98 research outputs found

    Self-adaptive unobtrusive interactions of mobile computing systems

    Full text link
    [EN] In Pervasive Computing environments, people are surrounded by a lot of embedded services. Since pervasive devices, such as mobile devices, have become a key part of our everyday life, they enable users to always be connected to the environment, making demands on one of the most valuable resources of users: human attention. A challenge of the mobile computing systems is regulating the request for users¿ attention. In other words, service interactions should behave in a considerate manner by taking into account the degree to which each service intrudes on the user¿s mind (i.e., the degree of obtrusiveness). The main goal of this paper is to introduce self-adaptive capabilities in mobile computing systems in order to provide non-disturbing interactions. We achieve this by means of an software infrastructure that automatically adapts the service interaction obtrusiveness according to the user¿s context. This infrastructure works from a set of high-level models that define the unobtrusive adaptation behavior and its implication with the interaction resources in a technology-independent way. Our infrastructure has been validated through several experiments to assess its correctness, performance, and the achieved user experience through a user study.This work has been developed with the support of MINECO under the project SMART-ADAPT TIN2013-42981-P, and co-financed by the Generalitat Valenciana under the postdoctoral fellowship APOSTD/2016/042.Gil Pascual, M.; Pelechano Ferragud, V. (2017). Self-adaptive unobtrusive interactions of mobile computing systems. Journal of Ambient Intelligence and Smart Environments. 9(6):659-688. https://doi.org/10.3233/AIS-170463S65968896Aleksy, M., Butter, T., & Schader, M. (2008). Context-Aware Loading for Mobile Applications. Lecture Notes in Computer Science, 12-20. doi:10.1007/978-3-540-85693-1_3Y. Bachvarova, B. van Dijk and A. Nijholt, Towards a unified knowledge-based approach to modality choice, in: Proc. Workshop on Multimodal Output Generation (MOG), 2007, pp. 5–15.Barkhuus, L., & Dey, A. (2003). Is Context-Aware Computing Taking Control away from the User? Three Levels of Interactivity Examined. Lecture Notes in Computer Science, 149-156. doi:10.1007/978-3-540-39653-6_12Bellotti, V., & Edwards, K. (2001). Intelligibility and Accountability: Human Considerations in Context-Aware Systems. Human–Computer Interaction, 16(2-4), 193-212. doi:10.1207/s15327051hci16234_05D. Benavides, P. Trinidad and A. Ruiz-Cortés, Automated reasoning on feature models, in: Proceedings of the 17th International Conference on Advanced Information Systems Engineering, CAiSE’05, Springer-Verlag, Berlin, 2005, pp. 491–503.Bernsen, N. O. (1994). Foundations of multimodal representations: a taxonomy of representational modalities. Interacting with Computers, 6(4), 347-371. doi:10.1016/0953-5438(94)90008-6Bettini, C., Brdiczka, O., Henricksen, K., Indulska, J., Nicklas, D., Ranganathan, A., & Riboni, D. (2010). A survey of context modelling and reasoning techniques. Pervasive and Mobile Computing, 6(2), 161-180. doi:10.1016/j.pmcj.2009.06.002Blumendorf, M., Lehmann, G., & Albayrak, S. (2010). Bridging models and systems at runtime to build adaptive user interfaces. Proceedings of the 2nd ACM SIGCHI symposium on Engineering interactive computing systems - EICS ’10. doi:10.1145/1822018.1822022D.M. Brown, Communicating Design: Developing Web Site Documentation for Design and Planning, 2nd edn, New Riders Press, 2010.J. Bruin, Statistical Analyses Using SPSS, 2011, http://www.ats.ucla.edu/stat/spss/whatstat/whatstat.htm#1sampt.J. Cámara, G. Moreno and D. Garlan, Reasoning about human participation in self-adaptive systems, in: SEAMS 2015, 2015, pp. 146–156.Campbell, A., & Choudhury, T. (2012). From Smart to Cognitive Phones. IEEE Pervasive Computing, 11(3), 7-11. doi:10.1109/mprv.2012.41Y. Cao, M. Theune and A. Nijholt, Modality effects on cognitive load and performance in high-load information presentation, in: Proceedings of the 14th International Conference on Intelligent User Interfaces, IUI’09, ACM, New York, 2009, pp. 335–344.Chang, F., & Ren, J. (2007). Validating system properties exhibited in execution traces. Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering - ASE ’07. doi:10.1145/1321631.1321723H. Chen and J.P. Black, A quantitative approach to non-intrusive computing, in: Mobiquitous’08: Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, 2008, pp. 1–10.Chittaro, L. (2010). Distinctive aspects of mobile interaction and their implications for the design of multimodal interfaces. Journal on Multimodal User Interfaces, 3(3), 157-165. doi:10.1007/s12193-010-0036-2Clerckx, T., Vandervelpen, C., & Coninx, K. (2008). Task-Based Design and Runtime Support for Multimodal User Interface Distribution. Lecture Notes in Computer Science, 89-105. doi:10.1007/978-3-540-92698-6_6Cook, D. J., & Das, S. K. (2012). Pervasive computing at scale: Transforming the state of the art. Pervasive and Mobile Computing, 8(1), 22-35. doi:10.1016/j.pmcj.2011.10.004Cornelissen, B., Zaidman, A., van Deursen, A., Moonen, L., & Koschke, R. (2009). A Systematic Survey of Program Comprehension through Dynamic Analysis. IEEE Transactions on Software Engineering, 35(5), 684-702. doi:10.1109/tse.2009.28Czarnecki, K. (2004). Generative Software Development. Lecture Notes in Computer Science, 321-321. doi:10.1007/978-3-540-28630-1_33M. de Sá, C. Duarte, L. Carriço and T. Reis, Designing mobile multimodal applications, in: Information Science Reference, 2010, pp. 106–136, Chapter 5.C. Duarte and L. Carriço, A conceptual framework for developing adaptive multimodal applications, in: Proceedings of the 11th International Conference on Intelligent User Interfaces, IUI’06, ACM, New York, 2006, pp. 132–139.Evers, C., Kniewel, R., Geihs, K., & Schmidt, L. (2014). The user in the loop: Enabling user participation for self-adaptive applications. Future Generation Computer Systems, 34, 110-123. doi:10.1016/j.future.2013.12.010Fagin, R., Halpern, J. Y., & Megiddo, N. (1990). A logic for reasoning about probabilities. Information and Computation, 87(1-2), 78-128. doi:10.1016/0890-5401(90)90060-uFerscha, A. (2012). 20 Years Past Weiser: What’s Next? IEEE Pervasive Computing, 11(1), 52-61. doi:10.1109/mprv.2011.78Floch, J., Frà, C., Fricke, R., Geihs, K., Wagner, M., Lorenzo, J., … Scholz, U. (2012). Playing MUSIC - building context-aware and self-adaptive mobile applications. Software: Practice and Experience, 43(3), 359-388. doi:10.1002/spe.2116Gibbs, W. W. (2005). Considerate Computing. Scientific American, 292(1), 54-61. doi:10.1038/scientificamerican0105-54Gil, M., Giner, P., & Pelechano, V. (2011). Personalization for unobtrusive service interaction. Personal and Ubiquitous Computing, 16(5), 543-561. doi:10.1007/s00779-011-0414-0Gil Pascual, M. (s. f.). Adapting Interaction Obtrusiveness: Making Ubiquitous Interactions Less Obnoxious. A Model Driven Engineering approach. doi:10.4995/thesis/10251/31660Haapalainen, E., Kim, S., Forlizzi, J. F., & Dey, A. K. (2010). Psycho-physiological measures for assessing cognitive load. Proceedings of the 12th ACM international conference on Ubiquitous computing - Ubicomp ’10. doi:10.1145/1864349.1864395Hallsteinsen, S., Geihs, K., Paspallis, N., Eliassen, F., Horn, G., Lorenzo, J., … Papadopoulos, G. A. (2012). A development framework and methodology for self-adapting applications in ubiquitous computing environments. Journal of Systems and Software, 85(12), 2840-2859. doi:10.1016/j.jss.2012.07.052Hassenzahl, M. (2004). The Interplay of Beauty, Goodness, and Usability in Interactive Products. Human-Computer Interaction, 19(4), 319-349. doi:10.1207/s15327051hci1904_2Hassenzahl, M., & Tractinsky, N. (2006). User experience - a research agenda. Behaviour & Information Technology, 25(2), 91-97. doi:10.1080/01449290500330331Ho, J., & Intille, S. S. (2005). Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. Proceedings of the SIGCHI conference on Human factors in computing systems - CHI ’05. doi:10.1145/1054972.1055100Horvitz, E., Kadie, C., Paek, T., & Hovel, D. (2003). Models of attention in computing and communication. Communications of the ACM, 46(3), 52. doi:10.1145/636772.636798Horvitz, E., Koch, P., Sarin, R., Apacible, J., & Subramani, M. (2005). Bayesphone: Precomputation of Context-Sensitive Policies for Inquiry and Action in Mobile Devices. Lecture Notes in Computer Science, 251-260. doi:10.1007/11527886_33Kephart, J. O., & Chess, D. M. (2003). The vision of autonomic computing. Computer, 36(1), 41-50. doi:10.1109/mc.2003.1160055Korpipaa, P., Malm, E.-J., Rantakokko, T., Kyllonen, V., Kela, J., Mantyjarvi, J., … Kansala, I. (2006). Customizing User Interaction in Smart Phones. IEEE Pervasive Computing, 5(3), 82-90. doi:10.1109/mprv.2006.49S. Lemmelä, A. Vetek, K. Mäkelä and D. Trendafilov, Designing and evaluating multimodal interaction for mobile contexts, in: Proceedings of the 10th International Conference on Multimodal Interfaces, ICMI’08, ACM, New York, 2008, pp. 265–272.Lim, B. Y. (2010). Improving trust in context-aware applications with intelligibility. Proceedings of the 12th ACM international conference adjunct papers on Ubiquitous computing - Ubicomp ’10. doi:10.1145/1864431.1864491J.-Y. Mao, K. Vredenburg, P.W. Smith and T. Carey, User-centered design methods in practice: A survey of the state of the art, in: Proceedings of the 2001 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON’01, IBM Press, 2001, p. 12.Maoz, S. (2009). Using Model-Based Traces as Runtime Models. Computer, 42(10), 28-36. doi:10.1109/mc.2009.336Mayer, R. E., & Moreno, R. (2003). Nine Ways to Reduce Cognitive Load in Multimedia Learning. Educational Psychologist, 38(1), 43-52. doi:10.1207/s15326985ep3801_6Motti, V. G., & Vanderdonckt, J. (2013). A computational framework for context-aware adaptation of user interfaces. IEEE 7th International Conference on Research Challenges in Information Science (RCIS). doi:10.1109/rcis.2013.6577709R. Murch, Autonomic Computing, IBM Press, 2004.Obrenovic, Z., Abascal, J., & Starcevic, D. (2007). Universal accessibility as a multimodal design issue. Communications of the ACM, 50(5), 83-88. doi:10.1145/1230819.1241668Patterson, D. J., Baker, C., Ding, X., Kaufman, S. J., Liu, K., & Zaldivar, A. (2008). Online everywhere. Proceedings of the 10th international conference on Ubiquitous computing - UbiComp ’08. doi:10.1145/1409635.1409645Pielot, M., de Oliveira, R., Kwak, H., & Oliver, N. (2014). Didn’t you see my message? Proceedings of the 32nd annual ACM conference on Human factors in computing systems - CHI ’14. doi:10.1145/2556288.2556973Poppinga, B., Heuten, W., & Boll, S. (2014). Sensor-Based Identification of Opportune Moments for Triggering Notifications. IEEE Pervasive Computing, 13(1), 22-29. doi:10.1109/mprv.2014.15S. Ramchurn, B. Deitch, M. Thompson, D. De Roure, N. Jennings and M. Luck, Minimising intrusiveness in pervasive computing environments using multi-agent negotiation, in: Mobile and Ubiquitous Systems: Networking and Services, MOBIQUITOUS 2004. The First Annual International Conference on, 2004, pp. 364–371.C. Roda, Human Attention and Its Implications for Human-Computer Interaction, Cambridge University Press, 2011.S. Rosenthal, A.K. Dey and M. Veloso, Using decision-theoretic experience sampling to build personalized mobile phone interruption models, in: Proceedings of the 9th International Conference on Pervasive Computing, Pervasive 2011, Springer-Verlag, Berlin, 2011, pp. 170–187.E. Rukzio, K. Leichtenstern and V. Callaghan, An experimental comparison of physical mobile interaction techniques: Touching, pointing and scanning, in: 8th International Conference on Ubiquitous Computing, UbiComp 2006, Orange County, California, 2006.Serral, E., Valderas, P., & Pelechano, V. (2010). Towards the Model Driven Development of context-aware pervasive systems. Pervasive and Mobile Computing, 6(2), 254-280. doi:10.1016/j.pmcj.2009.07.006D. Siewiorek, A. Smailagic, J. Furukawa, A. Krause, N. Moraveji, K. Reiger, J. Shaffer and F.L. Wong, Sensay: A context-aware mobile phone, in: Proceedings of the 7th IEEE International Symposium on Wearable Computers, ISWC’03, IEEE Computer Society, Washington, 2003, p. 248.Tedre, M. (2006). What should be automated? Proceedings of the 1st ACM international workshop on Human-centered multimedia - HCM ’06. doi:10.1145/1178745.1178753M. Valtonen, A.-M. Vainio and J. Vanhala, Proactive and adaptive fuzzy profile control for mobile phones, in: IEEE International Conference on Pervasive Computing and Communications, 2009, PerCom, 2009, pp. 1–3.Vastenburg, M. H., Keyson, D. V., & de Ridder, H. (2007). Considerate home notification systems: a field study of acceptability of notifications in the home. Personal and Ubiquitous Computing, 12(8), 555-566. doi:10.1007/s00779-007-0176-xWarnock, D., McGee-Lennon, M., & Brewster, S. (2011). The Role of Modality in Notification Performance. Lecture Notes in Computer Science, 572-588. doi:10.1007/978-3-642-23771-3_43Weiser, M., & Brown, J. S. (1997). The Coming Age of Calm Technology. Beyond Calculation, 75-85. doi:10.1007/978-1-4612-0685-9_6Van Woensel, W., Gil, M., Casteleyn, S., Serral, E., & Pelechano, V. (2013). Adapting the Obtrusiveness of Service Interactions in Dynamically Discovered Environments. Mobile and Ubiquitous Systems: Computing, Networking, and Services, 250-262. doi:10.1007/978-3-642-40238-8_2

    Developing Unobtrusive Mobile Interactions: a Model Driven Engineering approach

    Full text link
    In Ubiquitous computing environments, people are surrounded by a lot of embedded services. With the inclusion of pervasive technologies such as sensors or GPS receivers, mobile devices turn into an effective communication tool between users and the services embedded in their environment. All these services compete for the attentional resources of the user. Thus, it is essential to consider the degree in which each service intrudes the user mind when services are designed. In order to prevent service behavior from becoming overwhelming, this work, based on Model Driven Engineering foundations, is devoted to develop services according to user needs. In this thesis, we provide a systematic method for the development of mobile services that can be adapted in terms of obtrusiveness. That is, services can be developed to provide their functionality at different obtrusiveness levels by minimizing the duplication of efforts. For the system specification, a modeling language is defined to cope with the particular requirements of the context-aware user interface domain. From this specification, following a sequence of well-defined steps, a software solution is obtained.Gil Pascual, M. (2010). Developing Unobtrusive Mobile Interactions: a Model Driven Engineering approach. http://hdl.handle.net/10251/12745Archivo delegad

    A personalized system for scalable distribution of multimedia content in multicast wireless networks

    Full text link
    The final publication is available at Springer via http://dx.doi.org/10.1007/s11042-014-2139-3This paper presents a novel architecture for scalable multimedia content delivery over wireless networks. The architecture takes into account both the user preferences and context in order to provide personalized contents to each user. In this way, third-party applications filter the most appropriate contents for each client in each situation. One of the key characteristics of the proposal is the scalability, which is provided, apart from the use of filtering techniques, through the transmission in multicast networks. In this sense, content delivery is carried out by means of the FLUTE (File Delivery over Unidirectional Transport) protocol, which provides reliability in unidirectional environments through different mechanisms such as AL-FEC (Application Layer Forward Error Correction) codes, used in this paper. Another key characteristic is the context-awareness and personalization of content delivery, which is provided by means of context information, user profiles, and adaptation. The system proposed is validated through several empirical studies. Specifically, the paper presents evaluations of two types that collect objective and subjective measures. The first evaluate the efficiency of the transmission protocol, analyzing how the use of appropriate transmission parameters reduces the download time (and thus increasing the Quality of Experience), which can be minimized by using caching techniques. On the other hand, the subjective measures present a study about the user experience after testing the application and analyze the accuracy of the filtering process/strategy. Results show that using AL-FEC mechanisms produces download times until four times lower than when no protection is used. Also, results prove that there is a code rate that minimizes the download time depending on the losses and that, in general, code rates 0.7 and 0.9 provide good download times for a wide range of losses. On the other hand, subjective measures indicate a high user satisfaction (more than 80 %) and a relevant degree of accuracy of the content adaption.This work is supported in part by the Ministerio de Economia y Competitividad of the Government of Spain under project COMINN (IPT-2012-0883-430000) and by the project PAID/2012/313 from the PAID-05-12 program of the Vicerrectorado de Investigacion of the Universitat Politecnica de Valencia.De Fez Lava, I.; Gil Pascual, M.; Fons Cors, JJ.; Guerri Cebollada, JC.; Pelechano Ferragud, V. (2014). A personalized system for scalable distribution of multimedia content in multicast wireless networks. Multimedia Tools and Applications. 1-27. https://doi.org/10.1007/s11042-014-2139-3S127AdAdge (2013) A majority of U.S. mobile users are now smartphone users. Available at: http://adage.com/article/digital/a-majority-u-s-mobile-users-smartphone-users/241717 . Accessed November 2013Adomavicius G, Tuzhilin E (2005) Toward the next generation of recommender Systems: a survey of the state-of-the-art and possible extensions. IEEE Transactions on Knowledge and Data Engineering 17:734–749Adomavicius G, Tuzhilin A (2010) Context-aware recommender systems. Recommender Systems Handbook (Chapter 7): 217–253Androjena, Jena Android Porting (2013). Available at: https://code.google.com/p/androjena . Accessed December 2013Anind KD (2001) Understanding and Using Context. Personal Ubiquitous Comput 5:4–7Assad M, Carmichael DJ, Kay J, Kummerfeld B (2007) PersonisAD: distributed, active, scrutable model framework for context-aware services. Proc. of Pervasive Computing, Toronto, Canada:55–72Bai H, Atiquzzaman M (2003) Error modeling schemes for fading channels in wireless communications: a survey. IEEE Communications Surveys and Tutorials 5(2):2–9Baldauf M, Dustdar S, Rosenberg F (2007) A survey on context-aware systems. Int. J. AdHoc and Ubiquitous Computing, Springer-Verlag 2:263–277Barquero D, Bria A (2007) Forward Error Correction file delivery in DVB-H. Proc. of IEEE Vehicular Technology Conference (VTC), Dublin, Ireland:2951–2955Bright A, Kay J, Ler D, Ngo K, Niu W, Nuguid A (2005) Adaptively recommending museum tours. Proc. of the UbiComp Workshop on Smart Environments and their Applications to Cultural Heritage, Tokyo, Japan:29–32Chatfield C, Carmichael D, Hexel R, Kay J, Kummerfeld B (2005) Personalisation in intelligent environments: managing the information flow. Proc. of the OZCHI Computer-human interaction, Canberra, Australia:1–10Chen YFR, Jana R, Stern D, Wei B, Yang M, Sun H, Dyaberi J (2010) Zebroid: using IPTV data to support STB-assisted VoD content delivery. Multimedia System Journal 16(3):199–214Chen G, Kotz D (2000) A survey on context-aware mobile computing research. Technical Report TR2000-381, Dartmouth Computer ScienceCommunity Research and Development Information Service (CORDIS) – Seventh Framework Programme (FP7). Available at: http://cordis.europa.eu/fp7/home_en.html . Accesed October 2013de Fez I, Fraile F, Belda R, Guerri JC (2011) Performance evaluation of AL-FEC LDPC codes for push content applications in wireless unidirectional environments. Multimedia Tools and Applications 60(3):669–688de Fez I, Fraile F, Belda R, Guerri JC (2012) Analysis and evaluation of adaptive LDPC AL-FEC codes for content download services. IEEE Transactions on Multimedia 14(3):641–650de Fez I, Fraile F, Guerri JC (2013) Effect of the FDT transmission frequency for an optimum content delivery using the FLUTE protocol. Computer Communications 36(12):1298–1309de Fez I, Guerri JC (2014) An adaptive mechanism for optimal content download in wireless networks. IEEE Transactions on Multimedia 16(4):1140–1155Du R, Safavi-Naini R, Susilo W (2003) Web filtering using text classification (2003). Proc. of the Int Conf on Networks (ICON), Sydney, Australia:325–330ETSI TS 102 034 (2008), Transport of MPEG-2 TS Based DVB Services over IP based Networks (and associated XML), v1.4.1, available online: www.etsi.org/deliver/etsi_ts/102000_102099/102034/01.04.01_60/ts_102034v010401p.pdfETSI TS 102 472 (2009), Digital Video Broadcasting (DVB); IP Datacast over DVB-H: Content Delivery Protocols, v1.3.1, available online: www.etsi.org/deliver/etsi_ts/102400_102499/102472/01.03.01_60/ts_102472v010301p.pdfETSI TS 126 346 (2013), Universal Mobile Telecommunications System (UMTS); LTE; Multimedia Broadcast/Multicast Service (MBMS); Protocols and codecs (release 10), v11.3.0, available online: www.etsi.org/deliver/etsi_ts/126300_126399/126346/11.03.00_60/ts_126346v110300p.pdfFelfernig A, Jeran M, Ninaus G, Reinfrank F, Reiterer S (2013) Toward the next generation of recommender systems: applications and research challenges. Multimedia Services in Intelligent Environments 24 (Chapter 5): 81–98Fraile F, de Fez I, Guerri JC (2009) Modela-TV: service personalization and business model management for mobile TV. Proc. of 7th European Interactive TV Conference (EuroITV), Leuven, Belgium:1–6Fraile F, de Fez I, Guerri JC (2014) Evaluation of background push content download services to mobile devices over DVB networks. IEEE Transactions on Broadcasting 60(1):1–15Gallager RG (1962) Low density parity check codes. IRE Transactions on Information Theory 8(1):21–28Gil M, Giner P, Pelechano V (2012) Personalization for unobtrusive service interaction. Personal Ubiquitous Comput 16(5):543–561Guillen J, Miranda J, Berrocal J, Garcia-Alonso J, Murillo J, Canal C (2014) People as a service: a mobile-centric model for providing collective sociological profiles. IEEE Software 31(2):48–53Hrvoje J, Stockhammer T, Xu W, Abdel Samad W (2006) Efficient video-on-demand services over mobile datacast channels. Journal of Zhejiang University 7(5):873–884Hsieh CC, Lin CH, Chang WT (2009) Design and implementation of the interactive multimedia broadcasting services in DVB-H. IEEE Transactions on Consumer Electronics 55(4):1779–1787Kellerer H, Pferschy U, Pisinger D (2004) Knapsack problems. SpringerKorpipaa P, Malm EJ, Rantakokko T, Kyllonen V, Kela J, Mantyjarvi J, Hakkila J, Kansala I (2006) Customizing user interaction in smart phones. IEEE Pervasive Computing 5:82–90Kuppusamy KS, Aghila G (2012) A personalized web page content filtering model based on segmentation. Int Journal of Information Sciences and Techniques (IJIST) 2(1):41–51Kutscher D, Greifenberg J, Loos K (2007) Scalable DTN distribution over uni-directional links. Proc. of the SIGCOMM workshop on networked systems in developing regions (NSDR), Kyoto, Japan: article no. 6Lewis JR (1995) Ibm computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. Int J Hum Comput Interact 7(1):57–78Liang L, Cruichkshank H, Sun Z, Kulatunga C, Fairhurst G (2010) The integration of TESLA and FLUTE over satellite networks. Proc. of the IEEE Global Telecommunications Conference (Globecom), Miami, FL, USA:1–6Lohmar T, Huschke J (2009) Radio resource optimization for MBMS file transmissions. Proc. of the IEEE Int Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Bilbao, Spain:1–7Neumann C, Roca V, Walsh R (2005) Large scale content distribution protocols. ACM Computer Communication Review 35(5):85–92Paila T, Walsh R, Luby M, Roca V, Lehtonen R (2012) FLUTE – File Delivery Over Unidirectional Transport. IETF RFC 6726Paolini E, Varrella M, Chiani M, Matuz B, Liva G (2008) Low-complexity LDPC codes with near-optimum performance over the BEC. Proc. Adv Satellite Mobile Systems (ASMS), Bologna, Italy:274–282Papastergiou G, Psaras I, Tsaoussidis V (2009) Deep-space transport protocol: a novel transport scheme for space DTNs. Computer Communications 32(16):1757–1767Peltotalo J, Harju J, Saukko M, Väätämöinen L, Bouazizi I, Curcio I (2008) Personal mobile broadcasting based on the 3GPP MBMS System. Proc. of MoMM, Linz, Austria:156–162Peltotalo J, Peltotalo S, Harju J, Walsh R (2007) Performance analysis of a file delivery system based on the FLUTE protocol. Int Journal of Communication Systems 20(6):633–659Podlipnig S, Böszörmenyi L (2003) A survey of web cache replacement strategies. ACM Computing Surveys 35(4):374–398Roca V, Neumann C, Furodet D (2008) Low density parity check (LDPC) staircase and triangle forward error correction (FEC) schemes. IETF RFC 5170Runeson P, Höst M (2009) Guidelines for conducting and reporting case study research in software engineering. Empir Softw Eng 14(2):131–164Schiller JH, Voisard A (2004) Location-based services. Kaufmann, MorganSerral E, Gil M, Valderas P, Pelechano V (2013) Automating unobtrusive personalized services in ambient media environments. Multimedia Tools and Applications, Springer US, available online, doi: 10.1007/s11042-013-1634-2Serral E, Valderas P, Pelechano V (2010) Towards the model driven development of context-aware pervasive systems. Pervasive and Mobile Computing 6(2):254–280Streefkerk JW, van Esch-Bussemakers MP, Neerincx MA (2006) Designing personal attentive user interfaces in the mobile public safety domain. Comput Hum Behav 22:749–770Valtonen M, Vainio AM, Vanhala J (2009) Proactive and adaptive fuzzy profile control for mobile phones. Proc. of the IEEE Int Conf on Pervasive Computing and Communications (PerCom), Galveston, Texas, USA:1–3van Woensel W, Gil M, Casteleyn S, Serral E, Pelechano V (2012) Adapting the obtrusiveness of service interactions in dynamically discovered environments. Proc. of MobiQuitous, Beijing, China:250–262W3C (2012), OWL 2Web Ontology Language Document Overview, Recommendation 11. Available at: http://www.w3.org/TR/owl2-overview. Accesed: November 2013Weld DS, Anderson C, Domingos P, Etzioni O, Gajos K, Lau T, Wolf S (2003) Automatically personalizing user interfaces. Proc. of the Int Joint Conference on Artificial Intelligence (IJCAI), Acapulco, Mexico:1613–1619Xu J, Hu Q, Lee W, Lee DL (2004) Performance evaluation of an optimal cache replacement policy for wireless data dissemination. IEEE Transactions on Knowledge and Data Engineering 16(1):125–139Yetgin Z, Çelik T (2012) Efficient progressive downloading over multimedia broadcast multicast service. Computer Networks 56(2):533–547Zheng Q, Zhu P, Wang Y, Xu M (2010) EPSP: Enhancing network protocol with social-aware plane. Proc. of IEEE/ACM Int Conference on Green Computing and Communications (GreenCom) and Int Conference on Cyber, Ohysical and Social Computing (CPSCom), Hangzhou, China:578–58

    Internet of Things Strategic Research Roadmap

    Get PDF
    Internet of Things (IoT) is an integrated part of Future Internet including existing and evolving Internet and network developments and could be conceptually defined as a dynamic global network infrastructure with self configuring capabilities based on standard and interoperable communication protocols where physical and virtual “things” have identities, physical attributes, and virtual personalities, use intelligent interfaces, and are seamlessly integrated into the information network

    User-Centered Context-Aware Mobile Applications―The Next Generation of Personal Mobile Computing

    Get PDF
    Context-aware mobile applications are systems that can sense clues about the situational environment and enable appropriate mechanisms of interaction between end users and systems, making mobile devices more intelligent, adaptive, and personalized. In order to better understand such systems and the potentials and barriers of their development and practical use, this paper provides a state-of-the-art overview of this emerging field. Unlike previous literature reviews that mainly focus on technological aspects of such systems, we examine this field mainly from application and research methodology perspectives. We will present major types of current context-aware mobile applications, and discuss research methodologies used in existing studies and their limitations, and highlight potential future research

    Contextual mobile adaptation

    Get PDF
    Ubiquitous computing (ubicomp) involves systems that attempt to fit in with users’ context and interaction. Researchers agree that system adaptation is a key issue in ubicomp because it can be hard to predict changes in contexts, needs and uses. Even with the best planning, it is impossible to foresee all uses of software at the design stage. In order for software to continue to be helpful and appropriate it should, ideally, be as dynamic as the environment in which it operates. Changes in user requirements, contexts of use and system resources mean software should also adapt to better support these changes. An area in which adaptation is clearly lacking is in ubicomp systems, especially those designed for mobile devices. By improving techniques and infrastructure to support adaptation it is possible for ubicomp systems to not only sense and adapt to the environments they are running in, but also retrieve and install new functionality so as to better support the dynamic context and needs of users in such environments. Dynamic adaptation of software refers to the act of changing the structure of some part of a software system as it executes, without stopping or restarting it. One of the core goals of this thesis is to discover if such adaptation is feasible, useful and appropriate in the mobile environment, and how designers can create more adaptive and flexible ubicomp systems and associated user experiences. Through a detailed study of existing literature and experience of several early systems, this thesis presents design issues and requirements for adaptive ubicomp systems. This thesis presents the Domino framework, and demonstrates that a mobile collaborative software adaptation framework is achievable. This system can recommend future adaptations based on a history of use. The framework demonstrates that wireless network connections between mobile devices can be used to transport usage logs and software components, with such connections made either in chance encounters or in designed multi–user interactions. Another aim of the thesis is to discover if users can comprehend and smoothly interact with systems that are adapting. To evaluate Domino, a multiplayer game called Castles has been developed, in which game buildings are in fact software modules that are recommended and transferred between players. This evaluation showed that people are comfortable receiving semi–automated software recommendations; these complement traditional recommendation methods such as word of mouth and online forums, with the system’s support freeing users to discuss more in–depth aspects of the system, such as tactics and strategies for use, rather than forcing them to discover, acquire and integrate software by themselves

    Adapting mobile systems using logical mobility primitives

    Get PDF
    Mobile computing devices, such as personal digital assistants and mobile phones, are becoming increasingly popular, smaller, more capable and even fashionable personal items. Combined with the recent advent of wireless networking techniques, users are equipped with mobile devices of significant computational abilities, which are able to wirelessly access information by dynamically connecting to many different networks. Despite the ubiquity of mobile devices, mobile systems are built using monolithic architectures, use a small set of predefined interaction paradigms and do not exploit or adapt to the dynamicity of their local or remote context. Applications deployed on mobile devices face considerable challenges posed by their changing surroundings. One of the main peculiarities of mobile devices is heterogeneity, which may occur in software, hardware and network protocols. Mobile systems may carry a large number of different applications, use different operating systems and middleware and, often, have more than one network interface. A further challenge is their considerable variation in the computational resources available, such as battery power, CPU speed, network bandwidth and volatile and persistent memory. Moreover, mobile computing systems are highly dynamic systems, in terms of their surroundings, implying that the requirements for applications deployed on a mobile device are a moving target. Changes in the requirements (such as integration with a new service) may require changes to the application. Consequently, these changes may mean that the application behaviour needs to adapt. This thesis argues that the potential of the ubiquity of mobile devices cannot be realised using static and monolithic architectures, as mobile systems need to be able to adapt to accommodate changes to their environment. It investigates the use of three technologies to offer adaptation to mobile devices: Logical mobility techniques, component systems and middleware technologies. More specifically, this thesis presents the SATIN (System Adaptation Targeting Integrated Networks) component metamodel, a lightweight local component metamodel that offers the flexible use of logical mobility primitives. The metamodel is instantiated to build the SATIN middleware system, a component-based mobile computing middleware that uses the mobility primitives exported by the metamodel to reconfigure itself and applications running on top of it. The suitability of SATIN for the creation of adaptable mobile systems is demonstrated, by using it to implement and evaluate a number of applications showing different aspects of adaptation. Moreover, existing projects are reengineered to run as SATIN components, showing the flexibility of the approach and the advantages gained over the originals

    EVALUATING THE CYBER SECURITY IN THE INTERNET OF THINGS: SMART HOME VULNERABILITIES

    Get PDF
    The need for advanced cyber security measures and strategies is attributed to modern sophistication of cyber-attacks and intense media attention when attacks and breaches occur. In May 2014, a congressional report suggested that Americans used approximately 500 million Internet-capable devices at home, including, but not limited to Smartphones, tablets, and other Internet-connected devices, which run various unimpeded applications. Owing to this high level of connectivity, our home environment is not immune to the cyber-attack paradigm; rather, the home has evolved to become one of the most influenced markets where the Internet of Things has had extensive surfaces, vectors for attacks, and unanswered security concerns. Thus, the aim of the present research was to investigate behavioral heuristics of the Internet of Things by adopting an exploratory multiple case study approach. A controlled Internet of Things ecosystem was constructed consisting of real-life data observed during a typical life cycle of initial configuration and average use. The information obtained during the course of this study involved the systematic acquisition and analysis of Smart Home ecosystem link-layer protocol data units (PDUs). The methodology employed during this study involved a recursive multiple case study evaluation of the Smart Home ecosystem data-link layer PDUs and aligned the case studies to the existing Intrusion Kill Chain design model. The proposed solution emerging from the case studies builds the appropriate data collection template while concurrently developing a Security as a Service (SECaaS) capability to evaluate collected results

    The Effects of the Flipped Classroom Model on Students\u27 Learning in a College English Class in Shanghai, China

    Get PDF
    For many decades, college English teaching in China has been teacher-centered, mainly focusing on the enhancement of students’ four basic English language skills of listening, speaking, reading and writing, with little attention paid to the cultivation of students’ higher order thinking skills (Tang, 2016; Wang, Xu, & Zhou, 2016). The teacher-centered teaching approach has led to the problem that after having learned English for many years, students cannot speak English fluently (Dai, 2001). There has been a call for promoting the student-centered teaching model in China (NACFLT, 2000). One relatively new approach to support student-centered active learning is flipped instruction (Egbert et al., 2015). In a flipped classroom, the transmission of information in a traditional face-to-face class is moved out of class time, and the class time is devoted to engaging students in active learning to foster deeper understanding of course content and problem-solving skills. The purpose of this multiple case study was to explore the effects of the flipped classroom model on the learning of Chinese undergraduate students in a college English class. Using a purposeful sampling strategy, I selected a flipped English class in a private college in Shanghai, China, which can be regarded as a pioneer in promoting the flipped classroom model in China. I identified six second-year college students to be my respondents. During the six weeks of study in the fall semester of 2019, I collected data from multiple sources including one individual semi-structured open-ended interview with the instructor and each of the student participants, classroom observation, and documentation such as the teacher’s teaching plans, students’ journal entries, course projects, word maps and worksheets (both online or written ones). With a holistic analysis of the data collected, I explored students’ perceptions of the learning experiences in the flipped college English class, which lent an insight into the effects of the flipped classroom model on students’ learning. This study found that the teacher partly flipped her English class. Most of the learning of vocabulary and grammar was moved out of class. The learning of the articles in the textbook was partly flipped, with the initial understanding of the article done before class and the in-depth text analysis carried out in class. In class time, the teacher created an active learning environment with a variety of activities, encouraging students to think and speak English. The flipped learning tasks prepared students for the active learning in class, and the post-class learning tasks engaged students in further learning and thinking. All the six students regarded the teaching model as “original” and “helpful”. They perceived improved learning in the active learning environment in class. In addition, they perceived enhanced autonomy in learning, improvement in their English listening and speaking proficiency, and opportunities for cultivating higher order thinking skills. However, they were also faced with challenges in learning which they attributed to their low proficiency level of English listening and speaking. There was one outlier who preferred the traditional way of teaching and learning English, though he acknowledged the value of the teaching model adopted in this partly flipped English class
    • …
    corecore