• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 129
  • 109
  • 22
  • 10
  • 10
  • 8
  • 8
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 341
  • 178
  • 82
  • 68
  • 61
  • 60
  • 59
  • 56
  • 50
  • 49
  • 42
  • 39
  • 37
  • 36
  • 35
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Human to computer trust in urban pervasive computing

Bevan, Christopher January 2011 (has links)
How people come to trust computing technology is an important factor in the degree to which they come to accept the services that such technologies are able to provide. This is particularly important where the usage of a technology might risk compromising a person’s private information, making them vulnerable to technologically mediated attack. Research into interpersonal trust development between people has allowed designers of systems deployed using technologies such as the World Wide Web to successfully modulate a number of human interpersonal trust cues into the computer-mediated communication domain. Pervasive computing however, describes a significant shift in the ways in which people will come to encounter and use interactive technologies. No longer limited to the confines of the desktop, people can and will be able to perform many of the technological activities they would otherwise do at home in any place and at any time. However, while the services that a pervasive computing infrastructure will be able to provide may be similar to those that people are used to in the traditional world of the ‘desktop metaphor’, the novel characteristics of pervasive computing mean that many of the trust cues that were previously available to technology users may no longer offer an effective means of helping users to place their trust well. In this thesis, a mixed methods research plan, involving both laboratory-based and field-based experimental design, was developed to investigate the role of human-computer trust in respect of two novel characteristics of pervasive computing: service discovery and secure ad-hoc device association. Through leveraging various artefacts in the immediate physical world to support information presented by services in the digital world, this thesis posits that the provision of user-verifiable links between the physical and digital worlds might provide a means of increasing user trust in services whose source they can otherwise not perceive nor verify.
12

Position autistique, position psychotique : pour une perspective psychopatologique des troubles envahissants du développement de l'enfant / Autistic position, psychotic position : a psychopathological view of pervasive developmental deasorders in childhood

Medjkane, François 17 April 2018 (has links)
A partir d’une expérience clinique pédopsychiatrique réalisée dans le dispositif d’un secteur de psychiatrie infanto juvénile, ce travail tend à expliciter les particularités de fonctionnements psychopathologiques d’enfants présentant un diagnostic de Trouble Envahissant du Développement (TED) tel que décrit dans la Classification Internationale des Maladies de l’Organisation Mondiale de la Santé dans sa 10éme version (CIM10).La réalisation d’une revue de la littérature inscrite dans une perspective historicisante et compréhensive de la construction de l’ensemble nosographique des TED nous a permis de générer l’hypothèse que la position autistique serait corrélée de manière privilégiée aux catégories diagnostiques dénommées TED Autistique et recouvrant les catégories diagnostiques F84.0 d’autisme infantile et F84.5 de syndrome d’Asperger de la CIM 10 et que la position psychotique est corrélée de manière privilégiée aux catégories diagnostiques dénommées TED Non Autistique et recouvrant les catégories diagnostiques F84.1 Autisme atypique et F84.8 Autres TED de la CIM 10.Dans le cadre de ce travail, nous avons pu réaliser une étude rétrospective d’une population clinique d’enfants à partir de données recueillies dans le cadre des évaluations pluridisciplinaires portées par le Centre Ressource Autisme du Nord Pas de Calais.Au vu des éléments analysés dans le cadre de cette recherche, un élément de différenciation possible entre les deux groupes de sujets s’organise autour des capacités de repérage et de la prise en compte des aspects affectifs et émotionnels dans le rapport au Monde. Ce travail, portant sur l’étude de particularités de fonctionnement psychopathologique des enfants présentant un TED, s’inscrit dans le l’objectif de pouvoir contribuer à l’élaboration d’un projet thérapeutique, pédagogique et d’accompagnement personnalisé et le plus ajusté aux besoins mis en évidence. / From clinical experience of psychiatry practice in a French department for mental health, this work is focused on defining psychopathological specificities which are encountered in children with Pervasive Developmental Disorders (PDD) from described in ICD 10.A literature review from a historical and comprehensive perspective has allowed us to generate a research hypothesis. The autistic position would be correlated with autistic PDD and the psychotic position would be correlated with non-autistic PDD.For this project, we implemented a retrospective study based on a clinical population of children who have been evaluated with standard multidisciplinary assessments, done in the Nord-Pas de Calais’s Centre Resource Autisme.Through different observations, we could support the hypothesis that there is a difference between autistic PDD children and non-autistic PDD children in their affective and emotional relationship with the World.Thanks to this description of psychopathological particularities, this study takes us a step closer to offering each child with PDD the best individual support possible.
13

Pervasive GameFlow : Identifying and Exploring the Mechanisms of Player Enjoyment in Pervasive Games

Jegers, Kalle January 2009 (has links)
Pervasive games are computer games that build, to various extents, on social interaction as a driving force in the game play, on integration between physical and virtual worlds and on constant access to constantly ongoing games from virtually every existing context (anytime, anywhere gaming). This new genre of computer games presents many challenges for both researchers and industry; one of the most important is how to understand enjoyable player experiences in this new kind of computer gaming. The purpose of this thesis is to identify and explore the mechanisms in pervasive game designs that are of most importance for creating enjoyable Pervasive gaming experiences, and further to translate the findings of the exploration into a playability model for pervasive games. My empirical work focuses on the most important aspects for creating enjoyable player experiences when playing pervasive games. Evaluation methods from the usability and playability area have been deployed in order to identify what factors and aspects the players consider of most importance for their experience when they play pervasive games. Three specific pervasive games have been studied; SupaFly, Pervasive Treasure Hunt and Furiae. Theoretically, the thesis departs from existing knowledge about Playability, and the most prominent and accepted frameworks for understanding player experiences in computer gaming have been considered. Of the existing models and frameworks, the GameFlow model was selected as a theoretical point of departure. The main contribution of the thesis consists of a model for understanding player enjoyment in pervasive games - the Pervasive GameFlow model. Pervasive GameFlow elaborates the GameFlow model by adding 14 new criteria identified in the empirical evaluations of three pervasive games, criteria of great importance for enjoyable Player experiences in pervasive games. Further, the thesis answers questions concerning how the players are putting the anytime, anywhere and mobility aspects of pervasive games into practice - how they perceive and handle games that offer constantly ongoing game play. The results also provide insights into the reach or impact of the novel Pervasive aspects of pervasive games and their importance for the players and player experiences. Finally, the thesis provides notes on how evaluation of pervasive games should be performed.
14

The Weakly Identifying System for Doorway Monitoring

Jenkins, Christopher James 10 May 2007 (has links)
The System Architecture for Tracking Individuals (SAFTI) is an indoor person location tracking system designed for use in the field of pervasive computing. SAFTI provides location tracking in environments where cameras are too privacy invasive, where tracking devices are too costly, insecure or inconvenient, and where usability is a high priority. While many location tracking systems satisfy each of these constraints individually, SAFTI satisfies all three constraints simultaneously. Upon entering and exiting SAFTI buildings, users submit identification credentials. Once inside the building, using SAFTI is effortless - simply passing through doorways is sufficient for supplying SAFTI with the information it needs to perform location tracking. An integral part of SAFTI is the Weakly Identifying System for Doorway Monitoring (WISDOM). These instrumented doorways contain a variety of infrared, ultrasonic and pressure sensors that detect the direction of passage and measure each user's body size and shape. We quantify the measurement and identification accuracy of WISDOM by analyzing data collected from a user study containing 530 passes through a WISDOM prototype from 10 different subjects. We combine the results from WISDOM with large publicly available anthropometric databases to evaluate how accurately SAFTI performs location tracking with respect to building size, density of occupants, and matching algorithm used. / Dissertation
15

Sleep-wake characteristics of children with pervasive developmental disorders (PDD) : a survey study

Chiang, Chia-Jung 18 February 2013 (has links)
A higher prevalence of sleep problems and a few specific sleep-wake characteristics have been preliminarily found to be associated with pervasive developmental disorders (PDD). However, there is limited research that has examined multiple variables associated with sleep-wake characteristics and problems of children with PDD. This dissertation study assessed and examined the sleep-wake characteristics, sleep problems, and daytime problem behaviors of children with PDD aged three to fifteen years, and their caregivers’ sleep as well as contextual variables using data from the primary caregivers’ reports and recordings. This study confirmed several findings in the literature related to sleep-wake characteristics and sleep problems in children with both PDD and sleep problems. Although the relationship between sleep and daytime problem behaviors of the children was not found to be statistically correlated, the descriptive data indicated that some conditions such as illness or anxiety of the children negatively impacted their sleep and behaviors. In addition, the children participants with PDD and sleep problems tended to watch TV or to use computer/play video games before bedtime, in comparison to those with PDD but without sleep problems in this study. Moreover, a significant correlation between sleep of the caregivers and of their children was found in the group of children with PDD and sleep problems, but not in the other group of children with PDD but without sleep problems. Lastly, the results of this study showed that the children with diagnoses of PDD were 3.84 times more likely to have sleep problems than those with diagnoses of Asperger’s Disorder (AD) or PDD not otherwise specified (PDD-NOS). These findings are discussed in light of the similarities and differences between the current study and previous literature, and with respect to the implications for practice and research in the field of PDD and sleep. / text
16

MobiShare : mobile computing with no strings attached

Castillo, Jason Moses 15 April 2014 (has links)
In today’s world, technology is growing at a fast rate compared at other times. Sales have increased in the smart phone market, which has created new opportunities in pervasive computing. In pervasive computing, nodes enter and leave a network at any time. Within the network, nodes can transfer data to other nodes. The information is not retained in any static location such as a server. The mobile infrastructure requires a way to handle all the information in a dynamic way. The use of a centralized server in a mobile environment creates deterioration in the performance of obtaining information. The main goal of this paper is to provide data persistence using a “substrate” that is inherently not persistent. The data will be stored within the network for availability to all users. Saving data within a network would provide a means to obtain any type of information without relying on the source of where the data came from in the network. Users would also be able to continue downloading where they left off when they return to the network. Consider an environment where people can share music or books. For example, say that John Doe was searching for a particular song to download and in the network Jane has the song that was requested. John decides to download the song without knowing that it is from Jane. Then John decides to leave the network and the download stops. Whenever John rejoins the network the download of his song will continue where he left off, and his ability to access the information will not depend whether or not Jane is present in the network. John may retrieve the file from any other user who has the exact same file. The requested information that the user queries in a search engine will be stored as a metadata within the network, either by other nodes or a temporary server. This allows data to be obtained without relying on the "main user" or creator of the data to be present in the network. The users would also be able to retrieve the data at multiple times. / text
17

A common model for ubiquitous computing

Blackstock, Michael Anthony 11 1900 (has links)
Ubiquitous computing (ubicomp) is a compelling vision for how people will interact with multiple computer systems in the course of their daily lives. To date, practitioners have created a variety of infrastructures, middleware and toolkits to provide the flexibility, ease of programming and the necessary coordination of distributed software and hardware components in physical spaces. However, to-date no one approach has been adopted as a default or de-facto standard. Consequently the field risks losing momentum as fragmentation occurs. In particular, the goal of ubiquitous deployments may stall as groups deploy and trial incompatible point solutions in specific locations. In their defense, researchers in the field argue that it is too early to standardize and that room is needed to explore specialized domain-specific solutions. In the absence of an agreed upon set of standards, we argue that the community must consider a methodology that allows systems to evolve and specialize, while at the same time allowing the development of portable applications and integrated deployments that work between between sites. To address this we studied the programming models of many commercial and research ubicomp systems. Through this survey we gained an understanding of the shared abstractions required in a core programming model suitable for both application portability and systems integration. Based on this study we designed an extensible core model called the Ubicomp Common Model (UCM) to describe a representative sample of ubiquitous systems to date. The UCM is instantiated in a flexible and extensible platform called the Ubicomp Integration Framework (UIF) to adapt ubicomp systems to this model. Through application development and integration experience with a composite campus environment, we provide strong evidence that this model is adequate for application development and that the complexity of developing adapters to several representative systems is not onerous. The performance overhead introduced by introducing the centralized UIF between applications and an integrated system is reasonable. Through careful analysis and the use of well understood approaches to integration, this thesis demonstrates the value of our methodology that directly leverages the significant contributions of past research in our quest for ubicomp application and systems interoperability.
18

A common model for ubiquitous computing

Blackstock, Michael Anthony 11 1900 (has links)
Ubiquitous computing (ubicomp) is a compelling vision for how people will interact with multiple computer systems in the course of their daily lives. To date, practitioners have created a variety of infrastructures, middleware and toolkits to provide the flexibility, ease of programming and the necessary coordination of distributed software and hardware components in physical spaces. However, to-date no one approach has been adopted as a default or de-facto standard. Consequently the field risks losing momentum as fragmentation occurs. In particular, the goal of ubiquitous deployments may stall as groups deploy and trial incompatible point solutions in specific locations. In their defense, researchers in the field argue that it is too early to standardize and that room is needed to explore specialized domain-specific solutions. In the absence of an agreed upon set of standards, we argue that the community must consider a methodology that allows systems to evolve and specialize, while at the same time allowing the development of portable applications and integrated deployments that work between between sites. To address this we studied the programming models of many commercial and research ubicomp systems. Through this survey we gained an understanding of the shared abstractions required in a core programming model suitable for both application portability and systems integration. Based on this study we designed an extensible core model called the Ubicomp Common Model (UCM) to describe a representative sample of ubiquitous systems to date. The UCM is instantiated in a flexible and extensible platform called the Ubicomp Integration Framework (UIF) to adapt ubicomp systems to this model. Through application development and integration experience with a composite campus environment, we provide strong evidence that this model is adequate for application development and that the complexity of developing adapters to several representative systems is not onerous. The performance overhead introduced by introducing the centralized UIF between applications and an integrated system is reasonable. Through careful analysis and the use of well understood approaches to integration, this thesis demonstrates the value of our methodology that directly leverages the significant contributions of past research in our quest for ubicomp application and systems interoperability.
19

A common model for ubiquitous computing

Blackstock, Michael Anthony 11 1900 (has links)
Ubiquitous computing (ubicomp) is a compelling vision for how people will interact with multiple computer systems in the course of their daily lives. To date, practitioners have created a variety of infrastructures, middleware and toolkits to provide the flexibility, ease of programming and the necessary coordination of distributed software and hardware components in physical spaces. However, to-date no one approach has been adopted as a default or de-facto standard. Consequently the field risks losing momentum as fragmentation occurs. In particular, the goal of ubiquitous deployments may stall as groups deploy and trial incompatible point solutions in specific locations. In their defense, researchers in the field argue that it is too early to standardize and that room is needed to explore specialized domain-specific solutions. In the absence of an agreed upon set of standards, we argue that the community must consider a methodology that allows systems to evolve and specialize, while at the same time allowing the development of portable applications and integrated deployments that work between between sites. To address this we studied the programming models of many commercial and research ubicomp systems. Through this survey we gained an understanding of the shared abstractions required in a core programming model suitable for both application portability and systems integration. Based on this study we designed an extensible core model called the Ubicomp Common Model (UCM) to describe a representative sample of ubiquitous systems to date. The UCM is instantiated in a flexible and extensible platform called the Ubicomp Integration Framework (UIF) to adapt ubicomp systems to this model. Through application development and integration experience with a composite campus environment, we provide strong evidence that this model is adequate for application development and that the complexity of developing adapters to several representative systems is not onerous. The performance overhead introduced by introducing the centralized UIF between applications and an integrated system is reasonable. Through careful analysis and the use of well understood approaches to integration, this thesis demonstrates the value of our methodology that directly leverages the significant contributions of past research in our quest for ubicomp application and systems interoperability. / Science, Faculty of / Computer Science, Department of / Graduate
20

A dynamic trust-based context-aware secure authentication framework for pervasive computing environments / Une architecture d'authentification dynamique et sécurisé, sensible au contexte et basé sur la confiance pour les environnements pervasifs

Abi-char, Pierre 30 March 2010 (has links)
La prise en considération des exigences en matière de sécurité, de vie privée et de confiance au sein des environnements pervasifs (ubiquitaires) est indispensable à la fourniture des services personnalisés aux utilisateurs. L’objectif de cette thèse est de disposer d’une architecture souple et évolutive intégrant l’authentification des utilisateurs, la préservation de leur vie privée et la gestion de la confiance en vue d’optimiser la stratégie de contrôles d’accès aux services personnalisés. La première contribution porte sur la proposition d’un protocole d’authentification mutuelle construit à partir de schémas cryptographiques robustes d’établissement de clés basés sur les courbes elliptiques (MaptoPoint/Curve algorithm, Weil Pairing) et d’un modèle dynamique basé sur les attributs issus des données contextuelles. La seconde contribution porte sur la conception d’une nouvelle architecture bâti sur un modèle basé sur les attributs et organisée autour de 3 couches : la couche de contrôle de le vie privée qui assure la protection de la vie privée des utilisateurs en contrôlant leurs données personnelles, la couche d’accès associant les processus d’authentification et de contrôles d’accès en intégrant des mécanismes dédiés à la gestion des paramètres de confiance et la couche de service pour la gestion des accès aux services selon le profil de l’utilisateur et de son environnement. La troisième contribution porte sur le développement et la mise en œuvre d’un prototype au sein de la plateforme dédiée à la fourniture de services du laboratoire Handicom de Telecom SudParis. / To provide personalized services to users in pervasive environments, we should consider both user's privacy, trust and security requirements. Traditional authentication and access control mechanisms are not able to adapt their security policies to a changing context while insuring privacy and trust issues. This thesis introduces a new global vision for the protection of pervasive environments, based on context-aware principle. The aim of this thesis is to get a flexible and scalable framework including user authentication, user privacy preserving and trust management in order to optimize the access control strategy to personalized services. The first contribution include the proposal of a mutual authentication protocol supported by both robust key establishment schemes based on elliptic curves (MaptoPoint/Curve algorithm, Weil Pairing) and a dynamic model based on attributes issued from contextual data. The second contribution include the design of a new architecture built on an attribute based model and organized over 3 layers: the privacy control layer which insure the protection of the user private life by controlling their personal data, the access layer which associate authentication and access control processes while providing mechanisms dedicated to trust parameters management , and finally the service layer for service access management according to the user profile and his environment. The third contribution the implementation and the deployment of a prototype within the service delivery platform in Handicom lab of Telecom & Management SudParis.

Page generated in 0.0844 seconds