61,845 research outputs found

    A data modeling conceptual framework for ubiquitous computing based on context awareness

    Get PDF
    This paper introduces a framework for data modeling to support ubiquitous computing based on context-awareness.  Data always grow in term of volume, variety, velocity, and value. The problem arises when it grows exponentially. Consequently, data is anywhere and requirements change in early data definitions then data design become not as the plan.  Therefore, suitable approach with new paradigm and methods of data modeling needs to be enhanced to solve the problems in the real world. Data model must consider the active object that related to each other. Any objects may interact with each other in a ubiquitous way and recorded in digital technology. Sensors, actuator devices, and radio frequency identification technology may support communication between objects through ubiquitous computing. The data model in Ubiquitous Computing needs to restructure to become active and dynamic.  Ubiquitous computing is a model that enable all objects around the people to communicate and invisible. In order to support this paradigm, a new perspective of how data are designed and stored on each object is needed. Furthermore, using ubiquitous computing, the pervasive network can request and response information, which means the devices may communicate and has the initiative to solve a problem without human intervention.  Human wants more intelligence objects. Therefore, more sensors and memory are required. Data structures need to enhance or embedded into any devices that interact with the human

    Support for Ad-Hoc applications in ubiquitous computing

    Get PDF
    This thesis presents work within the area of ubiquitous computing, an area based on a vision of computers blending into the background. The work has been done within the EU project PalCom that introduces palpable computing. Palpable computing puts a new perspective on ubiquitous computing, by focusing on human understandability. The thesis goals are to allow for ad-hoc combinations of services and nonpreplanned interaction in ubiquitous computing networks. This is not possible with traditional technologies for network services, which are based on standardization of service interfaces at the domain level. In contrast to those, our approach is based on standardization at a generic level, and on self-describing services. We propose techniques for ad-hoc applications that allow users to inspect and combine services, and to specify their cooperation in assemblies. A key point is that the assembly is external to the services. That makes it possible to adapt to changes in one service, without rewriting the other coordinated services. A framework has been implemented for building services that can be combined into ad-hoc applications, and example scenarios have been tested on top of the framework. A browser tool has been built for discovering services, for interacting with them, and for combining them. Finally, discovery and communication protocols for palpable computing have been developed, that support ad-hoc applications

    How Does Mobile Computing Develop Transactive Memory in Virtual Team? A Social Identification View

    Get PDF
    The advancement in mobile computing technologies has shown great potential to drive efficiency and effectiveness of knowledge work in virtual teams. Despite their ubiquity, theoretical and empirical research investigating the impact of mobile computing artifacts on development of transactive memory in virtual teams is in its infancy. Drawing on the social psychology literature, we propose a social identity based view to understand how the use of mobile computing artifacts is associated with the development of transactive memory system (TMS) in virtual teams. Specially, the use of four categories of mobile computing artifacts (i.e., ubiquitous co-presence, status disclosure, context search, and customized notification) is proposed to enhance social identification, which thereafter promotes TMS development in terms of specialization, credibility, and coordination. This study offers a new perspective on the mechanisms through which mobile computing artifacts facilitate TMS development, and it yields important implications for the design of mobile strategy in organizations

    The Weight Function in the Subtree Kernel is Decisive

    Get PDF
    Tree data are ubiquitous because they model a large variety of situations, e.g., the architecture of plants, the secondary structure of RNA, or the hierarchy of XML files. Nevertheless, the analysis of these non-Euclidean data is difficult per se. In this paper, we focus on the subtree kernel that is a convolution kernel for tree data introduced by Vishwanathan and Smola in the early 2000's. More precisely, we investigate the influence of the weight function from a theoretical perspective and in real data applications. We establish on a 2-classes stochastic model that the performance of the subtree kernel is improved when the weight of leaves vanishes, which motivates the definition of a new weight function, learned from the data and not fixed by the user as usually done. To this end, we define a unified framework for computing the subtree kernel from ordered or unordered trees, that is particularly suitable for tuning parameters. We show through eight real data classification problems the great efficiency of our approach, in particular for small datasets, which also states the high importance of the weight function. Finally, a visualization tool of the significant features is derived.Comment: 36 page

    Trust Based Participant Driven Privacy Control in Participatory Sensing

    Full text link
    Widespread use of sensors and multisensory personal devices generate a lot of personal information. Sharing this information with others could help in various ways. However, this information may be misused when shared with all. Sharing of information between trusted parties overcomes this problem. This paper describes a model to share information based on interactions and opinions to build trust among peers. It also considers institutional and other controls, which influence the behaviour of the peers. The trust and control build confidence. The computed confidence bespeaks whether to reveal information or not thereby increasing trusted cooperation among peers.Comment: 14 page
    • …
    corecore