57,803 research outputs found

    On Mobile Bluetooth Tags

    Full text link
    This paper presents a new approach for hyper-local data sharing and delivery on the base of discoverable Bluetooth nodes. Our approach allows customers to associate user-defined data with network nodes and use a special mobile application (context-aware browser) for presenting this information to mobile users in proximity. Alternatively, mobile services can request and share local data in M2M applications rely on network proximity. Bluetooth nodes in cars are among the best candidates for the role of the bearing nodes.Comment: submitted to FRUCT-17 conference (http://fruct.org

    Context Aware Browser

    Get PDF
    I will present the Context Aware Browser, a novel paradigm for context-aware access to Web contents with mobile devices. The idea is to allow automatic download of Web pages, and even automatic execution of Web applications, on user\u27s own mobile device. The Web resources are not simply pushed on the mobile device; rather, they are selected on the basis of the context the user is in: context data (mainly location, but not only) are used to build a query sent to an external search engine, that selects the most relevant Web content. I will describe the idea, provide some examples, show a video of a recently built prototype, present implementation issues, discuss our specific evaluation methodology and the results, and sketch future work and problems. This is an ongoing project, started about five years ago; it is joint work with the Context Aware and Mobile Systems laboratory (smdc.uniud.it) and the MoBe spinoff (www.mobe.it) at Udine University

    Context Awareness Campus Tour Application via Junaio Augmented Reality (AR) Browser

    Get PDF
    Context-aware application plays an important role with the advancement of technology. Junaio AR browser is one of the popular user-centric AR browsers which are capable of delivering a context-aware application. The aim of this project is to reduce tbe number of manpower for campus tour and develop a context-aware application using the Junaio AR browser. Ineffective use of human resource in campus tour and lack of contextaware application are the two main concerns in this research project. Thus, tbe scope of tbe project is limited to the 3 definite areas which includes Junaio AR browser, Android OS Smartphone and the target location would be UTP campus. The channel is developed, test and validate in Junaio site, perform debugging for errors and submit the channel to Junaio site to be made it available for users. Junaio developer Google group is another place for tbe developer to refer and report of any bug or damage of the channel. The wireless connection need to be provided for free in all places to encourage tbe development and implementation new technology. The project has a good prospect to further expand its scope outside the campus in future

    MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web.

    Get PDF
    We introduce a novel approach to implementing a browser-based tool for web users to protect their privacy. We propose to monitor the behaviors of JavaScript code within a webpage, especially operations that can read data within a browser or can send data from a browser to outside. Our monitoring mechanism is to ensure that all detected leakage is automatically prevented by our context-aware policies that can be modified and redefined by the user. Our method advances the conventional same-origin policy standard of the Web by enforcing different policies for either each source of the code, or groups of related API. Although we develop the tool as a browser extension, our approach is browser-agnostic as it is based on standard JavaScript. Also, our method stands from existing proposals in the industry and literature. In particular, it does not rely on network request interception and blocking mechanisms provided by browsers, which face various technical issues and lead to an “all or nothing” approach to privacy on the web. We implement a proof-of-concept prototype and perform practical evaluations to demonstrate the effectiveness of our approach. Our experimental results evidence that the proposed method can detect and prevent data leakage channels not captured by the leading tools such as Ghostery and uBlock Origin. We show that our prototype is compatible with major browsers and popular real-world websites with promising runtime performance.https://ecommons.udayton.edu/stander_posters/2794/thumbnail.jp

    Context-aware Assessment Using QR-codes

    Get PDF
    In this paper we present the implementation of a general mechanism to deliver tests based on mobile devices and matrix codes. The system is an extension of Siette, and has not been specifically developed for any subject matter. To evaluate the performance of the system and show some of its capabilities, we have developed a test for a second-year college course on Botany at the School of Forestry Engineering. Students were equipped with iPads and took an outdoor test on plant species identification. All students were able to take and complete the test in a reasonable time. Opinions expressed anonymously by the students in a survey about the usability of the system and the usefulness of the test were very favorable. We think that the application presented in this paper can broaden the applicability of automatic assessment techniques.The presentation of this work has been co-founded by the Universidad de MĂĄlaga. Campus de Excelencia Internacional AndalucĂ­a Tech

    Revisiting revisitation in computer interaction: organic bookmark management.

    Get PDF
    According to Milic-Frayling et al. (2004), there are two general ways of user browsing i.e. search (finding a website where the user has never visited before) and revisitation (returning to a website where the user has visited in the past). The issue of search is relevant to search engine technology, whilst revisitation concerns web usage and browser history mechanisms. The support for revisitation is normally through a set of functional built-in icons e.g. History, Back, Forward and Bookmarks. Nevertheless, for returning web users, they normally find it is easier and faster to re-launch an online search again, rather than spending time to find a particular web site from their personal bookmark and history records. Tauscher and Greenberg (1997) showed that revisiting web pages forms up to 58% of the recurrence rate of web browsing. Cockburn and McKenzie (2001) also stated that 81% of web pages have been previously visited by the user. According to Obendorf et al. (2007), revisitation can be divided into four classifications based on time: short-term (72.6% revisits within an hour), medium-term (12% revisits within a day and 7.8% revisits within a week), and long-term (7.6% revisits longer than a week)

    Perspectives for Electronic Books in the World Wide Web Age

    Get PDF
    While the World Wide Web (WWW or Web) is steadily expanding, electronic books (e-books) remain a niche market. In this article, it is first postulated that specialized contents and device independence can make Web-based e-books compete with paper prints; and that adaptive features that can be implemented by client-side computing are relevant for e-books, while more complex forms of adaptation requiring server-side computations are not. Then, enhancements of the WWW standards (specifically of XML, XHTML, of the style-sheet languages CSS and XSL, and of the linking language XLink) are proposed for a better support of client-side adaptation and device independent content modeling. Finally, advanced browsing functionalities desirable for e-books as well as their implementation in the WWW context are described
    • 

    corecore