• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 129
  • 109
  • 22
  • 10
  • 10
  • 8
  • 8
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 341
  • 178
  • 82
  • 68
  • 61
  • 60
  • 59
  • 56
  • 50
  • 49
  • 42
  • 39
  • 37
  • 36
  • 35
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Examination of the Communicative Deficits Associated with the Broad Phenotype of Autism in Infant Siblings of Children with Autism Spectrum Disorders

Cassel, Tricia D. 03 July 2008 (has links)
Infants with older siblings on the autism spectrum (ASD-sibs) are at risk for socio-emotional difficulties. ASD-sibs were compared to children of typically developing siblings (TD-sibs) in the Face-to-Face/Still-Face (FFSF) at 6 months and the Early Social Communication Scales (ESCS) at 8, 10, 12, 15, and 18 months. ASD-sibs exhibited non-significant trends to smile less and display more neutral affect than TD-sibs during the FFSF. There was a significant status by gender interaction such that male ASD-sibs showed less smiling and lower affective valence compared to male TD-sibs. Additionally, ASD-sibs showed a lack of emotional continuity in the FFSF. ASD-sibs displayed less initiating joint attention, initiating behavioral requesting, and responding to joint attention over time than TD-sibs. Results are discussed with respect to the social orienting model of autism.
32

Semantic-Based Context-Aware Service Discovery in Pervasive-Computing Environments

El-Sayed, Abdur-Rahman January 2006 (has links)
Recent technological advancements are enabling the vision of pervasive or ubiquitous computing to become a reality. Service discovery is vital in such a computing paradigm, where a great number of devices and software components collaborate unobtrusively and provide numerous services. Current service-discovery protocols do not make use of contextual information in discovering services, and as a result, fail to provide the most appropriate and relevant services for users. In addition, current protocols rely on keyword-based search techniques and do not consider the semantic description of services. Thus, they suffer from poor precision and recall. To address the need for a discovery architecture that supports the envisioned scenarios of pervasive computing, we propose a context-aware service-discovery protocol that exploits meaningful contextual information, either static or dynamic, to provide users with the most suitable and relevant services. The architecture relies on a shared, ontology-based, semantic representation of services and context to enhance precision and recall, and to enable knowledge sharing, capability-based search, autonomous reasoning, and semantic matchmaking. Furthermore, the architecture facilitates a dynamic service-selection mechanism to filter and rank matching services, based on their dynamic contextual attributes, which further enhances the discovery process and saves users time and effort. Our empirical results indicate the effectiveness and feasibility of the proposed architecture.
33

Non-Intrusive Computing

Chen, Hao January 2008 (has links)
Pervasive computing is an important trend today. It concerns devices and services in a smart space that interact with users in a simple, natural, and harmonious way. Many problems in this domain have been studied from different perspectives in various projects. However, one important characteristic of pervasive computing, which is how to make it non-intrusive so that users can focus on their tasks, has received little formal attention. Nowadays, many computing entities including smart devices, and software components, are involved in our daily lives, and users need to deal with them as well as with other people. Besides, people are easy to reach with multiple devices. We believe there should be a systematic way to help users avoid intrusive ones. We propose a model for posing and answering two questions: will an interaction intrude on its receiver if delivered, and given that the interaction is deliverable, how can it be delivered effectively and not too overtly? With this model, the intrusion problem is analyzed and the essential factors are identified. A quantitative approach is used, so that factors have quantitative values for comparison and computation. We also apply context to refine them in order to achieve better results. We then illustrate how to materialize the model and build a system whose design is inspired by the Jabber framework that includes a collection of standards, technologies, and projects for instant messaging. The discussion is at a general level that does not depend on Jabber. However, by choosing Jabber in implementation, we reuse existing software and technologies, and benefit from Jabber/XMPP standardization, its low entry barrier for application developers, and its rich community support. The main contributions of our work are two-fold. First, we propose a model for intrusiveness in pervasive computing. Second, we address the problem at the system level by designing and realizing it. We also make use of standardized instant-messaging technologies, more precisely Jabber, in the system instantiation to reuse existing software, making the system more flexible and extensible.
34

Smart assistants for smart homes

Rasch, Katharina January 2013 (has links)
The smarter homes of tomorrow promise to increase comfort, aid elderly and disabled people, and help inhabitants save energy. Unfortunately, smart homes today are far from this vision – people who already live in such a home struggle with complicated user interfaces, inflexible home configurations, and difficult installation procedures. Under these circumstances, smart homes are not ready for mass adoption. This dissertation addresses these issues by proposing two smart assistants for smart homes. The first assistant is a recommender system that suggests useful services (i.e actions that the home can perform for the user). The recommended services are fitted to the user’s current situation, habits, and preferences. With these recommendations it is possible to build much simpler user interfaces that highlight the most interesting choices currently available. Configuration becomes much more flexible: since the recommender system automatically learns user habits, user routines no longer have to be manually described. Evaluations with two smart home datasets show that the correct service is included in the top five recommendations in 90% of all cases. The second assistant addresses the difficult installation procedures. The unique feature of this assistant is that it removes the need for manually describing device functionalities (such descriptions are needed by the recommender system). Instead, users can simply plug in a new device, begin using it, and let the installation assistant identify what the device is doing. The installation assistant has minimal requirements for manufacturers of smart home devices and was successfully integrated with an existing smart home. Evaluations performed with this smart home show that the assistant can quickly and reliably learn device functionalities. / <p>QC 20130924</p>
35

Semantic-Based Context-Aware Service Discovery in Pervasive-Computing Environments

El-Sayed, Abdur-Rahman January 2006 (has links)
Recent technological advancements are enabling the vision of pervasive or ubiquitous computing to become a reality. Service discovery is vital in such a computing paradigm, where a great number of devices and software components collaborate unobtrusively and provide numerous services. Current service-discovery protocols do not make use of contextual information in discovering services, and as a result, fail to provide the most appropriate and relevant services for users. In addition, current protocols rely on keyword-based search techniques and do not consider the semantic description of services. Thus, they suffer from poor precision and recall. To address the need for a discovery architecture that supports the envisioned scenarios of pervasive computing, we propose a context-aware service-discovery protocol that exploits meaningful contextual information, either static or dynamic, to provide users with the most suitable and relevant services. The architecture relies on a shared, ontology-based, semantic representation of services and context to enhance precision and recall, and to enable knowledge sharing, capability-based search, autonomous reasoning, and semantic matchmaking. Furthermore, the architecture facilitates a dynamic service-selection mechanism to filter and rank matching services, based on their dynamic contextual attributes, which further enhances the discovery process and saves users time and effort. Our empirical results indicate the effectiveness and feasibility of the proposed architecture.
36

Non-Intrusive Computing

Chen, Hao January 2008 (has links)
Pervasive computing is an important trend today. It concerns devices and services in a smart space that interact with users in a simple, natural, and harmonious way. Many problems in this domain have been studied from different perspectives in various projects. However, one important characteristic of pervasive computing, which is how to make it non-intrusive so that users can focus on their tasks, has received little formal attention. Nowadays, many computing entities including smart devices, and software components, are involved in our daily lives, and users need to deal with them as well as with other people. Besides, people are easy to reach with multiple devices. We believe there should be a systematic way to help users avoid intrusive ones. We propose a model for posing and answering two questions: will an interaction intrude on its receiver if delivered, and given that the interaction is deliverable, how can it be delivered effectively and not too overtly? With this model, the intrusion problem is analyzed and the essential factors are identified. A quantitative approach is used, so that factors have quantitative values for comparison and computation. We also apply context to refine them in order to achieve better results. We then illustrate how to materialize the model and build a system whose design is inspired by the Jabber framework that includes a collection of standards, technologies, and projects for instant messaging. The discussion is at a general level that does not depend on Jabber. However, by choosing Jabber in implementation, we reuse existing software and technologies, and benefit from Jabber/XMPP standardization, its low entry barrier for application developers, and its rich community support. The main contributions of our work are two-fold. First, we propose a model for intrusiveness in pervasive computing. Second, we address the problem at the system level by designing and realizing it. We also make use of standardized instant-messaging technologies, more precisely Jabber, in the system instantiation to reuse existing software, making the system more flexible and extensible.
37

A dynamic trust-based context-aware secure authentication framework for pervasive computing environments

Abi-Char, Pierre 30 March 2010 (has links) (PDF)
To provide personalized services to users in pervasive environments, we should consider both user's privacy, trust and security requirements. Traditional authentication and access control mechanisms are not able to adapt their security policies to a changing context while insuring privacy and trust issues. This thesis introduces a new global vision for the protection of pervasive environments, based on context-aware principle. The aim of this thesis is to get a flexible and scalable framework including user authentication, user privacy preserving and trust management in order to optimize the access control strategy to personalized services. The first contribution include the proposal of a mutual authentication protocol supported by both robust key establishment schemes based on elliptic curves (MaptoPoint/Curve algorithm, Weil Pairing) and a dynamic model based on attributes issued from contextual data. The second contribution include the design of a new architecture built on an attribute based model and organized over 3 layers: the privacy control layer which insure the protection of the user private life by controlling their personal data, the access layer which associate authentication and access control processes while providing mechanisms dedicated to trust parameters management , and finally the service layer for service access management according to the user profile and his environment. The third contribution the implementation and the deployment of a prototype within the service delivery platform in Handicom lab of Telecom & Management SudParis.
38

Balance of Control between Users and Context-Aware Pervasive Systems

Bob Hardian Unknown Date (has links)
Context-awareness in pervasive computing environments can reduce user interactions with computing devices by making applications adaptive and autonomous. Context-aware applications rely on information about user context and user preferences to guide their own behaviour. However, context-aware applications do not always behave as users expect due to imperfection of context information, incorrect user preferences or incorrect adaptation rules. This may cause users to feel loss of control over their applications. To mitigate these problems, context-aware systems must provide mechanisms to strike a suitable balance between user control and software autonomy. Allowing users to scrutinise the system and allowing the system to sometimes include users in the adaptation decision making, can provide a balance of user control. This thesis addresses the shortcoming in development of context-aware pervasive systems with regard to providing balance between user control and software autonomy. The thesis shows that rather than making a context-aware application a complete black box, it is possible to allow user control of application adaptations. The system can reveal to the user what context information the system uses and how it arrives at adaptation decisions if the user requests such information. The user may decide to alter the adaptive behaviour of the system to achieve desired outcomes. Hence, a context-aware application becomes a closed loop system where the user is put into the loop if requested. The proposed approach is developed under an assumption that users differ in the level of their technology expertise and therefore the system has to provide explanations that are suitable for a particular level of user expertise. The thesis makes two important research contributions: design of the architectural framework and development of the platform exposing autonomic behaviour of context-aware applications. The architectural framework supports developers of context aware-applications in providing balance of control between users and software autonomy. The framework describes a set of models that allow revealing the adaptation behaviour of context-aware applications in a way suitable for users with various levels of expertise. The framework consists of: (i) a model for exposing elements that influence the context-aware behaviour, (ii) a generic architecture for providing balance of control, (iii) a user model, and (iv) a context graph based overview of context-aware adaptations. The platform exposing autonomic behaviour of context-aware applications is a proof of concept prototype of a software infrastructure (middleware) providing balance of control. The software infrastructure includes: (i) a Semantic Manager, developed to serve the description of elements required for explanations of the application behaviour; (ii) an extension of the PACE Middleware, to enable the middleware to expose the context information, preferences, adaptation rules and their evaluation traces, respectively. (iii) supporting tools for the application designer to prepare the overview of context-aware adaptations and review the evaluation traces. Finally, this thesis presents a case study that illustrates and evaluates the system supporting balance of control. This evaluation involves the existing application which is developed using the previous version of the PACE middleware. The case study validates the architectural framework and illustrates the process and issues involved in developing context-aware application that are able to expose elements that influence context-aware behaviour.
39

Jogos em ambientes pervasivos / Games in pervasive environments

Vázquez, Sonia Andrea Lugo January 2009 (has links)
Dispositivos eletrônicos com características de computadores pessoais, como um alto poder de processamento de dados e armazenamento, estão espalhando-se cada vez mais na vida das pessoas. Variando desde notebooks a PocketPCs e, mais recentemente, telefones celulares com funcionalidades extras, os chamados smart phones, estes dispositivos oferecem recursos antes disponíveis apenas em desktops em praticamente qualquer lugar. Essa tendência em difundir cada vez mais serviços computacionais de forma a integrálos na vida das pessoas deu origem à computação pervasiva. Este ramo da computação almeja integrar os serviços computacionais de forma transparente na vida das pessoas. Um uso interessante desta nova tecnologia ainda relativamente pouco explorado é o entretenimento, mais exatamente jogos pervasivos. A criação deste novo tipo de jogo exige que certos cuidados inerentes ao ambiente pervasivo sejam tomados para aumentar a qualidade dos produtos desenvolvidos e permitir que eles de fato resultem na experiência a que se propõe. Este trabalho contribui apresentando uma pesquisa realizada sobre quais são as características desejáveis em jogos pervasivos. Para embasar essas características foi realizado um estudo sobre o que autores clássicos classificam como sendo as características de jogos tradicionais, isto é, jogos que são encontrados no universo físico, sem o auxílio de computadores. Também foram analizados trabalhos que descrevem os elementos usualmente presentes em jogos de video game, que são jogos que utilizam extensivamente recursos computacionais. Utilizando essas duas análises, é possível identificar pontos em comum entre essas duas formas de jogos, e então derivar importantes características que deveriam estar presentes em jogos pervasivos. Um jogo pervasivo foi desenvolvido para verificar se a utilização dessas características aumentam as possibilidades de um jogo pervasivo ser mais fiel ao projeto de seu idealizador. O conceito desse jogo pervasivo é similar ao conceito de um jogo de video game já existente, porém levando em consideração as necessidades do ambiente pervasivo. O jogo foi projetado utilizando as ferramentas de modelagem da UML, respeitando sempre as características quando uma decisão deveria ser tomada. Um protótipo do jogo foi desenvolvido e testado com usuários, sempre procurando avaliar quando as características estavam de fato presentes. Este trabalho finaliza apresentando uma conclusão e algumas possibilidades de trabalhos futuros. / Electronic devices with characteristics of personal computers (such as high processing power and high data storage capacities) are becoming more common in everybody lives. These devices vary from laptops to PocketPCs and, recently, to cell phones with expanded functionality, the so called smart phones. All these equipments make available everywhere possibilities that have been available before only in desktops. This new paradigm of spreading computational services and integrating them into the lives of everybody created the concept of pervasive computing. This branch of computer science aims to integrate computational services transparently into the lives of everyone. An interesting use of this new technology that still has not been widely explored is for entertainment, specifically for pervasive games. The creation of this new type of game demands certain precautions relative to the pervasive environment. This is a necessity, such that the final product has higher quality and actually corresponds to the satisfying experience it proposes. This work contributes by presenting a research about desirable characteristics in pervasive games. A study about the elements of traditional games as classified by classic authors was performed. Traditional games are games that happen in the physical universe, without the use of computers. This work also includes an analysis of different works that describe the characteristics of video games. Video games are games that extensively use computational resources. This work uses both analysis to identify similarities between these two different forms of games, and then builds important characteristics that should be present in pervasive games. A pervasive game has been developed to verify if the use of these characteristics increase the possibilities of a pervasive game meet the design goals set by its designer. The idea behind this pervasive game is similar to the concept of an existing video game, but now considering the requirements of a pervasive environment. This game was designed using the UML tools, always respecting the characteristics when a decision should be made. A prototype of this game was coded and tests have been performed with different users, always trying to verify if the characteristics were indeed present in the game. In the end of this work there is a conclusion section, along with some possibilities for future work.
40

Arquitetura da informação pervasiva: contribuições conceituais

Oliveira, Henry Poncio Cruz de [UNESP] 28 April 2014 (has links) (PDF)
Made available in DSpace on 2014-11-10T11:09:41Z (GMT). No. of bitstreams: 0 Previous issue date: 2014-04-28Bitstream added on 2014-11-10T11:58:46Z : No. of bitstreams: 1 000793107.pdf: 12514867 bytes, checksum: 855b24cf3e1ca655547b5d680a190b4a (MD5) Bitstreams deleted on 2015-09-21T13:18:47Z: 000793107.pdf,. Added 1 bitstream(s) on 2015-09-21T13:19:49Z : No. of bitstreams: 1 000793107.pdf: 12638238 bytes, checksum: 2f1c10174d47348f48b14b522ccfb5f7 (MD5) / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) / No campo da informação, os impactos hodiernos estão relacionados aos avanços da técnica e da tecnologia, com a diversidade de ambientes de informação digital e com a necessidade de lidar com os estoques informacionais que nem sempre se transformam em conhecimento na estrutura cognitiva dos sujeitos. Constatamos a emergência de novas ações teóricas e práticas na disciplina de Arquitetura da Informação, cuja preocupação se fixa na pervasividade da informação em ambientes analógicos, digitais ou híbridos. Estas ações têm utilizado os comportamentos dos sujeitos no cotidiano como elemento norteador para produção de artefatos tecnológicos transparentes ou ubíquos. Evidenciamos que Arquitetura da Informação Pervasiva carece ser melhor concebida no plano conceitual e teórico. Fomos norteados pela seguinte questão de pesquisa: O que é a Arquitetura da Informação Pervasiva e como pode ser representada conceitualmente para tratar as atuais demandas tecnológicas. Traçamos como objetivo geral: Construir um conceito de Arquitetura da Informação Pervasiva com base na fenomenologia e na Ciência da Informação. Defendemos a tese de que sobre a Arquitetura da Informação Pervasiva pode ser feita uma conceituação de base fenomenológica e na perspectiva da Ciência da Informação. Utilizamos o método quadripolar e construímos o polo teórico, o polo epistemológico, o polo técnico e o polo morfológico, incluindo as perspectivas fenomenológica e sistêmica, tratadas como fundamentos epistêmicos da pesquisa e enquadradas no polo epistemológico. Concluímos apresentando teoricamente a Arquitetura da Informação Pervasiva sob a forma de conceito, mapa conceitual e representação visual do conceito, como forma de oferecer mecanismos plurais de disseminação do conceito para alunos, pesquisadores, arquitetos da informação e afins que podem ter preferências cognitivas... / In the information field, the modern-day impacts are related to the advances of the technique and technology, with the diversity of digital information environments and with the need to deal with informational stocks that not always are transformed into knowledge in the subject's cognitive structure. We found the emergence of new theoretical and practical actions in the Information Architecture subject, whose concern is fixed in the information pervasiveness in physical, digital or hybrid environments. These actions have used the subjects' behavior in daily life as a guide for the production of transparent or ubiquitous technological artifacts. We showed that the Pervasive Information Architecture needs to be better designed in conceptual and theoretical level. We were guided by the following research question: What is the Pervasive Information Architecture and how can it be conceptually represented to deal with current technological demands. We draw as general objective: Build a concept of Pervasive Information Architecture based on phenomenology and Information Science. We start from the thesis that on Pervasive Information Architecture a conceptualization with phenomenological basis and in the perspective of Information Science can be made. We use the quadrupole method and construct the theoretical pole, the epistemological pole, the technical pole and the morphological pole, including phenomenological and systemic perspectives, treated as epistemic foundations of research and framed in the epistemological pole. We conclude theoretically presenting Pervasive Information Architecture in the form of concept, conceptual map and visual representation of the concept, as a way to provide plural mechanisms for concept dissemination to students, researchers, information architects and the like, that may have distinct cognitive preferences for knowledge absorption.

Page generated in 0.0442 seconds