A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
SMART FOG COMPUTING FOR EFFICIENT SITUATIONS MANAGEMENT IN SMART HEALTH ENVIRONMENTS
2018
Journal of Information and Communication Technology
It plays a vital role in understanding user context in order to determine patients' safety, situation identification accuracy, and provide personalized comfort. ...
This paper aims to provide a new generic user situation-aware profile ontology (GUSP-Onto) for a semantic description of heterogeneous users' profiles with efficient patients' situation management and ...
A Generic User Situation-aware Profile ontology: The semantic description of context data is an important feature to enable context reasoning and context data interoperability across heterogeneous smart ...
doi:10.32890/jict2018.17.4.8270
fatcat:fw33xpkbtvaifksanyazlzwwja
A Novel Approach to Assimilate VANET Communication using (WAVE) Wireless Access Vehicular Environment Protocol
2015
International Journal of Computer Applications
This leads to active research in data dissemination methods using heterogeneous devices. ...
Since collection of data is from different sources, Web Server plays crucial role in reception and transmission of messages across VANET nodes. ...
The sources of information in this paper is from sensors, RFID(Radio Frequency Identification) and from Bluetooth. The wireless LAN allows mobile user to connect to LAN with a radio connection. ...
doi:10.5120/ijca2015906912
fatcat:2fwpes7k6zgnde22qkzj3vxqky
Automatically adapting web pages to heterogeneous devices
2011
Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems - CHI EA '11
We describe a system that automatically transforms desktopoptimized pages to ones better suited to the target device. ...
The system leverages existing platformcustomized sites as examples of good design, identifies consistent components across these sites, and renders the desktop page into these components. ...
Second, in contrast to these automatic methods are systems that allow users to adapt the content of the website. ...
doi:10.1145/1979742.1979810
dblp:conf/chi/KulkarniK11
fatcat:skrab7arvberblyw23cf2i7hvm
Research Commentary: An Agenda for Information Technology Research in Heterogeneous and Distributed Environments
2000
Information systems research
We present an agenda for addressing these challenges as they affect organizations in heterogeneous and distributed environments. ...
We focus on three major capabilities enabled by such environments: Mobile Computing, Intelligent Agents, and Net-Centric Computing. ...
Such frameworks form the basis for automatic conflict identification. ...
doi:10.1287/isre.11.4.327.11873
fatcat:vtus4wb23rf6rb3euk6hagb7ia
Extracting Social and Community Intelligence from Digital Footprints: An Emerging Research Area
[chapter]
2010
Lecture Notes in Computer Science
The scale and heterogeneity of the multimodal, mixed data sources present us an opportunity to compile the digital footprints into a comprehensive picture of individual's daily life facets, radically change ...
As a result of the recent explosion of sensor-equipped mobile phone market, the phenomenal growth of Internet and social network users, and the large deployment of sensor network in public facilities, ...
Data: The data sources are multi-modal and heterogeneous. ...
doi:10.1007/978-3-642-16355-5_4
fatcat:2zlro5l4dvfhtpavzbojowxgo4
SpeakerSense: Energy Efficient Unobtrusive Speaker Identification on Mobile Phones
[chapter]
2011
Lecture Notes in Computer Science
We also investigated channel compensation methods that make it feasible to acquire training data from phone calls and an automatic segmentation method for training speaker models based on one-to-one conversations ...
We built SpeakerSense, a speaker identification prototype that uses a heterogeneous multi-processor hardware architecture that splits computation between a low power processor and the phone's application ...
This shows that using automatically segmented conversation data could be a reliable and practical source for training data, especially given the reduced user effort necessary compared to getting user contributed ...
doi:10.1007/978-3-642-21726-5_12
fatcat:bguzhxywebga3ixkpriocqt65u
The Emergence of Social and Community Intelligence
2011
Computer
Initially, analysts used Internet content as the premier data source for understanding large-scale human interaction. ...
similarity on a social website. 2 Investigators from Wright State University label Web 2.0 service users as "citizen sensors" and have worked on social event detection from user-contributed contents. ...
User control research is exploiting methods that enable users to manage their data by tailoring access-control and data-management tools. 8 Data quality. ...
doi:10.1109/mc.2011.65
fatcat:ati2z2ncnng45hxobax4t7vsga
Towards Semantic Web: Seamless integration of services and devices for the FRUCT community
2013
2013 13th Conference of Open Innovations Association (FRUCT)
Besides obvious advantages of Semantic Web usage, not all of proposed methods can work in a highlydiverse heterogeneous environment, the community or company intranet system usually looks like. ...
Semantic Web presents a generalized approach of applications and services integration that enables direct communication between different entities without any user interaction. ...
Secondly it does not require any additional hardware devices except widespread mobile phone (in contrast to biometric identification method, which requires hardware tool to read biometric data). ...
doi:10.23919/fruct.2013.8124229
dblp:conf/fruct/KirkizhKP13
fatcat:t773tk2t25etrottdxxgaj2aim
A methodology for engineering collaborative and ad-hoc mobile applications using SyD middleware
2010
Journal of Network and Computer Applications
Managing applications running across mobile devices becomes complex due to lack of persistence data and weak connectivity. ...
The middleware addresses the key problems of heterogeneity of device, data format and network, and of mobility. ...
Ad-hoc Application Design Users can develop and deploy ad-hoc collaborative applications on-the-fly by leveraging off the pre-existing providers of services/methods and data sources, SyD Client Objects ...
doi:10.1016/j.jnca.2010.03.007
fatcat:3fw43xbktrainlxderkx73rmgy
Model-Driven Development Patterns for Mobile Services in Cloud of Things
2018
IEEE Transactions on Cloud Computing
However, traditional servic e composition or mashup are somewhat unavailable due to complex relations and heterogeneous deployed environments. ...
Cloud of Things (CoT) is an integration of Internet of Things (IoT) and cloud computing for intelligent and smart application especially in mobile environment. ...
Not only RFID (Radio Frequency Identification), but also 2D barcode, DPM (Direct Part Mark), and other identification methods could be taken into account. (2) Data gathering from devices are always heterogeneous ...
doi:10.1109/tcc.2016.2526007
fatcat:ynbla76ulra6dddolubipvfhda
Ïnfïnïty
2007
Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access - MobiDE '07
across heterogeneous platforms. ...
This trend presents many opportunities for information sharing and collaboration among massively distributed data sources. ...
application deployment and use across heterogeneous platforms. ...
doi:10.1145/1254850.1254856
dblp:conf/mobide/CheungGJS07
fatcat:6n7za4xscfhhdewkqxrixszgnm
Re-Identification Risk versus Data Utility for Aggregated Mobility Research Using Mobile Phone Location Data
2015
PLoS ONE
Mobile phone location data is a newly emerging data source of great potential to support human mobility research. ...
The aim of this study is to reveal the re-identification risks from a Chinese city's mobile users and to examine the quantitative relationship between re-identification risk and data utility for an aggregated ...
These studies have suggested that mobile phone location data have the potential to become a major data source to study human mobility for transportation, urban planning, epidemiology, and sociology research ...
doi:10.1371/journal.pone.0140589
pmid:26469780
pmcid:PMC4607417
fatcat:tr36cmffovbgrc2qwudgwrfkxe
Adaptation of Single-user Multi-touch Components to Support Synchronous Mobile Collaboration
2012
Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing
Most of the mobile applications are single user, i.e. they do not allow the cooperative work of group of users simultaneously. ...
We present a reference model to develop collaborative mobile groupware applications by the modification of multi-touch user interface components provided by the manufacturers' SDKs. ...
However, they provide means to obtain the data that must be replicated and the mechanisms to modify how the component interacts with the user through events, methods and properties. ...
doi:10.4108/icst.collaboratecom.2012.250449
dblp:conf/colcom/PichilianiH12
fatcat:y7tnwkvqurfu5owmii4hqf7gsi
Reading the tea leaves in an intelligent Coffee Corner: Challenges for understanding behavior
2009
Behavior Research Methods
Apart from proximity and context awareness, the analysis of contextual data allows the construction of a behavioral model of users that can be used to customize the services offered at the Coffee Corner ...
A context-aware infrastructure collects sensory information on users while they move and interact. ...
Users may stop using a service that does not meet their expectations. Fusing different heterogeneous context sources: How to map patterns from source to source? ...
doi:10.3758/brm.41.3.820
pmid:19587197
fatcat:j3lvhy3tkve6tpdimib63s23hq
Big Data Analytics in Biometrics and Healthcare
2018
Journal of Computer Sciences and Applications
Big Data analytics has been used in biometric systems and healthcare. Biometrics is a powerful tool used in healthcare for identification, insurance, and management, etc. ...
Big data, Big Data analytics, and general information security and privacy in big data are presented in this paper. ...
Biometric identification technology is a growing area of experimentation in the mobile devices sector. ...
doi:10.12691/jcsa-6-1-7
fatcat:m5cfi5bcdvgevhl3uk3ydztm5q
« Previous
Showing results 1 — 15 out of 25,615 results