The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper reports a mobile application pre-launch scheme thatis based on user’s emotion. Smartphone application’s usage andsmartwatch’s internal sensors are exploited to predict user’s intension.User’s emotion can be extracted from the PPG sensor inthe smartwatch. In this paper, we extend previous App pre-launchservice with user’s emotion data. Applying machine learning algorithmto the training data,...
Mobile devices are ubiquitous but their resources are limited. However, they must be capable to run computationally intensive software, for example for image stitching, face recognition, and simulation-based artificial intelligence. As a solution, mobile devices can use nearby resources to offload computation. Distributed computing environments provide such features but ignore the nature of mobile...
Web services bring more conveniences for users and developers. However, it makes user face the problem of service information explosion. The personalized service recommendation solves the problem. This paper proposes a method to predicting the system reliability which bases on user context information in mobile computing environment. The method construct user behavior model by formatting user location...
Since Apple introduced the iBeacons in Worldwide Developers Conference (WWDC) 2013, the iBeacon has been rapidly accepted and generalized in the market. For the deployed iBeacons, it is necessary to monitor their status. In this paper, we design a crowd sensing based monitoring framework which combines the moving and static schemas of participants to monitor the real status of iBeacons. In such a...
Due to the popularity of context-aware computingand the rapid growth of the smart phone devices, modeling anindividual's phone call response behavior may assist them intheir daily activities for managing call interruptions. A key stepof such modeling is to discovering call response behavioral rulesbased on multi-dimensional contexts related to individual'sbehavior. Currently, researchers use classification...
Information and Communication Technology (ICT) is one of the key enablers for including underserved communities in economic and societal development across the world. Our research analyzes several banking service projects developing technical solutions for rural India. This poster presents an experience report based on systematic debriefing of involved project leaders and initiators, triangulated...
This paper introduces a list of guidelines for designing mobile location-based learning services with respect to cultural heritage sites. This list was set out based on the results of a user-study in the field. The user study was carried out with adult end-users to evaluate a prototype mobile application that delivered information through mobile phones and smart eye glasses simultaneously regarding...
In smart factories and smart homes, devices such as smart sensors are connected to the Internet. Independent of the context in which such a smart sensor is deployed, the possibility to change its configuration parameters in a secure way is essential. Existing solutions do provide only minimal security or do not allow to transfer arbitrary configuration data. In this paper, we present an NFC- and QR-code...
Nowadays, more and more people possess mobile devices (laptops, tablets, smart-phones, etc), capable of creating and sharing documents (which generally are multimedia oriented) via internet anytime and anywhere (home, office, hospital, etc). People should have full control on how they receive a multimedia content, depending on their current condition: when in a meeting, displaying a text instead of...
With the expansion of mobile computing and mobile data services, the number, type, and application of location-based services will continue to expand rapidly in the coming years. These apps have attracted the interest of users from different fields, such as gaming, mobile commerce, navigation systems, emergency services, and various tracking systems. As these apps use large volumes of location data...
ith the wide deployment of various kinds of sensors in fixed infrastructures and in mobile devices, technologies and applications of crowd-sensing has drawn attentions in the fields of mobile computing. This paper studies the design of frameworks for crowd-sensing process in a distributed environment. We discuss the realization of the compatibilities of devices and services, as well as the algorithms...
One of the aspects brought by the use of connected mobile devices in education is the possibility of learning in different environments, using physical environmental factors in its advantage. These factors are part of what we define as “mobile context”, which is comprised by different information dimensions: temporal, physical, and social. This information can be modelled as an ontology and used in...
Pervasive applications evolve around the user's context, making it a full-fledged communication party. However, no equivalent approach to End-to-End communication exists that allows a sender to bind data, through encryption, to a target context. Existing solutions require central infrastructures or only apply to the immediate context, restricting pervasive applications. We propose Encryption to Trusted...
Mobile app testing and evaluation requires exposing the app to a wide array of real world context conditions viz. location, sensor values, network conditions etc. Such comprehensive context conditions are difficult to create in a development environment on a real device, therefore, simulating them in a mobile emulator is a promising alternative. We present ContextMonkey, a framework for context generation...
With the rise of smart mobile devices, context-aware mobile applications became an integral part of our everyday life. However, testing, evaluating or demonstrating context-aware mobile applications for outdoor environments remains a resource-intensive and cumbersome task. The investigations need to be conducted in real-world experiments in order to gain proper insights into how well an application...
The human daily and the professional life demand a high amount of communication ability, but every fourth adult above 50 is hearing-impaired, a fraction that steadily in- creases in an aging society. For an autonomous, self-condent and long productive life, a good speech understanding in ev- eryday life situations is necessary to reduce the listening ef- fort. For this purpose, a mobile app-based...
Absence of the user based recommendation system is a prevalent problem in a social network. In this paper, our work tends to model distance based group and probability based group in terms deciding recommendation dynamics. Here, we want to identify the best user who appears to be the innocent audience. In this regard, the effect of network density and preference homogeneity according to the user have...
In human history, the dependency on secret phrases - passwords - known to only a selected few in a group has mostly ensured that only those are authorised to access certain resources or information. However, such passwords have also spelled disasters when compromised. Beyond passwords, multi-factor authentication requires the knowledge of or the possession of things other than a password to complete...
An extension to the design domain of problem frames has been proposed. The proposed extension is intended to cope with the inclusion of lexical design domains that have physical counterparts with the equivalent information. An example of the use of such a physical counterpart is illustrated with a spot service application in patient monitoring.
The popularity of mobile devices and the opportunity to learn regardless of time and place make mobile learning an important method in lifelong learning. However, acceptance of mobile learning by learners is crucial to the success of mobile learning. The objective of this study is to investigate main determinants of mobile learning acceptance in higher education in China. Based on the unified theory...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.