The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we present an exploratory smartphone usage study with logs collected from users in the wild, combined with the sociodemographic, technological and cultural information provided by them. We observe a high diversity among users' most used applications, but by classifying applications into services we find significant correlations between service usage and socio-demographic profile. We...
In the service oriented, customer experience centric and customer changing demand driven market environment, ICT is becoming the leading enabler and partner of the modern enterprise business. More and more companies are transformed into more or pure digital style and virtual organized enterprises that are enabled and supported by a group of business oriented and microservice based applications and...
This paper addresses learning analytics for evaluation of learners performance in remote laboratories. The objectives we identified to provide self-and social awareness while learners are practicing in their virtual learning environment are threefold: (1) the definition of a performance metric that requires no assessment tests, (2) the tracking of data to infer that metric in real time, and (3) the...
We cast the classic problem of achieving k-anonymity for a given database as a problem in algebraic topology. Using techniques from this field of mathematics, we propose a framework for k-anonymity that brings new insights and algorithms to anonymize a database. We focus on the simpler case when the data lies in a metric space which is instrumental in introducing the main ideas and notation. Specifically,...
Embedded and invisible computing resources are paving the way to a new paradigm known as ubiquitous computing. In this paradigm, more attention needs to be paid to the development of context aware applications. Several proposals for the development of these applications are based on a context awareness loop with four phases. First, monitoring context information (Collect). Second, analyzing the collected...
Profiling the daily activity of a physically disabled person in the community would enable healthcare professionals to monitor the type, quantity, and quality of their patients’ compliance with recommendations for exercise, fitness, and practice of skilled movements, as well as enable feedback about performance in real-world situations. Based on our early research in in-community activity profiling,...
Users who retrieve information across disadvantaged networks need to do so in such a way as to minimize network performance impact while maximizing the usefulness and quality of information (QOI) received. Taking advantage of features from all three network genres (telecommunication, information, and social) will enable this balancing act. These users also need to interact using unstructured, ad-hoc...
A Network of Teams (NoT) is a set of overlapping teams working toward a common goal. NoTs arise in several contexts such as large software projects, sensors cooperating for target tracking, and terrorist cell networks. Modeling a NoT as a simplicial complex, we consider the problem of quantifying the strength of a NoT using metrics based purely on its structure. While the design of a metric clearly...
In recent years Context Management Systems have been increasingly adopted for processing sensory information in different fields of applications, such as surveillance of construction areas, coordination of emergencies and production monitoring. While system architectures have been designed for specific domains, literature informs only little about evaluation criteria for Context Management-Architectures...
In estimation of parameters residing in a smooth manifold from sensor data, the Fisher information induces a Riemannian metric on the parameter manifold. If the collection of sensors is reconfigured, this metric changes. In this way, sensor configurations are identified with Riemannian metrics on the parameter manifold. The collection of all Riemannian metrics on a manifold forms a (weak) Riemannian...
This work studies the feasibility of using visual information to automatically measure the engagement level of TV viewers. Previous studies usually utilize expensive and invasive devices (e.g., eye trackers or physiological sensors) in controlled settings. Our work differs by only using an RGB video camera in a naturalistic setting, where viewers move freely and respond naturally and spontaneously...
The enrichment of Computer Supported Collaborative (CSCL) Systems with emotion awareness features (detect emotion patterns and respond effectively) opens a window to the future of learner-to-computer interaction. In the current paper we present a system's design that attempts to evaluate the learner's affective state while he/she is taking part into collaborative tasks, in three different time-points:...
The emergence of large scale, distributed, sensor-enabled, machine-to-machine pervasive applications necessitates engaging with providers of information on demand to collect the information, of varying quality levels, to be used to infer about the state of the world and decide actions in response. In these highly fluid operational environments, involving information providers and consumers of various...
Efficient collaboration and task management is challenging in distributed, dynamically-formed organizations such as ad hoc disaster response teams. Ineffective collaboration may result in poor performance and loss of life. In this paper, we present Overseer, an open multi-agent system that leverages context information in a mobile setting to facilitate collaboration and task allocation. We describe...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.