The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Context-aware applications adapt their behavior based on collected contexts. However, contexts can be inaccurate due to sensing noise, which might cause applications to misbehave. One promising approach is to check contexts against consistency constraints at runtime, so as to detect context inconsistencies for applications and resolve them in time. The checking is typically immediate upon each collected...
This paper reports a mobile application pre-launch scheme thatis based on user’s emotion. Smartphone application’s usage andsmartwatch’s internal sensors are exploited to predict user’s intension.User’s emotion can be extracted from the PPG sensor inthe smartwatch. In this paper, we extend previous App pre-launchservice with user’s emotion data. Applying machine learning algorithmto the training data,...
Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence,...
Since Apple introduced the iBeacons in Worldwide Developers Conference (WWDC) 2013, the iBeacon has been rapidly accepted and generalized in the market. For the deployed iBeacons, it is necessary to monitor their status. In this paper, we design a crowd sensing based monitoring framework which combines the moving and static schemas of participants to monitor the real status of iBeacons. In such a...
Aiming to keep under control a particular system or environment or to ensure that it works as expected there is a need to know what-when-why happens there. Various conditions and environmental factors can lead to errors, unexpected behavior or loss of control. To pursue these factors manually is time consuming, error prone, slow and usually quite expensive. Monitoring is quite complex and challenging...
In this paper, we introduce the idea of exploiting the emotional information as a key element in providing personalized context-aware software services and consequently enhancing quality of User Experience(UX). We argue that emotional measurements can be integrated in Quality of Service (QoS) assurance frameworks. The idea builds on the strength of technological advances in emotion measurement tools,...
Billions of Machine Type Communication (MTC) devices are foreseen to be deployed in next ten years and therefore potentially open a new market for next generation wireless network. However, MTC applications have different characteristics and requirements compared with the services provided by legacy cellular networks. For instance, an MTC device sporadically requires to transmit a small data packet...
Nowadays, we can talk about the Internet of Things (IoT) and Cloud computing union to indicate a new generation of distributed system. An IoT-Cloud system mainly consists of a set of smart objects which are interconnected through the Internet with a remote Cloud infrastructure, platform, or software. It allows to achieve new benefits in several contexts, such as smart cities and industrial businesses...
In artificial intelligence, many tasks of speech recognition, video analysis, and language processing involve temporal processing where the outputs depend on not only spatial contents of the current sensory input frame, but also the relevant context in the attended past. It is illusive how brains use temporal contexts. Many computer methods, such as Hidden Markov chains and recurrent neural networks,...
Energy Efficiency is becoming a world-wide concern and attracting increasing interest in both industry and academia. A smart building is at the cornerstone of energy-efficiency as it represents the main constituent in a smart micro-grid. To promote energy-efficiency in buildings, an Energy Management System (EMSs) that controls HVAC appliances is indispensable. Based on the Plan-Do- Check-Act (PDCA)...
The aim of this paper is to propose a robust, accurate and portable system for human body motion measurement. The system includes Inertial Measurement Units (IMU) and a Kinect or vision sensors. Since Kinect sampling rate is low (30 Hz per second) and it suffers from occlusion, it cannot individually measure human body motion accurately and robustly. On the other hand, IMU does not suffer from these...
This paper takes a view on the Quality-of-Experience (QoE) perspective of Cyber-Physical System (CpS) applications involving users. We provide an overview of characteristics of CPS applications, their relation to QoE and implications for assessing QoE of such systems. Furthermore, we incorporate eudaimonic aspects such as meaningfulness and personal growth that need to be considered in order to grasp...
The advent of the Internet of Things (IoT), with modern sensors and sensor-based devices, will significantly stimulate the development of context-aware applications. An effective means to extract higher-level contextual information from sensor data is distributed complex event processing (CEP), which facilitates the analysis of real-time data streams coming from heterogeneous and distributed sources...
As a novel concept, "Informed Design" is being practiced in the Future Cities Laboratory at the Singapore-ETH Centre to innovate place design from empirical to evidential by harnessing geo-referenced "Big Data" for a responsive design. Initially, potentials of people sensing data derived from multi-sources, such as social networks, dedicated applications, sensors, etc., shall be...
ith the wide deployment of various kinds of sensors in fixed infrastructures and in mobile devices, technologies and applications of crowd-sensing has drawn attentions in the fields of mobile computing. This paper studies the design of frameworks for crowd-sensing process in a distributed environment. We discuss the realization of the compatibilities of devices and services, as well as the algorithms...
The Internet of Things (IoT) has brought increased sensing, monitoring and actuation capabilities to several domains including residential buildings. Residential energy management methods can leverage these capabilities and devise smarter solutions. This requires processing and reasoning data constantly generated by various IoT devices. In this paper, we use a hierarchical system model for IoT-based...
This paper discusses the design and development efforts made to collect data using an opportunistic crowdsensing mobile application. Relevant issues are underlined, and solutions proposed within the CHIST-ERA Macaco project for the specifics of collecting fine-grained content and context data are highlighted. Global statistics on the data gathered for over a year of collection show its quality: Macaco...
Pedestrians globally comprise 22 % of all road traffic deaths in 2013. Various approaches for reducing accident numbers have already been introduced and are still being researched. Most of these approaches have specific limitations, like requiring line of sight. To overcome these limitations, we propose the Wireless Seat Belt (WSB), a smartphone-based collision avoidance system for pedestrians. Unlike...
This paper presents a method of using wearable accelerometers and microphones to detect instances of ad-hoc physical collaborations between members of a group. 4 people are instructed to construct a large video wall and must cooperate to complete the task. The task is loosely structured with minimal outside assistance to better reflect the ad-hoc nature of many real world construction scenarios. Audio...
Pervasive applications evolve around the user's context, making it a full-fledged communication party. However, no equivalent approach to End-to-End communication exists that allows a sender to bind data, through encryption, to a target context. Existing solutions require central infrastructures or only apply to the immediate context, restricting pervasive applications. We propose Encryption to Trusted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.