• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 128
  • 69
  • 8
  • 5
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • Tagged with
  • 267
  • 267
  • 126
  • 74
  • 72
  • 57
  • 54
  • 45
  • 34
  • 33
  • 33
  • 33
  • 31
  • 29
  • 29
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

A Dynamic User-Centric Mobile Context Model

Chang, Yu-Ling January 2010 (has links)
Context-aware systems can dynamically adapt to user situations to provide smarter services. In general, context refers to the information that can be used to characterize these situations, and context models are deployed to specify contextual information described in context-aware systems. However, even though user context is highly dynamic, existing context models either focus on modeling static views of context or lack appropriate design abstractions to deal with dynamic aspects and interactions involving contextual elements such location, time, user roles, social relationships, and changing preferences. Moreover, virtual environments have not been modelled by most of the existing context models even though online interaction is very common and popular. This thesis presents a dynamic user-centric context model that can be used to model the aspects of context-aware systems that are subject to frequent change. Four case studies are proposed to illustrate the applicability of the approach taken by this thesis, and they are in the domains of mobile e-healthcare, mobile commerce, mobile tourism, and mobile augmented reality gaming. Benefits of the proposed model include avoiding the development of context-aware systems from scratch, enabling future use of model-driven approaches, and reducing implementation effort.
82

Determining when to interact: The Interaction Algorithm

Sykes, Edward 07 September 2012 (has links)
Current trends in society and technology make interruption a central human computer interaction problem. Many intelligent computer systems exist, but one that determines when best to interact with a user at appropriate times as s/he performs computer-based tasks does not. In this work, an Interaction Algorithm was designed, developed and evaluated that draws from a user model and real-time observations of the user’s actions as s/he works on computer-based tasks to determine ideal times to interact with the user. This research addresses the complex problem of determining the precise time to interrupt a user and how to best support him/her during and after the interruption task. Many sub-problems have been taken into account such as determining the task difficulty, the intent of the user as s/he is performing the task and how to incorporate personal user characteristics. This research is quite timely as the number of interruptions people experience on a daily basis has grown considerably over the last decade and this growth has not shown any signs of subsiding. Furthermore, with the exponential growth of mobile computing, interruptions are permeating the user experience. Thus, systems must be developed to manage interruptions by reasoning about ideal timings of interactions and determining appropriate notification formats. This research shed light on this problem as described below: 1. The algorithm developed uses a user model in its’ reasoning computations. Most of the research in this area has focused on task-based contextual information when designing systems that reason about interruptions. Researchers support additional work should be done in this area by including subjective preferences. 2. The algorithm’s performance is quite promising at 96% accuracy in several models created. 3. The algorithm was implemented using an advanced machine learning technology—an Adaptive Neural-Fuzzy Inference System—which is a novel contribution. 4. The algorithm developed does not rely on any user involvement. In other systems, users laboriously review video sessions after working with the system and record interruption annotations so that the system can learn. 5. This research shed light on reasoning about ideal interruption points for free-form tasks. Currently, this is an unsolved problem.
83

The fAARS Platform, For Augmented Alternate Reality Services and Games

Gutierrez, Lucio, Al Unknown Date
No description available.
84

Approaches for contextualization and large-scale testing of mobile applications

Wang, Jiechao 15 May 2013 (has links)
In this thesis, we focused on two problems in mobile application development: contextualization and large-scale testing. We identified the limitations of current contextualization and testing solutions. On one hand, advanced-remote-computing- based mobilization does not provide context awareness to the mobile applications it mobilized, so we presented contextify to provide context awareness to them without rewriting the applications or changing their source code. Evaluation results and user surveys showed that contextify-contextualized applications reduce users' time and effort to complete tasks. On the other hand, current mobile application testing solutions cannot conduct tests at the UI level and in a large-scale manner simultaneously, so we presented and implemented automated cloud computing (ACT) to achieve this goal. Evaluation results showed that ACT can support a large number of users and it is stable, cost-efficiency as well as time-efficiency.
85

Exploiting Context in Dealing with Programming Errors and Exceptions in the IDE

2014 September 1900 (has links)
Studies show that software developers spend about 19% of their development time in web surfing. While collecting necessary information using traditional web search, they face several practical challenges. First, it does not consider context (i.e., surroundings, circumstances) of the programming problems during search unless the developers do so in search query formulation, and forces the developers to frequently switch between their working environment (e.g., IDE) and the web browser. Second, technical details (e.g., stack trace) of an encountered exception often contain a lot of information, and they cannot be directly used as a search query given that the traditional search engines do not support long queries. Third, traditional search generally returns hundreds of search results, and the developers need to manually analyze the result pages one by one in order to extract a working solution. Both manual analysis of a page for content relevant to the encountered exception (and its context) and working an appropriate solution out are non-trivial tasks. Traditional code search engines share the same set of limitations of the web search ones, and they also do not help much in collecting the code examples that can be used for handling the encountered exceptions. In this thesis, we present a context-aware and IDE-based approach that helps one overcome those four challenges above. In our first study, we propose and evaluate a context-aware meta search engine for programming errors and exceptions. The meta search collects results for any encountered exception in the IDE from three popular search engines- Google, Bing and Yahoo and one programming Q & A site- StackOverflow, refines and ranks the results against the detailed context of the encountered exception, and then recommends them within the IDE. From this study, we not only explore the potential of the context-aware and meta search based approach but also realize the significance of appropriate search queries in searching for programming solutions. In the second study, we propose and evaluate an automated query recommendation approach that exploits the technical details of an encountered exception, and recommends a ranked list of search queries. We found the recommended queries quite promising and comparable to the queries suggested by experts. We also note that the support for the developers can be further complemented by post-search content analysis. In the third study, we propose and evaluate an IDE-based context-aware content recommendation approach that identifies and recommends sections of a web page that are relevant to the encountered exception in the IDE. The idea is to reduce the cognitive effort of the developers in searching for content of interest (i.e., relevance) in the page, and we found the approach quite effective through extensive experiments and a limited user study. In our fourth study, we propose and evaluate a context-aware code search engine that collects code examples from a number of code repositories of GitHub, and the examples contain high quality handlers for the exception of interest. We validate the performance of each of our proposed approaches against existing relevant literature and also through several mini user studies. Finally, in order to further validate the applicability of our approaches, we integrate them into an Eclipse plug in prototype--ExcClipse. We then conduct a task-oriented user study with six participants, and report the findings which are significantly promising.
86

Embodied context models and an approach to re-using context-aware middleware

Dahlem, David C.P. 15 April 2008 (has links)
This thesis develops a generalized approach for decoupling how a context model is defined and executed from how context-aware data is acquired and managed within a given middleware system. Decoupling the model specification from the data will likely provide more avenues of context-aware investigations due to an increased flexibility in the choice of a middleware system for handling context data. We provide a detailed description of the approach developed for this decoupling task, called Inspect, Adapt, Model, and Integrate (IAMI). By engaging the steps we show that a context model need not be specifically tied to a given context-aware middleware. This successful decoupling will likely add to the future development of context-aware systems by allowing researchers to build upon existing frameworks as opposed to repeatedly engaging in ground-up development. Moreover, we submit that this decoupling is important in that the number of possible ways of representing and expressing a context model is potentially infinite, but the choice of context-aware middleware systems is limited.
87

Intrusion Alert Analysis Framework Using Semantic Correlation

Ahmed, Sherif Saad 29 October 2014 (has links)
In the last several years the number of computer network attacks has increased rapidly, while at the same time the attacks have become more and more complex and sophisticated. Intrusion detection systems (IDSs) have become essential security appliances for detecting and reporting these complex and sophisticated attacks. Security officers and analysts need to analyze intrusion alerts in order to extract the underlying attack scenarios and attack intelligence. These allow taking appropriate responses and designing adequate defensive or prevention strategies. Intrusion analysis is a resource intensive, complex and expensive process for any organization. The current generation of IDSs generate low level intrusion alerts that describe individual attack events. In addition, existing IDSs tend to generate massive amount of alerts with high rate of redundancies and false positives. Typical IDS sensors report attacks independently and are not designed to recognize attack plans or discover multistage attack scenarios. Moreover, not all the attacks executed against the target network will be detected by the IDS. False negatives, which correspond to the attacks missed by the IDS, will either make the reconstruction of the attack scenario impossible or lead to an incomplete attack scenario. Because of the above mentioned reasons, intrusion analysis is a challenging task that mainly relies on the analyst experience and requires manual investigation. In this dissertation, we address the above mentioned challenges by proposing a new framework that allows automatic intrusion analysis and attack intelligence extraction by analyzing the alerts and attacks semantics using both machine learning and knowledge-representation approaches. Particularly, we use ontological engineering, semantic correlation, and clustering methods to design a new automated intrusion analysis framework. The proposed alert analysis approach addresses many of the gaps observed in the existing intrusion analysis techniques, and introduces when needed new metrics to measure the quality of the alerts analysis process. We evaluated experimentally our framework using different benchmark intrusion detection datasets, yielding excellent performance results. / Graduate
88

The Museum Explorer: User Experience Enhancement In A Museum

2014 December 1900 (has links)
A learner in an informal learning environment, such as a museum, encounters various challenges. After initial assessment, a set of methods were proposed that may enhance a learner’s experience in a museum using computer aided technologies. The most important insight was the need to support the museum visitor in three phases of activity: prior to the visit, during the visit, and after the visit. We hypothesized that software tools that could help connect these three phases would be helpful and valuable supports for the visitor. To test and evaluate our hypothesis, a system called “The Museum Explorer” was built and instantiated using the collection in the Museum of Antiquities located at the University of Saskatchewan. An evaluation of the Museum Explorer was conducted. Results show that the Museum Explorer was largely successful in achieving our goals. The Museum Explorer is an integrated solution for visitors in museums across the pre-visit, visit, and post-visit phases. The Museum Explorer was designed to provide a means to connect and transfer user experience across the major phases of a museum visit. For each phase of a visitor’s experience, a set of tools was built that provides intelligent and interactive communication features. To assist visitors selecting artefacts to visit, a recommender system allows users to select a set of constraints. To better manage interactivity, features and functions were offered based on context. A study was conducted with volunteer museum visitors. Results from the study show that the Museum Explorer is a useful support. Analysis of the usage data captured by the Museum Explorer has revealed some interesting facts about users’ preferences in the domain that can be used by future researchers.
89

Visual place categorization

Wu, Jianxin 06 July 2009 (has links)
Knowing the semantic category of a robot's current position not only facilitates the robot's navigation, but also greatly improves its ability to serve human needs and to interpret the scene. Visual Place Categorization (VPC) is addressed in this dissertation, which refers to the problem of predicting the semantic category of a place using visual information collected from an autonomous robot platform. Census Transform (CT) histogram and Histogram Intersection Kernel (HIK) based visual codebooks are proposed to represent an image. CT histogram encodes the stable spatial structure of an image that reflects the functionality of a location. It is suitable for categorizing places and has shown better performance than commonly used descriptors such as SIFT or Gist in the VPC task. HIK has been shown to work better than the Euclidean distance in classifying histograms. We extend it in an unsupervised manner to generate visual codebooks for the CT histogram descriptor. HIK codebooks help CT histogram to deal with the huge variations in VPC and improve system accuracy. A computational method is also proposed to generate HIK codebooks in an efficient way. The first significant VPC dataset in home environments is collected and is made publicly available, which is also used to evaluate the VPC system based on the proposed techniques. The VPC system achieves promising results for this challenging problem, especially for important categories such as bedroom, bathroom, and kitchen. The proposed techniques achieved higher accuracies than competing descriptors and visual codebook generation methods.
90

Secure, privacy assured mechanisms for heterogeneous contextual environments

Vasanta, Harikrishna January 2006 (has links)
Location information is used to provide a diverse range of services to users such as emergency, navigation, billing, security, information and advertising services. This information is derived from a broad range of indoor and outdoor technologies. The location information thus derived is of different granularity, different co-ordination system and is controlled by numerous service providers. In addition to this, broad selections of devices are used for providing these services. Having a diverse range of applications requiring location information at different levels of granularity, the need to export location information across multiple devices and the existence of different location determination technologies necessitates the need for heterogeneous location network. These networks derive location information from multiple sources and provides various location-based services to users irrespective of the medium, device or technology used. Security, user privacy and management of location information are some of the important issues that need to be addressed. The main contribution of this thesis is the design of a secure and privacy assured heterogeneous location architecture. A formal methodology was chosen to design the heterogeneous location architecture. The design of the architecture resulted in a novel key distribution protocol and a model for information flow that can be easily encapsulated into applications or architectures having similar requirements. The research also resulted in the enhancement of a proposed location framework for securing critical infrastructures using context-aware self-defending objects. The proposed enhanced framework helps to negate the security vulnerabilities introduced through the use of general-purpose computer systems in critical infrastructures.

Page generated in 0.0471 seconds