60,596 research outputs found
Notifications management across devices
It is common for an individual user to own multiple electronic devices, e.g., laptop, smartphone, etc. Applications on these devices often provide notifications even when not explicitly opened or accessed by the user. Notifications that have been dismissed by the user on one device may continue to persist as zombie notifications on other devices, leading to a suboptimal user experience. Techniques of this disclosure manage notifications across devices such that notifications are synchronized across devices. With user permission, the techniques enable targeting a notification to an active device and/or a device that is appropriate for the user to act on the notification. A notification hub is implemented as a single source of notifications across a range of applications and services. The notification techniques enable users to have more control and deliver an improved notification
Mind the Body: How Embodied Cognition Matters in Manufacturing
AbstractEmbodied cognition can provide human factors and applied ergonomics practitioners with better embodied cognition design principles. This paper investigates and analyzes observational video-recorded data from an experiment that simulated a manufacturing environment. The operator was interrupted during a primary assembly task via a handheld computing device which delivered different classes of notifications. The focus is on the embodied aspect of notifications in an active environment, and why one class of notifications called mediated notifications failed at a specific point previously thought to be suitable. Guidelines for analyzing tasks from an embodied cognition perspective that complements and expands traditional human factors and applied ergonomics approaches were developed and are included
PS-Sim: A Framework for Scalable Simulation of Participatory Sensing Data
Emergence of smartphone and the participatory sensing (PS) paradigm have
paved the way for a new variant of pervasive computing. In PS, human user
performs sensing tasks and generates notifications, typically in lieu of
incentives. These notifications are real-time, large-volume, and multi-modal,
which are eventually fused by the PS platform to generate a summary. One major
limitation with PS is the sparsity of notifications owing to lack of active
participation, thus inhibiting large scale real-life experiments for the
research community. On the flip side, research community always needs ground
truth to validate the efficacy of the proposed models and algorithms. Most of
the PS applications involve human mobility and report generation following
sensing of any event of interest in the adjacent environment. This work is an
attempt to study and empirically model human participation behavior and event
occurrence distributions through development of a location-sensitive data
simulation framework, called PS-Sim. From extensive experiments it has been
observed that the synthetic data generated by PS-Sim replicates real
participation and event occurrence behaviors in PS applications, which may be
considered for validation purpose in absence of the groundtruth. As a
proof-of-concept, we have used real-life dataset from a vehicular traffic
management application to train the models in PS-Sim and cross-validated the
simulated data with other parts of the same dataset.Comment: Published and Appeared in Proceedings of IEEE International
Conference on Smart Computing (SMARTCOMP-2018
AN AUCTION-BASED MARKETPLACE FOR NOTIFICATIONS DELIVERY
A notification delivery module is described that enables a computing system to selectively deliver notifications to a user. The notification delivery module may set a total budget (e.g., a total number of notifications a user may receive for a week) for the user based on prior notification delivery history. The notification delivery module may change (e.g., increase or decrease) the total budget for the user based on user history (e.g., volume and quality of the notifications that are delivered and interacted by the user). The notification delivery module may periodically (e.g., every 24-hour window) allocate a budget to every application provider, based on the application’s active user-installed base or daily/monthly active users (DAU/MAU) metrics related to the application, and may replenish the budget periodically (e.g., reset the budget weekly). Each notification may be assigned a bid price, which may be calculated based on one or more criteria including: user feedback (e.g., whether the user merely views the notification or interacts with the notification), time (e.g., desired time for delivering the notification), target platform (e.g., mobile, web, desktop), notification delivery mechanism (e.g., device or email), content (e.g., related or unrelated to the user’s interest), and overall quality (e.g., value to the application provider or to the user) of the notification. Notifications for a notification provider may be ranked based on the bid price. Higher-ranked notifications may be delivered to the user device prior to the lower-ranked notification until the budget for the particular notification provider runs out. When a delivered notification is dismissed before it is seen by the user, the notification delivery module may return the unused budget to the notification provider. The notification delivery module may also allow the user to set notifications to be delivered without any cost (e.g., free notifications). The notification delivery module may identify good opportunities to deliver notifications based on user activity and learn to avoid delivery of notifications at bad delivery times (e.g., during meetings or while the user is asleep). The notification delivery module may also allow exchange (e.g., sale or purchase) of budget between application providers based on an application’s current need
Evaluating the effectiveness of physical shape-change for in-pocket mobile device notifications
Audio and vibrotactile output are the standard mechanisms mobile devices use to attract their owner's attention. Yet in busy and noisy environments, or when the user is physically active, these channels sometimes fail. Recent work has explored the use of physical shape-change as an additional method for conveying notifications when the device is in-hand or viewable. However, we do not yet understand the effectiveness of physical shape-change as a method for communicating in-pocket notifications. This paper presents three robustly implemented, mobile-device sized shape-changing devices, and two user studies to evaluate their effectiveness at conveying notifications. The studies reveal that (1) different types and configurations of shape-change convey different levels of urgency and; (2) fast pulsing shape-changing notifications are missed less often and recognised more quickly than the standard slower vibration pulse rates of a mobile device
Facilitating the creation of IoT applications through conditional observations in CoAP
With the advent of IPv6, the world is getting ready to incorporate smart objects to the current Internet to realize the idea of Internet of Things. The biggest challenge faced is the resource constraint of the smart objects to directly utilize the existing standard protocols and applications. A number of initiatives are currently witnessed to resolve this situation. One of such initiatives is the introduction of Constrained Application Protocol. This protocol is developed to fit in the resource-constrained smart object with the ability to easily translate to the prominent representational state transfer implementation, hypertext transfer protocol (and vice versa). The protocol has several optional extensions, one of them being, resource observation. With resource observation, a client may ask a server to be notified every state change of the resource. However, in many applications, all state changes are not significant enough for the clients. Therefore, the client will have to decide whether to use a value sent by a server or not. This results in wastage of the already constrained resources (bandwidth, processing power,aEuro broken vertical bar). In this paper, we introduced an alternative to the normal resource observation function, named Conditional Observation, where clients tell the servers the criteria for notification. We evaluated the power consumption and number of packets transmitted between clients and servers by using different network sizes and number of servers. In all cases, we found out that the existing observe option results in excessive number of packets (most of them unimportant for the client) and higher power consumption. We also made an extensive theoretical evaluation of the two approaches which give consistent result with the results we got from experimentation
Incentives for Quality over Time – The Case of Facebook Applications
We study the market for applications on Facebook, the dominant platform for social networking and make use of a rule change by Facebook by which high-quality applications were rewarded with further opportunities to engage users. We find that the change led to quality being a more important driver of usage while sheer network size became less important. Further, we find that update frequency helps applications maintain higher usage, while generally usage of Facebook applications declines less rapidly with age
Private Regulation by Platform Operators – Implications for Usage Intensity
Platforms operators act as private regulators to increase usage and maximize profits. Their goals depend on the development of the platform: overcoming the chicken-egg problem early on requires attracting platform participants while quality becomes more important later on. Private regulators influence third-party business models, entry barriers, and usage intensity. We analyze how drivers of usage intensity on Facebook’s application platform were affected by a policy change that increased quality incentives for applications. This change led to the number of installations of each application becoming less important, applications in more concentrated sub-markets achieving higher usage, and applications staying attractive for longer
Recommended from our members
MobileTrust: Secure Knowledge Integration in VANETs
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover the large operational area. However, these systems fail to capture some inherent properties of VANETs, such as fast and ephemeral interaction, making robust trust evaluation of crowdsourcing challenging. In this article, we propose MobileTrust—a hybrid trust-based system for secure resource sharing in VANETs. The proposal is a breakthrough in centralized trust computing that utilizes cloud and upcoming 5G technologies to provide robust trust establishment with global scalability. The ad hoc communication is energy-efficient and protects the system against threats that are not countered by the current settings. To evaluate its performance and effectiveness, MobileTrust is modelled in the SUMO simulator and tested on the traffic features of the small-size German city of Eichstatt. Similar schemes are implemented in the same platform to provide a fair comparison. Moreover, MobileTrust is deployed on a typical embedded system platform and applied on a real smart car installation for monitoring traffic and road-state parameters of an urban application. The proposed system is developed under the EU-founded THREAT-ARREST project, to provide security, privacy, and trust in an intelligent and energy-aware transportation scenario, bringing closer the vision of sustainable circular economy
Does tuberculosis threaten our ageing populations?
BACKGROUND: The global population is ageing quickly and our understanding of age-related changes in the immune system suggest that the elderly will have less immunological protection from active tuberculosis (TB). DISCUSSION: Ongoing global surveillance of TB notifications shows increasing age of patients with active TB. This effect of age is compounded by changes to clinical manifestations of disease, confounding of diagnostic tests and increased rates of adverse reactions to antimicrobial treatment of TB. Future epidemiological surveillance, development of diagnostic tests and trials of treatment shortening should all include a focus on ageing people. More detailed surveillance of TB notifications in elderly people should be undertaken and carefully evaluated. Risk stratification will help target care for those in greatest need, particularly those with comorbidities or on immunosuppressive therapies. Novel diagnostics and treatment regimes should be designed specifically to be used in this cohort
- …