amongst. A significant difficulty lies in not only finding most available services, but presenting the most useful ones. In most cases, there may be too many found services and devices to select from. Service discovery needs to become more aimed towards humans and less towards machines. The service discovery challenge is especially prevalent in ubiquitous computing. In particular, service and device flux, human overloading, and service relevance are crucial. This thesis addresses the quality of use of services and devices, by introducing a sophisticated discovery model through the use of new layers in service discovery. This model allows use of services and devices when current automated service discovery and selection would be impractical by providing service suggestions based on user activities, domain knowledge, and world knowledge. To explore what happens when such a system is in place, a wizard of oz study was conducted in a command and control setting. To address service discovery in ubiquitous computing new layers and a test platform were developed together with a method for developing and evaluating service discovery systems. The first layer, which we call the Enhanced Traditional Layer (ETL), was studied by developing the ODEN system and including the ETL within it. ODEN extends the traditional, technical service discovery layer by introducing ontology-based semantics and reasoning engines. The second layer, the Relevant Service Discovery Layer, was explored by incorporating it into the MAGUBI system. MAGUBI addresses the human aspects in the challenge of relevant service discovery by employing common-sense models of user activities, domain knowledge, and world knowledge in combination with rule engines.  The RESPONSORIA system provides a web-based evaluation platform with a desktop look and feel. This system explores service discovery in a service-oriented architecture setting. RESPONSORIA addresses a command and control scenario for rescue services where multiple actors and organizations work together at a municipal level. RESPONSORIA was the basis for the wizard of oz evaluation employing rescue services professionals. The result highlighted the importance of service naming and presentation to the user. Furthermore, there is disagreement among users regarding the optimal service recommendation, but the results indicated that good recommendations are valuable and the system can be seen as a partner. / Vi rör oss snabbt in i en värld med en enorm mängd tjänster och enheter som finns tillgängliga för människor och maskiner. Detta är en lovande framtid, men det finns åtminstone två stora utmaningar för att använda dessa tjänster och enheter: (1) de måste hittas och (2) rätt tjänst/enhet måste väljas. En betydande svårighet ligger i att, inte bara finna de mest lättillgängliga tjänsterna och enheterna, men också att presentera de mest användbara sådana. I de flesta fall kan det vara för många tjänster och enheter som hittas för att kunna välja mellan. Upptäckten av tjänster och enheter behöver bli mer anpassad till människor och mindre till maskiner. Denna utmaning är särskilt framträdande i desktopmetaforens efterföljare Ubiquitous Computing. (Det vill säga en form av interaktion med datorer som blivit integrerad i aktiviteter och objekt i omgivningen.) Framförallt tjänster och enheters uppdykande och försvinnande, mänsklig överbelastning och tjänstens relevans är avgörande utmaningar. Denna avhandling behandlar kvaliteten på användningen av tjänster och enheter, genom att införa en sofistikerad upptäcktsmodell med hjälp av nya lager i tjänsteupptäcktsprocessen. Denna modell tillåter användning av tjänster och enheter när nuvarande upptäcktsprocess och urval av dessa skulle vara opraktiskt, genom att ge förslag baserat på användarnas aktiviteter, domänkunskap och omvärldskunskap. För att utforska vad som händer när ett sådant system är på plats, gjordes ett så kallat Wizard of Oz experiment i ledningscentralen på en brandstation. (Ett Wizard Of Oz experiment är ett experiment där användaren tror att de interagerar med en dator, men i själva verket är det en människa som agerar dator.) För att hantera tjänste- och enhetsupptäckt i Ubiquitous Computing utvecklades nya lager och en testplattform tillsammans med en metod för att utveckla och utvärdera system för tjänste- och enhetsupptäckt. Det första lagret, som vi kallar Förbättrat Traditionellt Lager (FTL), studerades genom att utveckla ODEN och inkludera FTL i den. ODEN utökar det traditionella, datororienterade tjänste- och enhetsupptäcktslagret genom att införa en ontologibaserad semantik och en logisk regelmotor. Det andra skiktet, som vi kallar Relevant Tjänst Lager, undersöktes genom att införliva det i systemet MAGUBI. MAGUBI tar sig an de mänskliga aspekterna i den utmaning som vi benämner relevant tjänste- och enhetsupptäckt, genom att använda modeller av användarnas aktiviteter, domänkunskap och kunskap om världen i kombination med regelmotorer. RESPONSORIA är en webbaserad plattform med desktoputseende och desktopkänsla, och är ett system för utvärdering av ovanstående utmaning tillsammans med de tidigare systemen. Detta system utforskar tjänste- och enhetsupptäckt i ett tjänsteorienterat scenario. RESPONSORIA tar ett ledningsscenario för räddningstjänst där flera aktörer och organisationer arbetar tillsammans på en kommunal nivå. RESPONSORIA låg till grund för ett Wizard of Oz experiment där experimentdeltagarna var professionella räddningsledare. Resultatet underströk vikten av namngivning av tjänster och enheter samt hur dessa presenteras för användaren. Dessutom finns det oenighet bland användare om vad som är den optimala service-/enhets-rekommendationen, men resultaten visar att goda rekommendationer är värdefulla och systemet kan ses som en partner.
248

Secure, privacy assured mechanisms for heterogeneous contextual environments

Vasanta, Harikrishna January 2006 (has links)
Location information is used to provide a diverse range of services to users such as emergency, navigation, billing, security, information and advertising services. This information is derived from a broad range of indoor and outdoor technologies. The location information thus derived is of different granularity, different co-ordination system and is controlled by numerous service providers. In addition to this, broad selections of devices are used for providing these services. Having a diverse range of applications requiring location information at different levels of granularity, the need to export location information across multiple devices and the existence of different location determination technologies necessitates the need for heterogeneous location network. These networks derive location information from multiple sources and provides various location-based services to users irrespective of the medium, device or technology used. Security, user privacy and management of location information are some of the important issues that need to be addressed. The main contribution of this thesis is the design of a secure and privacy assured heterogeneous location architecture. A formal methodology was chosen to design the heterogeneous location architecture. The design of the architecture resulted in a novel key distribution protocol and a model for information flow that can be easily encapsulated into applications or architectures having similar requirements. The research also resulted in the enhancement of a proposed location framework for securing critical infrastructures using context-aware self-defending objects. The proposed enhanced framework helps to negate the security vulnerabilities introduced through the use of general-purpose computer systems in critical infrastructures.
249

Engineering Trusted Location Services and Context-aware Augmentations for Network Authorization Models

Wullems, Christian John January 2005 (has links)
Context-aware computing has been a rapidly growing research area, however its uses have been predominantly targeted at pervasive applications for smart spaces such as smart homes and workplaces. This research has investigated the use of location and other context data in access control policy, with the purpose of augmenting existing IP and application-layer security to provide fine-grained access control and effective enforcement of security policy. The use of location and other context data for security purposes requires that the technologies and methods used for acquiring the context data are trusted. This thesis begins with the description of a framework for the analysis of location systems for use in security services and critical infrastructure. This analysis classifies cooperative locations systems by their modes of operation and the common primitives they are composed of. Common location systems are analyzed for inherent security flaws and limitations based on the vulnerability assessment of location system primitives and the taxonomy of known attacks. An efficient scheme for supporting trusted differential GPS corrections is proposed, such that DGPS vulnerabilities that have been identified are mitigated. The proposal augments the existing broadcast messaging protocol with a number of new messages facilitating origin authentication and integrity of broadcast corrections for marine vessels. A proposal for a trusted location system based on GSM is presented, in which a model for tamper resistant location determination using GSM signaling is designed. A protocol for association of a user to a cell phone is proposed and demonstrated in a framework for both Web and Wireless Application Protocol (WAP) applications. After introducing the security issues of existing location systems and a trusted location system proposal, the focus of the thesis changes to the use of location data in authorization and access control processes. This is considered at both the IP-layer and the application-layer. For IP-layer security, a proposal for location proximity-based network packet filtering in IEEE 802.11 Wireless LANs is presented. This proposal details an architecture that extends the Linux netfilter system to support proximity-based packet filtering, using methods of transparent location determination through the application of a pathloss model to raw signal measurements. Our investigation of application-layer security resulted in the establishment of a set of requirements for the use of contextual information in application level authorization. Existing network authentication protocols and access control mechanisms are analyzed for their ability to fulfill these requirements and their suitability in facilitating context-aware authorization. The result is the design and development of a new context-aware authorization architecture, using the proposed modifications to Role-based Access Control (RBAC). One of the distinguishing characteristics of the proposed architecture is its ability to handle authorization with context-transparency, and provide support for real-time granting and revocation of permissions. During the investigation of the context-aware authorization architecture, other security contexts in addition to host location were found to be useful in application level authorization. These included network topology between the host and application server, the security of the host and the host execution environment. Details of the prototype implementation, performance results, and context acquisition services are presented.
250

A participatory design approach in the engineering of ubiquitous computing systems

Timothy Cederman-Haysom Unknown Date (has links)
Ubiquitous computing aims to make human-computer interaction as naturalistic and functionally invisible as possible through embedding computing potential within a particular context to support human activity. However, much of ubiquitous computing research is focussed on technical innovation due to the challenges involved with deploying embedded computing, thereby reducing the commitment to the philosophical ideals of ubiquitous computing in research. This dissertation describes the investigation of a participatory approach to technically-complex research in order to understand how our view of the engineering and human challenges changes when the two are approached hand-in-hand. The domain chosen for this system was a dental surgery. Dentistry involves a complex workspace with computer interaction constrained by surgery hygiene. Ubiquitous computing offers a compelling interaction alternative to the keyboard and mouse paradigm in such an environment. A multi-method approach that employed ethnographic research and design prototyping was undertaken with dentists from several different private practices. A series of field studies used ethnographic methods such as observation and interview. Design events explored prototypes with activities such as design games, contextual interviews, role-playing and contextual prototyping. Activities were devised with the aim of providing a level playing field, whereby both designers and participants feel they can contribute equally, with their respective disciplinary knowledge. It was found that methods needed to be carefully chosen, devised and managed, in order to communicate complex concepts with participants and to constrain the design to technically feasible options. The thesis examines the design problem from the perspectives of a variety of different stakeholders within a participatory design framework, reflected upon by means of human-centred action research. Data was gathered through design speculations and observation, and explored using methods such as the Video Card Game and Video Interaction Analysis. Fieldwork was analysed using a multi-stage qualitative analysis process which informed further design collaboration with participants. The analysis of data gathered during design studies with dentists also contributed to the development of a prototype system to validate methodological contributions. The resulting prototype utilised off-the-shelf hardware and software which allowed for innovative customisation and development. In-situ prototyping (defined by the author as “participatory bootstrapping”) and a comprehensive knowledge of the domain afforded the creative application of technology. In addition to contributing to the prototype design, the interpretive understandings drawn from analysis identified how technical ideas were presented and utilised by participants of the studies, and how best to engage busy professionals. The final outcomes of the research were a multimodal ubiquitous computing system for interacting within a dental surgery; the development and implementation of a variety of methods aimed at communicating technical concepts and eliciting user motivations, practices and concerns; and a set of design principles for engineers engaging in design of systems for human use. The research presented within this thesis is primarily part of the field of human-computer interaction, but provides evidence of how engineering development can be influenced by a user-centred participatory approach. The benefits that derive from inclusive methods of design are demonstrated by the evaluation of a prototype that employed such methods. The contribution of this thesis is to demonstrate and delineate methods for developing ubiquitous computing technologies for the context of human use. This led to a set of design principles for the engineering of systems for human use: 1. Technology needs to be robust and simple to appropriate. This allows users to give insights on technology developments and also to allow users to discover for themselves how they would use the technology. 2. An evolving and carefully considered set of methods are needed to elicit communication between practitioners and across disciplines. The gaps in understandings and the different representations that arise across the disciplines provide essential clues to next steps in design. These gaps and differences form tensions that can be exploited productively. 3. Context is important for determining which design steps to take. Rather than abstracting a problem in order to solve it, as is usual in engineering design, the problem should remain grounded in the context of use. It reveals what the real problems are that need to be solved rather than the imagined ones. This requires an appreciation of the situated nature of action and of the variability of work. In turn it also requires an appreciation of what the human can and does do and what the machine should support. 4. Accountability in design is required. There is a fundamental tension between trying to make something work and seeing what really does work; specifically it is necessary to understand when automation is worth it in human machine systems. While engaged in the design process, engineers should ask how much technology should reconfigure human practices because of a useful outcome, rather than attempting to automate and converge devices for its own sake. A clear understanding of the constraints and workings of the work space needs to be balanced with the understandings of the limitations of the technology in order to design a system that improves work practice and empowers the practitioner.

Page generated in 0.0642 seconds