首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
In order to be capable of exploiting context for pro-active information recommendation, agents need to extract and understand user activities based on their knowledge of the user interests. In this paper, we propose a novel approach for context-aware recommendation in browsing assistants based on the integration of user profiles, navigational patterns and contextual elements. In this approach, user profiles built using an unsupervised Web page clustering algorithm are used to characterize user ongoing activities and behavior patterns. Experimental evidence show that using longer-term interests to explain active browsing goals user assistance is effectively enhanced.
Analía AmandiEmail:
  相似文献   

2.
Understanding mobile contexts   总被引:2,自引:2,他引:0  
Mobile urban environments present a challenge for context-aware computers because they differ from fixed indoor contexts such as offices, meeting rooms, and lecture halls in many important ways. Internal factors such as tasks and goals are different—external factors such as social resources are dynamic and unpredictable. An empirical, user-centred approach is needed to understand mobile contexts. In this paper, we present insights from an ethnomethodologically inspired study of 25 adult urbanites in Helsinki. The results describe typical phenomena in mobility: how situational and planned acts intermesh in navigation, how people construct personal and group spaces, and how temporal tensions develop and dissolve. Furthermore, we provide examples of social solutions to navigation problems, examine mobile multitasking, and consider design implications for mobile and context-aware human–computer interaction.
Sakari TamminenEmail: Phone: +358-9-4516042
  相似文献   

3.
Understanding the behavior of mobile data services consumers   总被引:5,自引:1,他引:4  
Due to rapid advances in the Internet and wireless technologies, a ubiquitous computing world is becoming a reality in the form of mobile computing. At the center of this phenomenon is mobile data services which arise from the convergence of advanced mobile communication technologies with data services. Despite the rapid growth in mobile data services, research into consumers’ usage behavior is scarce. This study attempts to identify and empirically assess the factors that drive consumers’ acceptance of mobile data services. A research model based on the decomposed theory of planned behavior and incorporating factors that represent personal needs and motivations in using mobile data services is presented. The model is tested via an online survey of 811 consumers of four categories of mobile data services (i.e., communications, information content, entertainment, and commercial transactions) associated with different usage contexts. We found that attitude, social influence, media influence, perceived mobility, and perceived monetary value influence consumers’ intention to continue usage of mobile data services. In addition, perceived ease of use, perceived usefulness, and perceived enjoyment influence attitude toward continued usage of mobile data services. Finally, separate analysis of the different categories of mobile data services highlights the influence of individual usage context on consumers’ behavior.
Kar-Yan TamEmail:
  相似文献   

4.
Information systems design: through adaptivity to ubiquity   总被引:1,自引:1,他引:0  
In a globalised economy the accessibility of services becomes increasingly important for businesses. This has led to a demand that information systems should be ubiquitous in the sense that they are available to all users under all circumstances, everywhere and at all times, and independent of the access devices and channels used. The authors believe the key to meeting that demand is existence of an omnipresent media of interaction and existence of information systems that within that media adapt themselves to context parameters at run-time. The World Wide Web is considered as that omnipresent media. Thus, the task is left to design adaptive information systems in a way that avoids unnecessary replication. In this article it will be shown how context parameters can be utilised to enable system adaptivity. The latter is supposed to increase usability and targets the quality of use, the content, and the functionality. We propose using an algebraic approach that aids in providing the leanest appropriate interface via user typing and story boarding. Our approach furthermore limits the content delivered to a user to the amount that can be dealt with in a usage scenario. The latter is based on defining hyphenation points within the content.
Roland Kaschek (Corresponding author)Email:
Claire MatthewsEmail:
Klaus-Dieter ScheweEmail:
  相似文献   

5.
Reality mining: sensing complex social systems   总被引:12,自引:5,他引:12  
We introduce a system for sensing complex social systems with data collected from 100 mobile phones over the course of 9 months. We demonstrate the ability to use standard Bluetooth-enabled mobile telephones to measure information access and use in different contexts, recognize social patterns in daily user activity, infer relationships, identify socially significant locations, and model organizational rhythms.
Alex (Sandy) PentlandEmail:
  相似文献   

6.
Quantitative usability requirements are a critical but challenging, and hence an often neglected aspect of a usability engineering process. A case study is described where quantitative usability requirements played a key role in the development of a new user interface of a mobile phone. Within the practical constraints of the project, existing methods for determining usability requirements and evaluating the extent to which these are met, could not be applied as such, therefore tailored methods had to be developed. These methods and their applications are discussed.
Timo Jokela (Corresponding author)Email:
Jussi KoivumaaEmail:
Jani PirkolaEmail:
Petri SalminenEmail:
Niina KantolaEmail:
  相似文献   

7.
Acoustic environment as an indicator of social and physical context   总被引:1,自引:0,他引:1  
Acoustic environments provide many valuable cues for context-aware computing applications. From the acoustic environment we can infer the types of activity, communication modes and other actors involved in the activity. Environmental or background noise can be classified with a high degree of accuracy using recordings from microphones commonly found in PDAs and other consumer devices. We describe an acoustic environment recognition system incorporating an adaptive learning mechanism and its use in a noise tracker. We show how this information is exploited in a mobile context framework. To illustrate our approach we describe a context-aware multimodal weather forecasting service, which accepts spoken or written queries and presents forecast information in several forms, including email, voice and sign languages.
Nick RyanEmail:
  相似文献   

8.
The prevalent visions of ambient intelligence emphasise natural interaction between user and functions and services embedded in the environment or available through mobile devices. In these scenarios the physical and virtual worlds seamlessly gear into each other, making crossing the border between these worlds natural or even invisible to the user. The bottleneck in reaching these scenarios appear in the natural mapping between the physical objects and their virtual counterparts. The emergence of local connectivity in mobile devices opens possibilities for implementing novel user interface paradigms to enhance this mapping. We present physical selection paradigm for implementing an intuitive human technology interaction for mobile devices. In order to demonstrate the feasibility of the paradigm we implemented two experimental set-ups using commercially available smart phones with IrDA connectivity. The experiments involved selecting a website by physically pointing at its symbol and making a phone call by pointing at an icon representing the person to be called. In tentative user experiments the physical selection method was more time-efficient and it was perceived more positively by the users than a conventional method.
Heikki AilistoEmail:
  相似文献   

9.
With the continuing advances in wireless communications, geo-positioning, and portable electronics, an infrastructure is emerging that enables the delivery of on-line, location-enabled services to very large numbers of mobile users. A typical usage situation for mobile services is one characterized by a small screen and no keyboard, and by the service being only a secondary focus of the user. Under such circumstances, it is particularly important to deliver the “right” information and service at the right time, with as little user interaction as possible. This may be achieved by making services context aware. Mobile users frequently follow the same route to a destination as they did during previous trips to the destination, and the route and destination constitute important aspects of the context for a range of services. This paper presents key concepts underlying a software component that identifies and accumulates the routes of a user along with their usage patterns and that makes the routes available to services. The problems associated with of route recording are analyzed, and algorithms that solve the problems are presented. Experiences from using the component on logs of GPS positions acquired from vehicles traveling within a real road network are reported.
Christian S. Jensen (Corresponding author)Email:
  相似文献   

10.
Remote experimentation is an effective e-learning paradigm for supporting hands-on education using laboratory equipment at distance. The current trend is to enable remote experimentation in mobile and ubiquitous learning. In such a context, the remote experimentation software should enable effective telemonitoring and teleoperation, no matter the kind of device used to access the equipment. It should also be sufficiently lenient so as to handle the rapidly evolving wireless and mobile communication environment. While the current Internet bandwidth allows remote experimentation to work flawlessly on fixed connections such as LANs, mobile users suffer from both the versatile nature of wireless communications and the limitation of the mobile devices. These conditions impose that the remote experimentation software should integrate adaptation features. For effective ubiquitous remote experimentation, it should ideally be guaranteed that the information representing the state of the remote equipment is rendered (to the end user) at the same pace at which it has been acquired, yet possibly at the cost of a somewhat minimal time delay between the acquisition and rendering phases. In this respect, an end-to-end adaptation scheme is proposed that explicitly handles the inherent variability of the connection and the versatility of the mobile devices considered in ubiquitous remote experimentation. Instead of relying on a stochastic approach, the proposed adaptation scheme relies on a deterministic mass-balance equivalence model. The effectiveness of the proposed adaptation scheme is demonstrated in critical conditions corresponding to remote experimentation carried out using a PDA over a Bluetooth link.
Christophe SalzmannEmail:
  相似文献   

11.
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (OrBAC) model, it is possible to express such requirements using the notion of context. In OrBAC, each security rule (permission, prohibition, obligation or dispensation) only applies in a given context. A context is viewed as an extra condition that must be satisfied to activate a given security rule. In this paper, we present a taxonomy of different types of context and investigate the data the information system must manage in order to deal with these different contexts. We then explain how to model and evaluate them in the OrBAC model.
Nora Cuppens-BoulahiaEmail:
  相似文献   

12.
This paper addresses the emerging need for an integration of the cultural and social factors of metaphors into interface design, by creating cultural models within the context of indigenous users. Current theoretical and empirical work is reviewed that uses existing cultural models. Finally, an investigative strategic model is proposed for research in this field that incorporates all the important components of cultural contexts of metaphors in interface design.
A. Serengul Guven Smith-AtakanEmail: Phone: +44-208-4116747
  相似文献   

13.
A number of mobile applications have emerged that allow users to locate one another. However, people have expressed concerns about the privacy implications associated with this class of software, suggesting that broad adoption may only happen to the extent that these concerns are adequately addressed. In this article, we report on our work on PeopleFinder, an application that enables cell phone and laptop users to selectively share their locations with others (e.g. friends, family, and colleagues). The objective of our work has been to better understand people’s attitudes and behaviors towards privacy as they interact with such an application, and to explore technologies that empower users to more effectively and efficiently specify their privacy preferences (or “policies”). These technologies include user interfaces for specifying rules and auditing disclosures, as well as machine learning techniques to refine user policies based on their feedback. We present evaluations of these technologies in the context of one laboratory study and three field studies.
Norman Sadeh (Corresponding author)Email:
Jason HongEmail:
Lorrie CranorEmail:
Patrick KelleyEmail:
  相似文献   

14.
The European Union co-funded COMUNICAR (communication multimedia unit inside car) project designed and developed an integrated multimedia human–machine interface (HMI) able to manage a wide variety of driver information systems (from entertainment to safety). COMUNICAR proposed an innovative information provision paradigm, in which the on-vehicle HMI is able to tailor the delivery of the information in real time according to the actual driving context and the drivers workload. COMUNICAR adopted a user-centred design process involving an iterative development based on extensive user tests since the early phases of the project. This approach was particularly useful to define and improve the layout of the user interface and specify the rules that decide the scheduling and the modalities of the delivery of the information messages to the driver. This paper introduces the COMUNICAR concept and the user-centred flow of design. Then, a concrete case of user-test driven, iterative improvement of a systems functionality is presented. We also briefly describe two software tools that we have designed to enhance the development process in a user-centred perspective. Finally, the future evolution of the concept of smart and safe information scheduling is sketched and discussed.
F. BellottiEmail:
A. De GloriaEmail:
R. MontanariEmail:
D. MorrealeEmail:
  相似文献   

15.
Mobile communications beyond 3G will integrate different (but complementary) access technologies into a common platform to deliver value-added services and multimedia content in an optimum way. However, the numerous possible configurations of mobile networks complicated the dynamic deployment of mobile applications. Therefore, research is intensely seeking a service provisioning framework that is technology-independent, supports multiple wireless network technologies, and can interwork high-level service management tasks to network management operations. This paper presents an open value chain paradigm, a model for downloadable applications and a mediating platform for service provisioning in beyond 3G mobile settings. Furthermore, we introduce mechanisms that support a coupled interaction between service deployment and network configuration operations, focusing on the dynamic provisioning of QoS state to data path devices according to the requirements of dynamically downloadable mobile value-added services (VAS).
Vangelis GazisEmail:
  相似文献   

16.
In the last few years, intelligent secured multimedia services play a vital role along with ubiquitous home environment (Park et al. in Lecture Notes in Computer Science, vol. 4097, pp. 660–670, [2006]; Lecture Notes in Computer Science, vol. 4159, pp. 893–901, [2006]; IEICE Trans. Inf. Syst. E89-D(12):2831–2837, [2006]; Lecture Notes in Artificial Intelligence, vol. 4252, pp. 777–784, [2006]; Lecture Notes in Artificial Intelligence, vol. 3801, pp. 313–320, [2005]). There are certain constrains and limitations in providing effective and efficient services in U-home. The mechanism and applications are integrated to realize such services. Three different kinds of ubiquitous multimedia services are proposed in the framework. Based on the temporal and spatial context information, the surrounding situations are recognized. The contexts are collected and well analyzed with the preconditions to provide the final services. The proposed framework provides efficient services in the multimedia based deices based on the current context information.
Laurence T. YangEmail:
  相似文献   

17.
Social awareness applications are based on the idea of a group sharing real-time context information via personal and ubiquitous terminals. Studies of such applications have shown that users are not only concerned with the preservation privacy through non-disclosure. Instead, disclosure is manipulated for the constant presentation of self to the group in everyday social situations. Basing on 3 years of research with the mobile social awareness system ContextContacts, established findings in social psychology and ubiquitous computing, we propose a number of design principles to support users in this management of privacy and presentation. These principles are to apply even if disclosure is automated, and include support for lightweight permissions, assuming reciprocity, appearing differently to different audiences, providing for feedback on presentation and allowing lying. These principles are applied in interaction design and protocol engineering for the next version of a mobile awareness system called ContextContacts.
Antti OulasvirtaEmail: Email:
  相似文献   

18.
Information services play a crucial role in grid environments in that the state information can be used to facilitate the discovery of resources and the services available to meet user requirements, and also to help tune the performance of a grid system. However, the large size and dynamic nature of the grid brings forth a number of challenges for information services. This paper presents PIndex, a grouped peer-to-peer network that can be used for scalable grid information services. PIndex builds on Globus MDS4, but introduces peer groups to dynamically split the large grid information search space into many small sections to enhance its scalability and resilience. PIndex is subsequently modeled with Colored Petri Nets for performance evaluation. The simulation results show that PIndex is scalable and resilient in dealing with a large number of peer nodes.
Nick AntonopoulosEmail:
  相似文献   

19.
Using trust assumptions with security requirements   总被引:1,自引:1,他引:0  
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, whether implicit or explicit, affect the scope of the analysis, derivation of security requirements, and in some cases how functionality is realized. This paper presents trust assumptions in the context of analysis of security requirements. A running example shows how trust assumptions can be used by a requirements engineer to help define and limit the scope of analysis and to document the decisions made during the process. The paper concludes with a case study examining the impact of trust assumptions on software that uses the secure electronic transaction specification.
Charles B. Haley (Corresponding author)Email:
Robin C. LaneyEmail:
Jonathan D. MoffettEmail:
Bashar NuseibehEmail:
  相似文献   

20.
The present work proposes a methodological approach for modeling adaptation decisions and for solving the problem of integrating existing as well as acquired knowledge in the decision module of an adaptive interface. So far, most applications do not exploit in full the value of data originating from user models or knowledge acquisition engines that monitor the user and the context. The proposed decision theoretic model is represented through specifically structured influence diagrams. It provides to designers and developers a specific method to encode user and context information, as well as other crucial decision factors, to be subsequently used in the decision making process regarding user interface adaptation actions. Such a process is driven by the definition of relevant utilities referring to the design of a user interface. The proposed model guides designers and developers of an adaptive or intelligent interface to integrate, without conflicts and incoherence, design strategies, design goals, user goals, alternative constituents, user profile, context and application domain knowledge. An illustrative example of the analyzed modeling method is presented.
Vasilios ZarikasEmail:
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号