Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2020
Using continuous sensor data to formalize a model of in-home activity patterns
Journal of Ambient Intelligence and Smart Environments (JAISE), Volume 12, Issue 3Pages 183–201https://doi.org/10.3233/AIS-200562Formal modeling and analysis of human behavior can properly advance disciplines ranging from psychology to economics. The ability to perform such modeling has been limited by a lack of ecologically-valid data collected regarding human daily activity. We ...
- research-articleSeptember 2017
SmartGuidance'17: 2nd workshop on intelligent personal support of human behavior
- Christian Meurisch,
- Usman Naeem,
- Philipp M. Scholl,
- Muhammad Awais Azam,
- Sebastian Günther,
- Paul Baumann,
- Shafiq ur Réhman,
- Max Mühlhäuser
UbiComp '17: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable ComputersPages 623–626https://doi.org/10.1145/3123024.3124457In today's fast-paced environment, humans are faced with various problems such as information overload, stress, health and social issues. So-called anticipatory systems promise to approach these issues through personal guidance or support within a user'...
- research-articleSeptember 2017
Reference model of next-generation digital personal assistant: integrating proactive behavior
UbiComp '17: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable ComputersPages 149–152https://doi.org/10.1145/3123024.3123145Digital personal assistants such as Apple's Siri or Google Assistant emerge and penetrate our everyday lives, acting as digital helper for searching information or executing simple tasks. However, with their primarily reactive behavior through ...
- research-articleSeptember 2016
Intelligent personal guidance of human behavior utilizing anticipatory models
UbiComp '16: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: AdjunctPages 441–445https://doi.org/10.1145/2968219.2971355In today's fast paced environment society is confronted with information overload, stress, or health issues [7]. These are generally caused by accelerating technological evolution, increasing time pressure, or physical inactivity. So-called anticipatory ...
- extended-abstractSeptember 2016
Smarticipation: intelligent personal guidance of human behavior utilizing anticipatory models
UbiComp '16: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: AdjunctPages 1227–1230https://doi.org/10.1145/2968219.2968436In today's fast paced environment, society is confronted with information overload, stress, and health issues. These are generally caused by accelerating technological evolution, increasing time pressure, and physical inactivity. So-called anticipatory ...
- research-articleSeptember 2014
Design and assessment of enabling environments for cooking activities
UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct PublicationPages 517–526https://doi.org/10.1145/2638728.2641329Assistive technologies can help cognitively impaired people in planning and memory tasks [1]. To provide efficient assistance, pervasive environments should be able to adapt assistance to the user's capacities, the activity to perform and the context. ...
- articleSeptember 2014
A trust model based on semantic distance for pervasive environments
Security and Communication Networks (SACN), Volume 7, Issue 9Pages 1322–1330https://doi.org/10.1002/sec.789To cope with the challenges existing in pervasive environments, based on the characteristics of pervasive environments, a semantic distance-based trust model is proposed in this paper. The semantic distance between entities and between trust categories ...
- research-articleApril 2013
Learning user preferences for adaptive pervasive environments: An incremental and temporal approach
ACM Transactions on Autonomous and Adaptive Systems (TAAS), Volume 8, Issue 1Article No.: 5, Pages 1–26https://doi.org/10.1145/2451248.2451253Personalization mechanisms often employ behavior monitoring and machine learning techniques to aid the user in the creation and management of a preference set that is used to drive the adaptation of environments and resources in line with individual ...
- ArticleMay 2012
Practical use of formal concept analysis in service-oriented computing
ICFCA'12: Proceedings of the 10th international conference on Formal Concept AnalysisPages 61–76https://doi.org/10.1007/978-3-642-29892-9_11Pervasive applications are encountered in a number of settings, including smart houses, intelligent buildings or connected plants. Service-Oriented Computing is today the technology of choice for implementing and exposing resources in such environments. ...
- tutorialMay 2011
Distributed user interfaces
CHI EA '11: CHI '11 Extended Abstracts on Human Factors in Computing SystemsPages 2429–2432https://doi.org/10.1145/1979742.1979576This document exposes the most relevant issues regarding the development of Distributed User Interfaces (DUIs) to present the specific features that are not covered by traditional development processes. A transversal approach to tackle these new aspects ...
- ArticleOctober 2009
Secured and Trusted Service Provision in Pervasive Environment
WIMOB '09: Proceedings of the 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and CommunicationsPages 400–405https://doi.org/10.1109/WiMob.2009.74Thanks to pervasive environment, users can remotely have access to various resources and services within their public or private living space. Consequently, several security and privacy issues are raised especially due to the wireless access used to get ...
- ArticleApril 2008
CoLeP: An Agent-Based Collaborative System for Pervasive Learning
ITNG '08: Proceedings of the Fifth International Conference on Information Technology: New GenerationsPages 1148–1149https://doi.org/10.1109/ITNG.2008.189Collaborative learning is one of the intense topics from electronic learning (e-learning) to pervasive learning (p-learning) based on the diverse technology. This study attempts to shift the paradigm from e-learning to p-learning by combining pervasive ...
- research-articleDecember 2007
Persona: a portable tool for augmenting proactive applications with multimodal personalization support
MUM '07: Proceedings of the 6th international conference on Mobile and ubiquitous multimediaPages 160–168https://doi.org/10.1145/1329469.1329491User centric personalization plays an important role for the adoption of proactive applications. However, stipulating system support to facilitate personalization features in proactive applications generically is still an open issue. In this paper we ...
- ArticleSeptember 2007
Tree graph views for a distributed pervasive environment
NBiS'07: Proceedings of the 1st international conference on Network-based information systemsPages 406–415The pervasive Internet and the massive deployment of sensor devices have lead to a huge heterogeneous distributed system connecting millions of data sources and customers together [Fra01]. On the one hand, mediation systems [BGL+99, DNJT05] using XML as ...
- ArticleMarch 2007
A lightweight indoor location model for sentient artefacts using sentient artefacts
SAC '07: Proceedings of the 2007 ACM symposium on Applied computingPages 1624–1631https://doi.org/10.1145/1244002.1244347Our approach towards context awareness is to use sensor augmented daily life objects surrounding us for extracting context information and for providing ambient services. Some of these artefacts are static in nature and have designated location, like a ...
- ArticleMay 2005
Authentification par la méfiance dans les systèmes pervasifs
UbiMob '05: Proceedings of the 2nd French-speaking conference on Mobility and ubiquity computingPages 93–96https://doi.org/10.1145/1102613.1102634We present in this paper a solution to the difficult problem of authentication in pervasive environments. The distrust model developed hereafter allows a particular site to accept inbound connections from foreign unknown users, and to bound their access ...