The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smartphones are powerful mobile devices in terms of processing speed and data traffic. These devices assist users in everyday tasks and are highly personalized. To provide good use experience and low energy consumption, it is important that it behaves according to the users' current context. It is known that when a device is active, the screen is responsible for 16% of total power consumption. In...
As the vision of ubiquitous computing becomes reality, there is a possibility for user interfaces that follow the user through the physical world by jumping between local display devices. This paper presents previous attempts at this functionality and identifies their limitations. Justified by these limitations, we then present our novel method that uses new features of web-based technology. This...
Context-aware systems offer entirely new opportunities for application developers and for end users by gathering context data and adapting systems' behavior accordingly. In this paper, we propose a Context Aware ESB (CA-ESB) that will publish and discover services based on location context. The main modules of the framework consist of Context Provider (senses location context), Context Aware Logic...
Both ambient intelligence and wearable computing do need novel hardware and software, yet another enabling factor is middleware, which should be highly capable, flexible and efficient, allowing for the reuse of existing pervasive applications when developing new ones. In the considered application domain, middleware should also support quick runtime re-configuration of systems, interoperability among...
Eliciting requirements on-site is challenging as analysts have to simultaneously observe the environment, interact with people and operate RE tools. We have been exploring the use of context-aware technologies to provide better guidance and support for on-site analysts. Our context-aware Mobile Scenario Presenter tool guides analysts by automatically highlighting scenario events relevant to the currently...
Context is important situational details, yet poorly utilized in interactive computing. The fact is that it can have impact on the trust decision to make. Motivated by that, we discuss and formalize functions of dynamic trust computation model based on context-aware in P2P environments. We firstly present the definition of context-aware and trust, and then give the trust computation including directed...
Pervasive applications, like smart living, geriatrics care, agricultural development, etc, are rapidly developed recently. Situation-awareness and workflow-centric are important characteristics of the applications. Service-oriented architecture which provides flexibility in integrating heterogeneous devices and communication networks might improve the execution of pervasive applications. To integrate...
With the latest advances in information and communication technologies, learners can now engage in continuous and rich learning-sessions that characterize today's digital learning ecosystems. In these ecosystems, learning resources are pervasive and dynamic. A key challenge is to develop a scalable learning system that addresses the inherent complexity of learning sessions and cater for the specific...
The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So run time trustworthiness calculation would be a major issue in these environments. The huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors...
This paper argues the need for lightweight decentralized self-managing frameworks and protocols to achieve the full potential from Pervasive Networks. Pervasive Networks by nature consist of devices that are computationally simple, typically utilize wireless comms and are not tethered to wired power sources. As such they would highly benefit from cooperative self-management to make the most of their...
By utilizing various sorts of contextual data acquired from the users' devices, advance context-aware services and applications can be developed. But the current context management systems are based on server-client approach which hinders their widespread adoption in an ad-hoc network. In addition, performance issues introduced because of context dependency in a ubiquitous environment still need to...
With rapid progress on ubiquitous technologies, various services become available at anytime and anywhere. One of hot topics in ubiquitous computing is context-aware services, which provide the services at proper time and proper place, in a proper way personalized to a user. However, there may be conflicts of services among users whose contexts are overlapped. Moreover, a context-aware service convenient...
The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So trust and privacy would be a major issue in these environments. The huge number of interactions between users and pervasive devices necessitate a comprehensive trust and privacy models which unifies different technologies to...
One of the main challenges in context-aware systems is representing and reasoning about changes in context. In this paper, conceptual spaces provide basis for representing contexts and motion classes, defined for spatial reasoning, provide the tools necessary to reason about context evolution in conceptual spaces. The work also explores the consequences of integrating motion classes in conceptual...
As the most important component of pervasive computing, context-aware system gets more and more attention from the researchers. One of the basic technologies used to implement the contexts' description and reasoning in context-aware systems is ontology which has the big advantage at knowledge presenting and sharing. However, the shortage of the existent methods with ontology is obvious that most of...
The increasing popularity of personal wireless devices has raised new demands for the efficient discovery of heterogeneous devices and services in pervasive environments. The existing syntactic level service matching mechanisms such as Jini, UPnP, etc., are limited to syntactic comparisons based on attributes or interfaces. In order to overcome the limitations in these approaches, there has been an...
Dementia affects large number of elderly, manifested with memory impairment symptoms at the onset. This results in difficulties for elderly in scheduling and completing daily activities. In this respect a context-aware reminder system becomes an essential tool in helping elderly navigate their daily activities. Current work on reminder systems typically follows a set of pre-defined activities, organised...
Conflict Resolution in context-aware computing is getting more significant attention from researchers as ubiquitous computing environments take into account multiple users. For multi-user ubiquitous computing environments, conflicts among users' contexts need to be detected and resolved. For this, application developers or end-users specify conflicts situations, and the underlying ubiquitous computing...
In smart living spaces, a reliable context-aware application must adapt to the variable environment and should function to complete the user's requirements. Therefore, if a context-aware application is to achieve the user's requirements smoothly, it must understand the environment status according to trustworthy context information. However, the context information influenced by the environment status...
This paper builds on the authors' work on security challenges in the more general pervasive domain and considers what demands the adaptive paradigm will make of the information assurance community, and conversely, what information-assurance concerns should inform the realisation of pervasive adaptation. We propose a set of concepts which would enable these concerns to be addressed should they be adopted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.