3,760 research outputs found
Opening the Black Box: Explaining the Process of Basing a Health Recommender System on the I-Change Behavioral Change Model
Recommender systems are gaining traction in healthcare because they can tailor recommendations
based on users' feedback concerning their appreciation of previous health-related messages. However,
recommender systems are often not grounded in behavioral change theories, which may further increase
the effectiveness of their recommendations. This paper's objective is to describe principles for designing
and developing a health recommender system grounded in the I-Change behavioral change model that
shall be implemented through a mobile app for a smoking cessation support clinical trial. We built upon
an existing smoking cessation health recommender system that delivered motivational messages through a
mobile app. A group of experts assessed how the system may be improved to address the behavioral change
determinants of the I-Change behavioral change model. The resulting system features a hybrid recommender
algorithm for computer tailoring smoking cessation messages. A total of 331 different motivational messages
were designed using 10 health communication methods. The algorithm was designed to match 58 message
characteristics to each user pro le by following the principles of the I-Change model and maintaining the
bene ts of the recommender system algorithms. The mobile app resulted in a streamlined version that aimed
to improve the user experience, and this system's design bridges the gap between health recommender
systems and the use of behavioral change theories. This article presents a novel approach integrating
recommender system technology, health behavior technology, and computer-tailored technology. Future
researchers will be able to build upon the principles applied in this case study.European Union's Horizon 2020 Research and Innovation Programme under Grant 68112
Vision and Objectives
The purpose of Industry Day is to exchange information with industry to increase understanding of the Government's current vision and objectives for the xEVA Production and Services Contract. The presentation provides industry with the opportunity to provide input into the xEVAPS procurement strategy and encourage offerors to submit questions and comments. A technical overview of the xEVA System serves as the foundation for the content related to draft requirements in the SOW
A Typed Model for Dynamic Authorizations
Security requirements in distributed software systems are inherently dynamic.
In the case of authorization policies, resources are meant to be accessed only
by authorized parties, but the authorization to access a resource may be
dynamically granted/yielded. We describe ongoing work on a model for specifying
communication and dynamic authorization handling. We build upon the pi-calculus
so as to enrich communication-based systems with authorization specification
and delegation; here authorizations regard channel usage and delegation refers
to the act of yielding an authorization to another party. Our model includes:
(i) a novel scoping construct for authorization, which allows to specify
authorization boundaries, and (ii) communication primitives for authorizations,
which allow to pass around authorizations to act on a given channel. An
authorization error may consist in, e.g., performing an action along a name
which is not under an appropriate authorization scope. We introduce a typing
discipline that ensures that processes never reduce to authorization errors,
even when authorizations are dynamically delegated.Comment: In Proceedings PLACES 2015, arXiv:1602.0325
Recommended from our members
Sharing software engineering resources and open source software across entities
This paper describes a number of ‘good ideas’ designed to assist staff who are involved in the management, delivery or support of student project work. The ideas were formed from a Disciplinary Commons. The good ideas discussed include online forums, a project repository, alternative project structures, project preparation, progress reviews, instant supervision, peer support and anti-cheating mechanisms. Readers are encouraged to dip in, consider the ideas and implement those of most use for their own institutions
Norm-based and commitment-driven agentification of the Internet of Things
There are no doubts that the Internet-of-Things (IoT) has conquered the ICT industry to the extent that many governments and organizations are already rolling out many anywhere,anytime online services that IoT sustains. However, like any emerging and disruptive technology, multiple obstacles are slowing down IoT practical adoption including the passive nature and privacy invasion of things. This paper examines how to empower things with necessary capabilities that would make them proactive and responsive. This means things can, for instance reach out to collaborative peers, (un)form dynamic communities when necessary, avoid malicious peers, and be “questioned” for their actions. To achieve such empowerment, this paper presents an approach for agentifying things using norms along with commitments that operationalize these norms. Both norms and commitments are specialized into social (i.e., application independent) and business (i.e., application dependent), respectively. Being proactive, things could violate commitments at run-time, which needs to be detected through monitoring. In this paper, thing agentification is illustrated with a case study about missing children and demonstrated with a testbed that uses different IoT-related technologies such as Eclipse Mosquitto broker and Message Queuing Telemetry Transport protocol. Some experiments conducted upon this testbed are also discussed
Towards Run-Time Verification of Compositions in the Web of Things using Complex Event Processing
Following the vision of the Internet of Things, physical world entities are integrated into virtual world things. Things are expected to become active participants in business and social processes. Then, the Internet of Things could benefit from the Web Service architecture like today’s Web does, so Future ser-vice-oriented Internet things will offer their functionality via service-enabled in-terfaces. In previous work, we demonstrated the need of considering the behav-iour of things to develop applications in a more rigorous way, and we proposed a lightweight model for representing such behaviour. Our methodology relies on the service-oriented paradigm and extends the DPWS profile to specify the order with which things can receive messages. We also proposed a static verifi-cation technique to check whether a mashup of things respects the behaviour, specified at design-time, of the composed things. However, a change in the be-haviour of a thing may cause that some compositions do not fulfill its behaviour anymore. Moreover, given that a thing can receive requests from instances of different mashups at run-time, these requests could violate the behaviour of that thing, even though each mashup fulfills such behaviour, due to the change of state of the thing. To address these issues, we present a proposal based on me-diation techniques and complex event processing to detect and inhibit invalid invocations, so things only receive requests compatible with their behaviour.Work partially supported by projects TIN2008-05932, TIN2012-35669, CSD2007-0004 funded by Spanish Ministry MINECO and FEDER; P11-TIC-7659 funded by Andalusian Government; and Universidad de Málaga, Campus de Excelencia Internacional Andalucía Tec
- …