29,835 research outputs found

    Agent oriented AmI engineering

    Get PDF

    Management system requirements for wireless systems beyond 3G

    Get PDF
    This paper presents a comprehensive description of various management system requirements for systems beyond 3G, which have been identified as a result of the Software Based Systems activities within the Mobile VCE Core 2 program. Specific requirements for systems beyond 3G are discussed and potential technologies to address them proposed. The analysis has been carried out from network, service and security viewpoints

    No Grice: Computers that Lie, Deceive and Conceal

    Get PDF
    In the future our daily life interactions with other people, with computers, robots and smart environments will be recorded and interpreted by computers or embedded intelligence in environments, furniture, robots, displays, and wearables. These sensors record our activities, our behavior, and our interactions. Fusion of such information and reasoning about such information makes it possible, using computational models of human behavior and activities, to provide context- and person-aware interpretations of human behavior and activities, including determination of attitudes, moods, and emotions. Sensors include cameras, microphones, eye trackers, position and proximity sensors, tactile or smell sensors, et cetera. Sensors can be embedded in an environment, but they can also move around, for example, if they are part of a mobile social robot or if they are part of devices we carry around or are embedded in our clothes or body. \ud \ud Our daily life behavior and daily life interactions are recorded and interpreted. How can we use such environments and how can such environments use us? Do we always want to cooperate with these environments; do these environments always want to cooperate with us? In this paper we argue that there are many reasons that users or rather human partners of these environments do want to keep information about their intentions and their emotions hidden from these smart environments. On the other hand, their artificial interaction partner may have similar reasons to not give away all information they have or to treat their human partner as an opponent rather than someone that has to be supported by smart technology.\ud \ud This will be elaborated in this paper. We will survey examples of human-computer interactions where there is not necessarily a goal to be explicit about intentions and feelings. In subsequent sections we will look at (1) the computer as a conversational partner, (2) the computer as a butler or diary companion, (3) the computer as a teacher or a trainer, acting in a virtual training environment (a serious game), (4) sports applications (that are not necessarily different from serious game or education environments), and games and entertainment applications

    Ebb and Flow in Trade Unionism

    Get PDF

    Electronic negotiation and security of information exchanged in e-commerce

    Full text link
    In settings such as electronic markets where trading partners have conflicting interests and a desire to cooperate, mobile agent mediated negotiation have become very popular. However, agent-based negotiation in electronic commerce involves the exchange of critical and sensitive data that must be highly safeguarded. Therefore, in order to give benefits of quick and safe trading to the trading partners, an approach that secures the information exchanged between the mobile agents during e-Commerce negotiations is needed. To this end, we discuss an approach that we refer to as Multi-Agent Security NEgotiation Protocol (MASNEP). To show that MASNEP protocol is free of attacks and thus the information exchanged throughout electronic negotiation is truly secured, we provide a formal proof on the correctness of the MASNEP.<br /

    A Tale of Two Trusts: A Case Study of the Consolidation of Two Community Land Trust Affordable Housing Organizations in Vermont

    Get PDF
    Between early 2010 and May 2011 the Windham Housing Trust conducted a feasibility analysis to study the possibility of merging with or acquiring the Rockingham Area Community Land Trust, a similar community land trust organization providing affordable housing in an adjacent county. This study analyzed the one year feasibility study and merger negotiation process between the two organizations, and explored the complex set of relationships between financial partners, communities, residents, and funding stakeholders. The methodology for this work included reviewing current literature about nonprofit mergers and acquisitions, funder involvement, and community impact of consolidating services. In addition the author interviewed five key stakeholders in this merger, reviewed internal and financial documents, and drew on participant observation as a manager with the Windham & Windsor Housing Trust. The study reveals that more can be learned about the future of the community land trust model of affordable housing in Vermont than the just the technical aspects of the merger. The merger highlights many of the challenges of long term stewardship of an expanding portfolio of affordable housing around the state and extracts key lessons-learned from the merger which may be useful to any small, rural nonprofit interested in merging, but is most likely to be valuable to funding and advocacy organizations who are seeking to maintain networks of providers in their service area in the face of increasing community need
    • …
    corecore