47,602 research outputs found

    Robust semantic analysis for adaptive speech interfaces

    Get PDF
    The DUMAS project develops speech-based applications that are adaptable to different users and domains. The paper describes the project's robust semantic analysis strategy, used both in the generic framework for the development of multilingual speech-based dialogue systems which is the main project goal, and in the initial test application, a mobile phone-based e-mail interface

    Patient-based mobile alerting systems- requirements and expectations

    Get PDF
    Patients with chronic conditions are not well supported by technical systems in managing their conditions. However, such systems could help patients to self-reliantly comply with their treatment. This help could be rendered in the form of alerting patients about condition-relevant issues, transmitting relevant parameters to healthcare providers and analysing these parameters according to guidelines specified by both patients and healthcare staff. If necessary, this analysis of condition parameters triggers the alerting of patients and healthcare providers about actions to be taken. In this paper, we present the results of a survey we have undertaken to verify and extend requirements we have identified for the design of a Mobile Alerting System for patients with chronic conditions. First of all, the results show that a Mobile Alerting System is desired by patients. Moreover, due to the inter- and intra-user variance of patients and healthcare staff, the system has to work in a context-aware manner and allow for personalised parameters in order to be adaptable to every user’s needs

    Context-Based Handling of Mobile Process Activities

    Get PDF
    Process technology constitutes a crucial component of information systems. In this context, high flexibility is required as business functions must be quickly adaptable to cope with dynamic business changes. As recent developments allow for the use of mobile devices in knowledge-intensive areas, it is often demanded to enhance process-aware information systems with mobile activity support. In general, the technical integration of this activity type with existing process management technology is challenging. For example, protocols governing the communication between mobile devices and process management systems must be adapted. If a mobile context shall be additionally considered, the integration gets even more complex. However, the use of a mobile context offers advantages. For example, the mobile activity execution time may be decreased if mobile activities are only assigned to those users whose location is beneficial. This chapter proposes an approach to enable the robust handling of single process activities on mobile devices based on a mobile process model

    Dynamic Firewall Configuration Using Mobile Agents

    Get PDF
    The nearly omnipresence ofthe Internet and the steady increase ofwireless computing and mobile devices require highly dynamic adaptable distributed system architectures. Building such architectures needs a combination ofkey concepts from component technology and distributed systems. Mobile agents provide this combination. We use mobile agents as the building blocks ofacomponent-based system for remote supervision and control of both hard- and software in a distributed environment. In this paper we concentrate on the configuration ofindividual components and component relationships in our system. We identify requirements for remote configuration ofagent-based component systems and discuss architectural and user interface related issues ofour approaches. We use acode-on-demand approach for supporting elaborate user interfaces. We use a generative approach based on enhanced meta-information for reducing development effort. The presented approaches are applicable for remote configuration of component-based systems in general and consider additional requirements imposed through the use of mobile agenttechnology

    Context Aware Adaptable Applications - A global approach

    Get PDF
    Actual applications (mostly component based) requirements cannot be expressed without a ubiquitous and mobile part for end-users as well as for M2M applications (Machine to Machine). Such an evolution implies context management in order to evaluate the consequences of the mobility and corresponding mechanisms to adapt or to be adapted to the new environment. Applications are then qualified as context aware applications. This first part of this paper presents an overview of context and its management by application adaptation. This part starts by a definition and proposes a model for the context. It also presents various techniques to adapt applications to the context: from self-adaptation to supervised approached. The second part is an overview of architectures for adaptable applications. It focuses on platforms based solutions and shows information flows between application, platform and context. Finally it makes a synthesis proposition with a platform for adaptable context-aware applications called Kalimucho. Then we present implementations tools for software components and a dataflow models in order to implement the Kalimucho platform

    Domino: exploring mobile collaborative software adaptation

    Get PDF
    Social Proximity Applications (SPAs) are a promising new area for ubicomp software that exploits the everyday changes in the proximity of mobile users. While a number of applications facilitate simple file sharing between co–present users, this paper explores opportunities for recommending and sharing software between users. We describe an architecture that allows the recommendation of new system components from systems with similar histories of use. Software components and usage histories are exchanged between mobile users who are in proximity with each other. We apply this architecture in a mobile strategy game in which players adapt and upgrade their game using components from other players, progressing through the game through sharing tools and history. More broadly, we discuss the general application of this technique as well as the security and privacy challenges to such an approach
    corecore