共查询到20条相似文献,搜索用时 328 毫秒
1.
Much of the ongoing research in ubiquitous computing has concentrated on providing context information, e.g. location information,
to the level of services and applications. Typically, mobile clients obtain location information from their environment which
is used to provide “locally optimal” services. In contrast, it may be of interest to obtain information about the current
context a mobile user or device is in, from a client somewhere on the Web, i.e. to use the mobile device as an information
provider for Internet clients.
As an instance of such services we propose the metaphor of a “location-aware” Web homepage of mobile users providing information
about, e.g. the current location a mobile user is at. Requesting this homepage can be as easy as typing a URL containing the
mobile user's phone number such ashttp://mhp.net/+49123456789 in an off-the-shelf browser. The homepage is dynamically constructed as Web users access it and it can be configured in various
ways that are controlled by the mobile user. We present the architecture and implementation and discuss issues around this
example of “inverse” ubiquitous computing. 相似文献
2.
Context Awareness and Mobile Phones 总被引:1,自引:1,他引:0
Peter Ljungstrand 《Personal and Ubiquitous Computing》2001,5(1):58-61
This paper investigates some aspects of how context-awareness can support users of mobile phones, in particular the calling
party. The use of mobile and stationary phones is discussed in relation to situational properties of a phone conversation,
especially with regards to who might benefit from context-awareness in this context. An initial hypothesis is that mobile
phone users communicate context information to each other (verbally) to a much higher degree than do stationary phone users.
Mobile phone users could benefit much from context awareness technology, in particular when about to make a call, if they
can receive context information regarding the person they are trying to reach prior to establishing the call. We argue that
such technology should require low amounts of explicit user interaction, and could lead to less disrupting calls in inappropriate
moments, as well as less frustration for the calling party when a call is not answered. 相似文献
3.
Location awareness can help facilitate a rendezvous of two or more persons. To further enhance the rendezvous experience,
we conducted two complementary field studies to identify what information in a location-aware map application is important to rendezvous individuals (study 1) and to explore the use of
autofocus, our automation technique to reduce user interactions with the rendezvous application while still providing relevant information
to assist users with their navigation task (study 2). Overall, our results highlight the importance of maintaining the visibility
of the user’s location in relation to that of their partner(s) and rendezvous location. Additionally, we show that automation
is useful in the context of a rendezvous application, but that the considerations are significantly more nuanced than originally
conceived. We discuss unique instances when and why the automation process broke-down or did not perform as required by users. The results of this work demonstrate the potential
for automation in a location-aware rendezvous application and identify important design considerations for future work in
this area. 相似文献
4.
Kevin Doolin Robert Mullins Rafael Morón Abad Marta García Moreno Telma Mota Babak A. Farshchian Miguel Gómez 《Journal of Network and Systems Management》2008,16(1):92-112
Natural communication among people happens in flexible ways and is strongly affected by the users’ situation (such as communication
tools available, user’s location, and user’s preferences). This situation or context information is seldom used to initiate
communication sessions among users. Current communication systems are indifferent about users’ context, often require time
consuming manual configurations and often result in conferencing tools not being easily accessible when needed. This leads
to lower adoption of innovative communications services. IMS SIP (IP Multimedia Subsystem, Session Initiation Protocol) sessions
allow users to access the session from different points of contact (home, office, etc.), however, IMS still requires a prior
knowledge of all SIP components that might be used in a SIP session. Furthermore, IMS makes limited use of context information
(mainly user-defined availability). To address these issues our research approach combines techniques from pervasive computing
with IMS networking principles to facilitate compositions of communication sessions based on users’ context. We propose a
platform and APIs for pervasive application development support to allow greater intelligence in IMS applications. We additionally
provide mechanisms for IMS applications to apply their intelligence to the configuration of physical devices and web resources
used to set up a conference. The innovations proposed in this paper are: (1) A new standard for intelligent IMS-based conferencing
applications. (2) Application Development Interfaces (APIs) for a platform for pervasive computing. (3) An architecture for
a pervasive IMS platform.
相似文献
Kevin DoolinEmail: |
5.
Mobile devices such as personal digital assistants (PDAs) and mobile phones are in widespread use already today and converging
to mobile smart phones. They enable users to access a wide range of services and information without guidance through their
actual demands. Especially during mass events like the Olympic Games 2008 in Beijing—which was initially the context of our
work—a large service space is expected to support all mobile visitors, being athletes, journalists, or spectators. Current
approaches tackling such problems are location based, meaning that a user's location is central to service provision, and even context-aware, meaning that, beyond location, characteristics of a user's environment are taken into account. Such information obviously
helps to deliver relevant information at the right time to the mobile users. Going one step further, a situation-aware system abstracts from the context dimensions by translating specific contexts into logical situations. Knowing the situation
end users are in allows the system to better identify the information to be delivered to them and to choose the appropriate
services with regard to their scope, which is referred to as service roaming. Even though many context frameworks have been
introduced in the past few years, what is usually missing is the notion of characteristic features of contexts that are invariant during certain time intervals. This paper presents these concepts in the context of a platform
development, namely FLAME2008, which is able to support its mobile users with personalized situation-aware services in push
and pull mode. 相似文献
6.
Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments 总被引:2,自引:0,他引:2
This paper tackles a privacy breach in current location-based services (LBS) where mobile users have to report their exact
location information to an LBS provider in order to obtain their desired services. For example, a user who wants to issue
a query asking about her nearest gas station has to report her exact location to an LBS provider. However, many recent research
efforts have indicated that revealing private location information to potentially untrusted LBS providers may lead to major
privacy breaches. To preserve user location privacy, spatial cloaking is the most commonly used privacy-enhancing technique
in LBS. The basic idea of the spatial cloaking technique is to blur a user’s exact location into a cloaked area that satisfies
the user specified privacy requirements. Unfortunately, existing spatial cloaking algorithms designed for LBS rely on fixed
communication infrastructure, e.g., base stations, and centralized/distributed servers. Thus, these algorithms cannot be applied
to a mobile peer-to-peer (P2P) environment where mobile users can only communicate with other peers through P2P multi-hop
routing without any support of fixed communication infrastructure or servers. In this paper, we propose a spatial cloaking
algorithm for mobile P2P environments. As mobile P2P environments have many unique limitations, e.g., user mobility, limited
transmission range, multi-hop communication, scarce communication resources, and network partitions, we propose three key
features to enhance our algorithm: (1) An information sharing scheme enables mobile users to share their gathered peer location information to reduce communication overhead; (2) A historical location scheme allows mobile users to utilize stale peer location information to overcome the network partition problem; and (3) A cloaked area adjustment scheme guarantees that our spatial cloaking algorithm is free from a “center-of-cloaked-area” privacy attack. Experimental results
show that our P2P spatial cloaking algorithm is scalable while guaranteeing the user’s location privacy protection. 相似文献
7.
Xiaolong Zhang 《Virtual Reality》2007,11(2-3):161-173
Mobile devices are becoming increasingly integrated into our society. In addition to entertaining people with applications
like pervasive games, mobile devices can also help to address cognitive challenges people face in the real world. This paper,
by drawing on research findings from cognitive psychology and geography, explores a design to use mobile VR to help people
overcome one cognitive barrier in navigation, which is to establish the correspondence between 2D spatial information found
in maps and 3D entities they perceive from the real world. The design offers users multi-format, multi-scale, and semantic
(M2S) maps, ranging from 2D maps to 3D immersive environments, and helps users to connect 2D maps to the real world through 3D
environments which are equipped with semantic representation and animation techniques. Consequently, users can apply various
kinds of spatial knowledge, 2D or 3D, in understanding the real world as well as assisting in navigation. This research enhances
the design repertoire of mobile VR, and suggests a way to integrate virtual environments into people’s real-world life by
examining the cognitive implications of 3D models on users’ activities. 相似文献
8.
Using ubiquitous computing in interactive mobile marketing 总被引:2,自引:1,他引:1
Unique features of handheld devices, including their mobility, personalization and location-awareness engender new types of
applications for mobile commerce, such as mobile advertising. Mobile marketing and advertising applications deliver promotional
information to consumers based on their preferences and location. In this paper, we present SMMART, a context-aware, adaptive
and personalized m-commerce application designed to deliver targeted promotions to the users of mobile devices about the products
they like while guarding the users’ identity and protecting them from any unsolicited messages. Promotions distributed by
SMMART are personalized by performing intelligent matching of the user’s shopping interests to current promotions available
at a retail site. SMMART can adapt to changing preferences of its user by inconspicuously monitoring his or her shopping habits.
We describe a fully functional prototype of SMMART built for Pocket PCs running Windows CE with .NET Compact Framework. This
paper also presents a study demonstrating end-user usability and economic viability of SMMART. 相似文献
9.
Mustafa A. Al-Fayoumi Nidal F. Shilbayeh 《Journal of Network and Systems Management》2014,22(2):259-279
This paper studies the probability of using cloning subscriber identity module (SIM) cards in Universal Mobile Telecommunications Systems. It also explores how the mobile system can discover the cloning SIM cards as soon as possible and how to reduce the probability of using cloning SIM cards in mobile networks. The illegal mobile station attached to mobile networks can be detected by a Normal Location Area Update, a periodic area location update, and by outgoing calls that are issued from genuine mobiles. An analytical model is developed to investigate the effects of a location area update and outgoing calls issued by genuine mobiles on the use of illegal mobiles. Mobility management, such as registration, cancellation, and outgoing and incoming procedures for legal and illegal users are investigated and analysed. An analytical model to investigate the effect of outgoing call arrival rates, and location area residence time on the detected illegal user has been presented. This paper seeks to increase the security of communication by avoiding fraud of cloned mobile phones by proposing a solution to speed up the detection of cloning SIM cards. 相似文献
10.
Ubiquitous and mobile computer technologies are increasingly being appropriated to facilitate people’s social life outside
the work domain. Designing such social and collaborative technologies requires an understanding of peoples’ physical and social
context, and the interplay between these and their situated interactions. In response, this paper addresses the challenge
of informing design of mobile services for fostering social connections by using the concept of place for studying and understanding
peoples’ social activities in a public built environment. We present a case study of social experience of a physical place
providing an understanding of peoples’ situated social interactions in public places of the city derived through a grounded
analysis of small groups of friends socialising out on the town. Informed by this, we describe the design and evaluation of
a mobile prototype system facilitating sociality in the city by (1) allowing people to share places, (2) indexing to places,
and (3) augmenting places. 相似文献
11.
Ohad Inbar Gesche Joost Fabian Hemmert Talya Porat 《Behaviour & Information Technology》2014,33(12):1317-1332
Recipients of phone calls face a constant dilemma between ignoring calls at the possible expense of offending the caller, missing business opportunities or neglecting family members on one hand; and answering them at the expense of interrupting their train of thought or appearing rude and impolite towards others with whom they share a social activity on the other hand. We studied people's attitudes regarding these dilemmas, with emphasis on their social aspects. In a cross-cultural study, conducted in Israel and in Germany, we surveyed both caller and recipient attitudes towards answering mobile phone calls in various circumstances. The study also assessed the aspects of providing contextual information about a call prior to it being answered, including types of information deemed most valuable. The results emphasise the importance of social norms in affecting respondents’ attitudes towards making or accepting phone calls regardless of role (caller or recipient), gender or culture. We also found that the norms in the physical context (e.g. being in a meeting) prevailed over norms in the virtual context (e.g. the phone call). Cultural and gender differences did not affect the degree to which people were frustrated by insufficient information regarding the other party's context. However, these factors did affect the suggested design solutions to this problem. The research provides insight into the social aspects of the problem of interruptive mobile phone calls and towards designing applications that help users maintain politeness while handling the caller–recipient dilemma. 相似文献
12.
This study examines an Emergency Medical Service in order to analyze the composite set of activities and instruments directed
at locating the patient. The good management of information about the location of the emergency is highly relevant for a reliable
rescue service, but this information depends on knowledge of the territory that is socially distributed between EMS operators
and callers. Accordingly, the decision-making process often has to go beyond the emergency service protocols, engaging the
operator in undertaking an open negotiation in order to transform the caller’s role from layman to “co-worker”. The patient’s
location turns out to be an emerging phenomenon, collaborative work based on knowledge management involving two communities—the
callers and the EMS operators—that overlap partially. Drawing examples from emergency calls, the study analyzes the practice
of locating a patient as a complex and multi-layered process, highlighting the role played by new and old technologies (the
information system and the paper maps) in this activity. We argue that CSCW technologies enable the blended use of different
kinds of instruments and support an original interconnection between the professional localization systems and the public’s
way of defining a position. 相似文献
13.
14.
Several researchers have identified the need to count on presence awareness in ubiquitous systems that support mobile activities, particularly when these systems are used to perform loosely-coupled mobile work. In such a work style, mobile users conduct face-to-face on-demand interactions, therefore counting on awareness information about the position and availability of potential collaborators becomes mandatory for these applications. Most proposed solutions that provide user presence awareness involve centralized components, have reusability limitations, or simply address a part of that service. This article presents a lightweight and fully distributed middleware named Moware, which allows developers to embed presence awareness services in mobile ubiquitous systems in a simple way. The article also describes the Moware architecture, its main components and strategies used to deal with several aspects of the presence awareness support. These design strategies can be reused by software designers to provide presence awareness capabilities into middleware and specific software applications. Moware services were embedded in a mobile ubiquitous system that supports inspectors during the construction inspection process. The preliminary results indicate that the middleware was easy to use for developers, and its services were useful for the end-users. 相似文献
15.
There is more to context than location 总被引:1,自引:0,他引:1
Context is a key issue in interaction between human and computer, describing the surrounding facts that add meaning. In mobile computing location is usually used to approximate context and to implement context-aware applications. We propose that ultra-mobile computing, characterized by devices that are operational and operated while on the move (e.g. PDAs, mobile phones, wearable computers), can significantly benefit from a wider notion of context. To structure the field we introduce a working model for context, discuss mechanisms to acquire context beyond location, and application of context-awareness in ultra-mobile computing. We investigate the utility of sensors for context-awareness and present two prototypical implementations — a light-sensitive display and an orientation-aware PDA interface. The concept is then extended to a model for sensor fusion to enable more sophisticated context recognition. Based on an implementation of the model an experiment is described and the feasibility of the approach is demonstrated. Further, we explore fusion of sensors for acquisition of information on more sophisticated contexts. 相似文献
16.
Frada Burstein Julie Cowie Arkady Zaslavsky Jocelyn San Pedro 《Information Systems and E-Business Management》2008,6(3):257-278
Mobile users making real-time decisions based on current information need confidence that their context has been taken into
consideration in producing the system’s recommendations. This chapter reviews current use of mobile technologies for context-aware
real-time decision support. Specifically, it describes a framework for assessing the impact of mobility in decision making.
The framework uses dynamic context model of data quality to represent uncertainties in the mobile decision-making environment.
This framework can be used for developing visual interactive displays for communicating to the user relevant changes in data
quality when working in mobile environments. As an illustration, this chapter proposes a real-time decision support procedure
for on-the-spot assistance to the mobile consumer when choosing the best payment option to efficiently manage their budget.
The proposed procedure is based on multi-attribute decision analysis, scenario reasoning, and a quality of data framework.
The feasibility of the approach is demonstrated with a mobile decision-support system prototype implementation.
This article is part of the “Handbook on Decision Support Systems” edited by Frada Burstein and Clyde W. Holsapple (2008)
Springer. 相似文献
17.
A new private set-operation problem is proposed. Suppose there are n parties with each owning a secret set. Let one of them, say P, be the leader, S be P's secret set, and t (less than n - 1) be a threshold value. For each element w of S, if w appears more than t times in the rest parties' sets, then P learns which parties' sets include w, otherwise P cannot know whether w appears in any party's set. For this problem, a secure protocol is proposed in the semi-honest model based on semantically secure homomorphic encryption scheme, secure sharing scheme, and the polynomial representation of sets. The protocol only needs constant rounds of communication. 相似文献
18.
User needs for location-aware mobile services 总被引:2,自引:2,他引:2
Eija Kaasinen 《Personal and Ubiquitous Computing》2003,7(1):70-79
Mobile contexts of use vary a lot, and may even be continuously changing during use. The context is much more than location, but its other elements are still difficult to identify or measure. Location information is becoming an integral part of different mobile devices. Current mobile services can be enhanced with location-aware features, thus providing the user with a smooth transition towards context-aware services. Potential application fields can be found in areas such as travel information, shopping, entertainment, event information and different mobile professions. This paper studies location-aware mobile services from the user's point of view. The paper draws conclusions about key issues related to user needs, based on user interviews, laboratory and field evaluations with users, and expert evaluations of location-aware services. The user needs are presented under five main themes: topical and comprehensive contents, smooth user interaction, personal and user-generated contents, seamless service entities and privacy issues. 相似文献
19.
In this paper we present CoWSAMI, a middleware infrastructure that enables context awareness in open ambient intelligence environments, consisting of mobile users and context sources that become dynamically available as the users move from one location to another. A central requirement in such dynamic scenarios is to be able to integrate new context sources and users at run-time. CoWSAMI exploits a novel approach towards this goal. The proposed approach is based on utilizing Web services as interfaces to context sources and dynamically updatable relational views for storing, aggregating and interpreting context. Context rules are employed to provide mappings that specify how to populate context relations, with respect to the different context sources that become dynamically available. An underlying context sources discovery mechanism is utilized to maintain context information up to date as context sources, and users get dynamically involved. 相似文献
20.
The strategy of location updating is a critical issue for tracking the current locations of users in wireless networks. Especially when the mobile user is located near the boundaries of networks, the signaling traffic of the location updating will be excessively excited. In this paper, we shall propose a newly developed scheme for reducing both the location updating rate and location updating cost. The new scheme employs forwarding pointers in the virtual layer architecture. The forwarding pointer is a useful tool to get rid of the registrations at the HLR, and thus the location updating cost can be reduced. The virtual layer architecture is efficient in lowering the high updating rate of the current location when a user moves around the boundaries of the Location Area (LA). Our scheme can significantly reduce the location updating traffic. 相似文献