The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Currently recommender systems are incorporating context and social information of the user, producing context aware recommender systems. In the future, they will use implicit, local and personal information of the user from the Internet of Things, where anyone and anything will be connected at anytime and anywhere. Most recommender systems follow a request-response approach in which the recommendations...
Many IT workers suffer from stress in doing their work and there are a few counselors to help them. To cope with this, a context respectful counseling agent (CRECA) is proposed. This agent extracts emotional words from clients' utterances throughout their dialogue to detect emotion changes and provides clients such changes as a dialogue summary. If no change is detected, it replies with paraphrases...
By increasing the use of autonomous rescue robots in search and rescue (SAR), the chance of interaction between rescue robots and human victims also grows. More specifically, when autonomous rescue robots are considered in SAR, it is important for robots to handle sensitively human victims' emotions. Deception can potentially be used effectively by robots to control human victims' fear and shock as...
The interaction between elderly's body states and their surrounding environment is important in many conditions. Biological data and activity data in elderly's daily life using wearable body sensor can be monitored and then can be adjusted with environment to gain the comfort condition. Seamless integration home care which is embedded with pervasive devices and awaring of the context can help residents...
This paper presents a dialog system for the user in interacting with a smart home system. Instead of using just a voice control for appliances, a dialog system gives the user a more natural way of communication with the smart home. The dialog system can take different forms of instruction from the user and provides services to the user. The user can inquire the system about some information instead...
Providing accurate/suitable information on behaviors in smart environments is a challenging and crucial task in pervasive computing where context-awareness and pro-activity are of fundamental importance. Behavioral identifications enable to abstract higher-level concepts that are interesting to applications. This work proposes the unified logical-based framework to recognize and analyze behavioral...
Open multi-agent systems are those in which the agents can enter or leave the system freely and entities with unknown intentions can occupy the environment. In these systems, trust and reputation mechanisms are used to choose partners in order to delegate tasks. Most of the trust and reputation models proposed in the literature take into account their functional aspects, but not how they affect the...
Pattern of Life (POL) analysis constitutes a subset of Activity-based Intelligence (ABI) — understanding those complex spatiotemporal contexts within which entities (e.g., cancer cells, people, etc.) move about and interact, normally-but not always- with a type of recognizable regularity. POL analysis methods are particularly important when attempting to detect and track complex behaviors in stochastic...
In modern military operations the emphasis is on smaller teams and more ad hoc teamwork. This requires greater agility both in terms of capturing actionable intelligence as well as appropriate dissemination and fusion of that information to coalition team members based on their tasks and need to know. In previous research and development we have explored the potential for a controlled natural language...
This paper presents a solution for implementing context-based self-adaptive sensor fusion systems. The adaptation process works over an ontology-based description of the problem space that includes sensors and other information sources, a repository of algorithms, and data types managed by the fusion system. An automatic reasoning module integrates this description with contextual information of the...
In everyday life as well as in the asymmetric warfare domain, to achieve the intended goals, agents often don't exploit the designed and purpose-built tools but some other tools whose features simply fit for the purpose. Starting from the well established ideas carried out to build ontologies of functional concepts of artifacts, we propose to extend such ontologies with explicit recordings of physical...
We are combining symbolic and geometric planning to synthesize human-aware plans in order to deal with the complex and highly intricate planning problems induced by Human-Robot collaborative object manipulation. In this paper, we summarize our previous contributions - refining symbolic actions at geometric level, during the symbolic planning, in order to assess their feasibility and computing the...
Algebraic specification is well-known in specifyingabstract data types. It could also play an important role inverifying the interrelation between methods in classes. In thispaper we develop a framework for verifying the conformanceof method implementations against an algebraic specification. Different from most existing work that perform testing atthe code level for the conformance, our approach...
In the last years a new computing paradigm called Internet of Things (IoT) has been gaining more attention. This paradigm has become popular by embedding mobile network and processing capability into a wide range of physical computing devices used in everyday life of many people. An important part that composes the IoT is the middleware, which is a system that abstracts the management of physical...
The construction of a theory for binary trees is presented, based on the systematic exploration of the properties necessary for the proof-based synthesis and certification of sorting algorithms for binary trees. The process is computer supported, being realised in the frame of the Theorema system, with some additional proofs in Coq required for algorithm certification. The result of the exploration...
An electronic marketplace (e-marketplace) is a common business information space populated with many entities of different system types. Each of them has its own context of how to build and process documents. This leads to heterogeneous e-marketplace documents in terms of syntax and semantics, which are difficult to make interoperation and inference from one entity to another. This paper proposes...
This paper complements our previous work on formal modeling of resource-bounded context-aware systems, which handle inconsistent context information using defeasible reasoning, by focusing on automated analysis and verification. A case study demonstrates how model checking techniques can be used to formally analyze quantitative and qualitative properties of a context-aware system based on message...
The paper considers the challenge of deductively verifying Linux kernel code written in C programming language with extensive use of low-level memory operations and interactions with the highly concurrent environment. The paper presents an initial approach to specification and verification of concurrent code working with shared data by proving the code's compliance with specified synchronization discipline...
The next generation of ambient assisted living services will be based on eco-systems or organizations of intelligent artificial agents embodied in companion robots and smart objects. To provide, anywhere and anytime, smart assistance services to people, these agents need to be endowed with advanced knowledge representation, reasoning and communication capabilities. In this paper, we propose a distributed...
We adapt the 'mosaics' technique of Reynolds 1997 (in turn an adaption of Németi 1986) achieving decidability for the (non local) Ockhamist logic of (upward endless) bundled trees. We produce a double exponential time procedure, thus improving the complexity upper bound of the problem - so far relying on the non elementary procedure of the Rabin's Theorem (Burgess 1979).
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.