53 research outputs found

    Exploiting fashion x-commerce through the empowerment of voice in the fashion virtual reality arena. Integrating voice assistant and virtual reality technologies for fashion communication

    Get PDF
    The ongoing development of eXtended Reality (XR) technologies is supporting a rapid increase of their performances along with a progressive decrease of their costs, making them more and more attractive for a large class of consumers. As a result, their widespread use is expected within the next few years. This may foster new opportunities for e-commerce strategies, giving birth to an XR-based commerce (x-commerce) ecosystem. With respect to web and mobile-based shopping experiences, x-commerce could more easily support brick-and-mortar store-like experiences. One interesting and consolidated one amounts to the interactions among customers and shop assistants inside fashion stores. In this work, we concentrate on such aspects with the design and implementation of an XR-based shopping experience, where vocal dialogues with an Amazon Alexa virtual assistant are supported, to experiment with a more natural and familiar contact with the store environment. To verify the validity of such an approach, we asked a group of fashion experts to try two different XR store experiences: with and without the voice assistant integration. The users are then asked to answer a questionnaire to rate their experiences. The results support the hypothesis that vocal interactions may contribute to increasing the acceptance and comfortable perception of XR-based fashion shopping

    Performance Evaluation

    No full text
    Performance Evaluation functions as a leading journal in the area of modeling, measurement, and evaluation of performance aspects of computing and communication systems

    Modeling and shaping the lifetime of target detection sensor networks

    No full text
    In this work we model the lifetime of a clustered sensor network deployed for target detection. We assume sensors are randomly dropped on a bidimensional field in order to detect target traversals occuring stochastically. Once a target enters the sensing area of a sensor, the sensor transmits such information to a cluster head, in charge of receiving and retransmitting the messages received from the sensors deployed on the field. The contribution of this work is threefold. We first identify the sensing nodes whose behavior is key to model the duration of sensing operations. We then proceed, providing a heuristic estimation of the traffic received by the cluster head to quantify its energy requirements, resorting to specific lifetime definitions. We finally evaluate the relationship between our probabilistic and heuristic models and the time until when the network fulfills its purpose, i.e., it remains capable of detecting and reporting the traversal of any target to a sink, as obtained by simulation

    Models and performance evaluation of event goodput in sensor platforms

    No full text
    Despite the introduction of novel energy harvesting technologies, the lifetime of a sensor platform remains one of its most important performance metrics. Performance, however, may also be assessed in terms of the fraction of events which may successfully/unsuccessfully be detected and reported within a time interval of interest, i.e., mission time. Such a performance metric, here termed event goodput, is key for all random event-driven networks, ranging from surveillance and intrusion detection applications operating in time critical scenarios, to mobile and wearable crowd-sensed ecosystems, where mobile sensors are utilized by a number of different applications. When reporting the appearance of a series of possible, but unknown, phenomena, predicting which event goodput may be obtained during the planned mission time is challenging. In this paper, we address this issue by reducing the network-wide problem to the analysis of the performance of individual nodes, in terms of their capability of handling given fractions of event arrivals under fixed probabilistic guarantees. This is obtained as a function of mission time, event arrival and energy consumption models of different, detection and communication schemes, all realistic

    Modeling the Energy Consumption of Upload Patterns on Smartphones and IoT Devices

    No full text
    In this letter, we provide the probabilistic analysis of the energy consumed by installed mobile apps when uploading data to the cloud based on the occurrence of random events during a given time interval. A polynomial algorithm to calculate the probability distribution of the energy they consume is obtained here. The validity of our approach is corroborated with a bound and simulation analysis, resorting to the use of real-world data

    Analyzing and shaping the lifetime and the performance of barrier coverage sensor networks

    No full text
    In this work we model and provide the means to extend the lifetime of a barrier coverage sensor network deployed fortarget detection. We consider a scenario where sensors are randomly dropped on a bidimensional field in order to detect target traversals which occur in a stochastic way within a critical mission time. Once a target enters a sensor's detection area, the sensor transmits such information to a cluster head, in charge of receiving and retransmitting the messages received from the sensors deployed on the field. The contribution of this work is fourfold. We first identify the sensing nodes whose behavior is key to model the duration of sensing operations, assuming prior arrival and mobility models for target traversals. We then proceed, providing a heuristic estimation of the traffic received by the cluster head to quantify its energy requirements, resorting to specific lifetime definitions. We also evaluate the relationship between our probabilistic and heuristic models and the time until the barrier remains capable of detecting and reporting the traversal of any target to a sink, as obtained by simulation. Finally, we show how the lifetime of such network may be shaped, with the use of a sequential activation mechanism, for example to combat the traversals of adversaries exploiting the lifetime models obtained in this work
    corecore