The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper recognizes the relevance of self-tracking as a growing trend within the general public. As this develops further, pervasive computing has an opportunity to embrace user-feedback from this broader user group than the previously emphasized ‘quantified self:ers’. To this end, the paper takes an empirically driven approach to understand engagement issues by reviewing three popular self-tracking...
Pervasive computing envisions environments where computers are blended into everyday objects in order to provide added-value services to people. Already today, there is a growing number of advanced embedded systems around us, extended with computing and communication capabilities. However, pervasive applications raise major challenges in term of software engineering and remain hard to develop, deploy,...
Pervasive applications raise major challenges in term of software engineering and remain hard to develop, deploy, execute and maintain. Context-awareness, in particular, is a salient and difficult property that must be met by pervasive applications. We have developed a service-based approach facilitating the design and execution of a context module on top of iPOJO/iCasa, our pervasive platform. This...
Mocking is a standard technique in software testing; its main goal is to mimic the real object behavior in a controllable way. Recently, mocking techniques have been used in mobile environments to increase the user privacy and their goal is to allow users to select the kind of information they want to pass to the application (if real or randomly generated). This work presents MockingBird, a novel...
Pervasive systems present stringent requirements that make software deployment especially challenging. The unknown and fluctuating environment in which pervasive applications are executed discards traditional approaches. As a result, there is an increasing need for a reproducible and dynamic deployment process. In last years, we developed several industrial pervasive platforms and applications. Based...
Pervasive computing systems raise unprecedented challenges to citizen privacy. They fundamentally skew the relationship between our public and private selves, conflating the two in ever-changing and unanticipated ways. Within this context, the act of consenting is a critical mechanism of empowerment, allowing us to protect those aspects of our lives we wish to retain as private. Whilst designers of...
The aim of pervasive system technology is to support the user in managing and interacting with devices in the environment around him/her. By contrast social networking systems are aimed at supporting communication and interactions between people. The major objective of the SOCIETIES project is to unite these two technologies in a seamless manner to create a platform that enables the user to interact...
This position paper introduces and discusses Social Object Labels, small pervasive displays for ubiquitous social object annotation. Taking an HCI perspective, it relates user experience problems with ubiquitous annotation described in the literature to a lack of dynamic information available to users and argues that small pervasive displays can address these problems by providing dynamic situated...
A smartphone is a personal device and as such usually hosts multiple public user identities such as a phone number, email address, and Facebook account. As each smartphone has a unique Bluetooth MAC address, Bluetooth discovery can be used in combination with the user registration to a server with a Facebook account. This makes it possible to identify a nearby smartphone related to a given Facebook...
In this demonstration, we present an integrated environment for the development, test and execution of pervasive applications in the home context. This environment is based on the iPOJO component model and a connected home simulator that has been developed in the context of the pervasive health domain. The investigated service, actimetrics, is based on measurement and analysis of motor activities...
Pervasive applications, like smart living, geriatrics care, agricultural development, etc, are rapidly developed recently. Situation-awareness and workflow-centric are important characteristics of the applications. Service-oriented architecture which provides flexibility in integrating heterogeneous devices and communication networks might improve the execution of pervasive applications. To integrate...
The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So run time trustworthiness calculation would be a major issue in these environments. The huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors...
This paper argues the need for lightweight decentralized self-managing frameworks and protocols to achieve the full potential from Pervasive Networks. Pervasive Networks by nature consist of devices that are computationally simple, typically utilize wireless comms and are not tethered to wired power sources. As such they would highly benefit from cooperative self-management to make the most of their...
The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So trust and privacy would be a major issue in these environments. The huge number of interactions between users and pervasive devices necessitate a comprehensive trust and privacy models which unifies different technologies to...
As the most important component of pervasive computing, context-aware system gets more and more attention from the researchers. One of the basic technologies used to implement the contexts' description and reasoning in context-aware systems is ontology which has the big advantage at knowledge presenting and sharing. However, the shortage of the existent methods with ontology is obvious that most of...
The increasing popularity of personal wireless devices has raised new demands for the efficient discovery of heterogeneous devices and services in pervasive environments. The existing syntactic level service matching mechanisms such as Jini, UPnP, etc., are limited to syntactic comparisons based on attributes or interfaces. In order to overcome the limitations in these approaches, there has been an...
This paper builds on the authors' work on security challenges in the more general pervasive domain and considers what demands the adaptive paradigm will make of the information assurance community, and conversely, what information-assurance concerns should inform the realisation of pervasive adaptation. We propose a set of concepts which would enable these concerns to be addressed should they be adopted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.