The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper reports a mobile application pre-launch scheme thatis based on user’s emotion. Smartphone application’s usage andsmartwatch’s internal sensors are exploited to predict user’s intension.User’s emotion can be extracted from the PPG sensor inthe smartwatch. In this paper, we extend previous App pre-launchservice with user’s emotion data. Applying machine learning algorithmto the training data,...
Mobile devices are ubiquitous but their resources are limited. However, they must be capable to run computationally intensive software, for example for image stitching, face recognition, and simulation-based artificial intelligence. As a solution, mobile devices can use nearby resources to offload computation. Distributed computing environments provide such features but ignore the nature of mobile...
Bug prediction allows developers to focus testing eorts onspecic areas of software systems. While this topic has beenextensively studied for traditional applications, investiga-tions on mobile apps are still missing. In this paper wepreliminarily study the eectiveness of a previously denedJust-In-Time bug prediction model applied onve mobileapps. Key results indicate the poor performance of the modeland...
In this work, we report a study carried out to identify a set of metrics to early estimate the development effort of mobile apps. The applied methodology was inspired by the work of Mendes et al. who addressed a similar problem in the field of web apps. In particular, we extracted an initial set of metrics by analyzing the online quotes forms that companies made available on their websites. Afterward,...
Keeping pace with the market requires software to be shipped quickly, in rapid release cycles with a strong feedback loop. Managing and controlling these changes become complex, especially in the mobile world. In mobile applications, unlike in the Web world, the user chooses whether to download updates or to ignore them, and rollbacks are typically not an option. This paper describes a centralized...
Mobile app testing is challenging since each test needs to be executed in a variety of operating contexts including heterogeneous devices, various wireless networks, and different locations. Crowdsourcing enables a mobile app testing to be distributed as a crowdsourced task to leverage the crowd in a community. However, a high test quality and expected test context coverage are difficult to achieve...
Current requirements elicitation techniques do not deal with an essential part of context awareness: comprehension of the relationships among the numerous contextual elements of a certain domain and how they can positively influence the user task. As a result, solution providers continuously miss the opportunity to delight users by identifying contextual behaviors that will lead to better recommendations...
Information and Communication Technology (ICT) is one of the key enablers for including underserved communities in economic and societal development across the world. Our research analyzes several banking service projects developing technical solutions for rural India. This poster presents an experience report based on systematic debriefing of involved project leaders and initiators, triangulated...
Software-intensive systems have become increasingly ubiquitous, large, and complex, with dissemination in several application domains and tightly dependent upon different technologies. Such systems are usually centered in a software platform so that increasing attention has been paid to influence and interdependency in relationships among all the involved players, forming software ecosystems (SECO)...
This paper introduces a list of guidelines for designing mobile location-based learning services with respect to cultural heritage sites. This list was set out based on the results of a user-study in the field. The user study was carried out with adult end-users to evaluate a prototype mobile application that delivered information through mobile phones and smart eye glasses simultaneously regarding...
Developing applications with intelligent context access capabilities is challenged by the difficulty of obtaining advanced context information. The complexity of the logic required for processing context information adds another barrier for developing advanced context-aware applications. In this research paper, we propose a solution that allows context information sharing and extension toward the...
The development of Fog Computing technology is crucial to address the challenges to come with the mass adoption of Internet Of Things technology, where the generation of data tends to grow at an unprecedented pace. The technology brings computing power to the surrounds of devices, to offer local processing, filtering, storage and analysis of data and control over actuators. Orchestration is a requirement...
It is not uncommon today that sensor devices connected to the Internet solely send their data to Cloud-based servers for storage and processing. This does not only mean clients requesting data have to contact the Cloud-based service, even if the data is available in the local network, but also that data is sent to external services with unknown or ambiguous privacy policies. The great potential in...
This paper introduces a model to represent the information systems using a tactical service-oriented infrastructure (TSI) together with the orchestrations of core services providing the reactive/proactive connectivity mechanisms within TSIs in/out chains. The model was instantiated with services realizing an algorithm behaving differently under stable or unstable network conditions. A quantitative...
Current smartphone operating systems regulate application permissions by prompting users on an ask-on-first-use basis. Prior research has shown that this method is ineffective because it fails to account for context: the circumstances under which an application first requests access to data may be vastly different than the circumstances under which it subsequently requests access. We performed a longitudinal...
There has been a recent rapid increase in the number of Internet of Things (IoT) devices, providing a wide range of services for smart homes such as surveillance cameras, smart lighting, and door locks that can be remotely accessed and controlled. User mobility makes static security mechanisms, such as usernames and passwords, tedious to use. In this paper, we introduce a context-aware authentication...
New pedagogical methods delivered through mobile mixed reality (via a user-supplied mobile phone incorporating 3d printing and augmented reality) are becoming possible in distance education, shifting pedagogy from 2D images, words and videos to interactive simulations and immersive mobile skill training environments. This paper presents insights from the implementation and testing of a mobile mixed...
In this paper we envision and discuss the idea of the Web of Augmented Things (WoAT). The idea is about the integration of Web of Things with Augmented Worlds, i.e. distributed software systems augmenting the physical space with virtual entities and holograms in an Augmented Reality perspective, eventually coupled with smart things that are part of the same environment.
Despite the growth and commercial potential of instant messaging service, little is known about what factors create users' satisfaction with a particular service application. In this context, the major contribution is to examine the sources of users' satisfaction with WeChat official account. For this purpose, combining Information System Success theory, Theory of Reasoned Action and Technology Acceptance...
With the expansion of mobile computing and mobile data services, the number, type, and application of location-based services will continue to expand rapidly in the coming years. These apps have attracted the interest of users from different fields, such as gaming, mobile commerce, navigation systems, emergency services, and various tracking systems. As these apps use large volumes of location data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.