Filters








102 Hits in 9.2 sec

Inferring colocation and conversation networks from privacy-sensitive audio with implications for computational social science

Danny Wyatt, Tanzeem Choudhury, Jeff Bilmes, James A. Kitts
2011 ACM Transactions on Intelligent Systems and Technology  
., and Kitts, J. A. 2011. Inferring colocation and conversation networks from privacy-sensitive audio with implications for computational social science. ACM  ...  With the goal of addressing these questions, this article presents new methods for inferring colocation and conversation networks from privacysensitive audio.  ...  ACKNOWLEDGMENTS We thank the editor and three reviewers for their helpful feedback and suggestions.  ... 
doi:10.1145/1889681.1889688 fatcat:w5ato54zizcvtimwzesuhwqybu

Introduction to the special issue on intelligent systems for activity recognition

Daqing Zhang, Matthai Philipose, Qiang Yang
2011 ACM Transactions on Intelligent Systems and Technology  
., titled "Inferring Colocation and Conversational Networks using Privacy-Sensitive Audio and the Implications for Computational Social Science."  ...  -Inferring colocation and conversational networks using privacy-sensitive audio is a new topic for activity recognition.  ... 
doi:10.1145/1889681.1889682 fatcat:y7vxivvkfrhxnf7e4alq4adcsi

Living with Internet of Things: The Emergence of Embedded Intelligence

Bin Guo, Daqing Zhang, Zhu Wang
2011 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing  
This paper introduces and prospects an emerging research area -Embedded Intelligence (EI), which aims at revealing the individual behaviors, spatial contexts, as well as social patterns and urban dynamics  ...  With the development of sensing, wireless communication, and Internet technologies, we are now living in a world that is filled with various smart thingsthe Internet of Things.  ...  privacy concerns, with much information (e.g., location, point of interests) being sensitive and vulnerable to privacy attacks.  ... 
doi:10.1109/ithings/cpscom.2011.11 dblp:conf/ithings/GuoZW11 fatcat:fdgg26mbenci7hls7awyprt5ba

The language of privacy

Michael Boyle, Saul Greenberg
2005 ACM Transactions on Computer-Human Interaction  
Video media spaces are fully interconnected multi-person audio/video networks that are usually on all of the time.  ...  Third, I developed a comprehensive descriptive theory of privacy in video media spaces based on the social, psychological and CSCW literature about privacy.  ...  Participants were recruited from junior-level university courses, mostly from computer science with some from other disciplines.  ... 
doi:10.1145/1067860.1067868 fatcat:zrkyacghsfdmzpn6zm7r442bke

Practical approaches to big data privacy over time

Micah Altman, Alexandra Wood, David R O'Brien, Urs Gasser
2018 International Data Protecion Law  
of science, public policy, and innovation.  ...  Vast quantities of data from new sources and novel methods for large-scale data analysis promise to yield deeper understanding of human characteristics, behaviour, and relationships and advance the state  ...  Informational risks from social network analyses are a function not only of the nodes but also the structure of the network connections. 93 Pieces of text may be associated with metadata (eg Twitter  ... 
doi:10.1093/idpl/ipx027 fatcat:gm274ri46nbe7ihrp6om4pmyvy

UbiComp/ISWC 2019: A Post-Conference Summary Report

Young D. Kwon, Rajkarn Singh, Sarah Clinch, Mohammed Khwaja, Neille-Ann H. Tan, Marla Narazani, Mikolaj P. Wozniak, Arshad Nasser, Rahul Majethia, Lucy Van Kleunen, Victoria Neumann
2019 IEEE pervasive computing  
Other talks related to ML covered analyzing audio sensors for social sensing with the goal to identify speakers with only one smartphone by compressing audio that produces a compressed representation,  ...  The 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2019) took place from 9-13 September in London, U.K., colocated with the International Symposium on Wearable Computers  ... 
doi:10.1109/mprv.2019.2947953 fatcat:esojlrp5lzds3pm4qkg6o2plvu

People-to-People-to-Geographical-Places: The P3 Framework for Location-Based Community Systems

Quentin Jones, Sukeshini A. Grandhi, Loren Terveen, Steve Whittaker
2004 Computer Supported Cooperative Work (CSCW)  
Our discussion of the framework suggests new ways of understanding and addressing the privacy concerns associated with location aware community system and outlines additional socio-technical challenges  ...  The P3-System framework organizes existing systems into meaningful categories and structures the design space for an interesting new class of potentially context-aware systems.  ...  We would also like to acknowledge support from The NJ Center for Pervasive Information Technology, funded by the New Jersey Commission on Science and Technology.  ... 
doi:10.1007/s10606-004-2803-7 fatcat:z2qjav5xxbgxfj5zxehtv7mh74

Connecting personal-scale sensing and networked community behavior to infer human activities

Nicholas D. Lane, Li Pengyu, Lin Zhou, Feng Zhao
2014 Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp '14 Adjunct  
from each other or assume group norms due to social pressure.  ...  We propose the Networked Community Behavior (NCB) framework for activity recognition, specifically designed to exploit community-scale behavioral patterns.  ...  From location traces, NCB extracts a social network graph based on similarities in user trajectories and periods of colocation.  ... 
doi:10.1145/2632048.2636094 dblp:conf/huc/LanePZZ14 fatcat:tpkci4jvz5gmdb3l7tl36xe6ya

Artifact awareness through screen sharing for distributed groups

Kimberly Tee, Saul Greenberg, Carl Gutwin
2009 International Journal of Human-Computer Studies  
tasks, determine others' availability, and engage in serendipitous conversation and collaboration.  ...  While privacy was not a large concern for these groups, a theoretical analysis suggests that privacy risks may differ for other user communities. r  ...  Acknowledgements This research was partially funded by Alberta Ingenuity, NSERC, iCORE, and our industrial partners: SMART Technologies and Microsoft.  ... 
doi:10.1016/j.ijhcs.2009.04.001 fatcat:hf46jbnozbdgdhujvzalgvm7d4

EFFECTS OF A GOVERNMENT-ACADEMIC PARTNERSHIP: HAS THE NSF-CENSUS BUREAU RESEARCH NETWORK HELPED IMPROVE THE US STATISTICAL SYSTEM?

Daniel H Weinberg, John M Abowd, Robert F Belli, Noel Cressie, David C Folch, Scott H Holan, Margaret C Levenstein, Kristen M Olson, Jerome P Reiter, Matthew D Shapiro, Jolene D Smyth, Leen-Kiat Soh (+4 others)
2018 Journal of Survey Statistics and Methodology  
The article concludes with an evaluation of the ability of the FSS to apply the NCRN's research outcomes, suggests some next steps, and discusses the implications of this research-network model for future  ...  data-quality tradeoffs; and (6) combining information from multiple sources.  ...  and the ACS), multiple imputation (involving the preparation of synthetic datasets), and the more recently developed method of differential privacy that emanates from cryptography and computer science  ... 
doi:10.1093/jssam/smy023 fatcat:6hyh2g6mbjdrbc5yqbc3lqgwsi

Grand Challenges in Immersive Analytics

Barrett Ens, Benjamin Bach, Maxime Cordeil, Ulrich Engelke, Marcos Serrano, Wesley Willett, Arnaud Prouzeau, Christoph Anthes, Wolfgang Büschel, Cody Dunne, Tim Dwyer, Jens Grubert (+12 others)
2021 Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems  
CCS CONCEPTS • Human-centered computing → HCI theory, concepts and models; Visualization systems and tools; Virtual reality; Mixed / augmented reality.  ...  These challenges aim to coordinate future work by providing a systematic roadmap of current directions and impending hurdles to facilitate productive and effective applications for Immersive Analytics.  ...  Other concerns arise with collaborative applications, where robust privacy settings are needed to prevent sensitive spatial data from being viewed in the wrong context or by collaborators without granted  ... 
doi:10.1145/3411764.3446866 fatcat:byvz63jylzdvhn7tlbfj7v23hy

Location Systems: An Introduction to the Technology Behind Location Awareness

Anthony LaMarca, Eyal de Lara
2008 Synthesis Lectures on Mobile and Pervasive Computing  
Similarly, social roles and interactions can be learned from patterns of colocation [39] , and physical activities and modes of transportation can often be inferred from the changes in coordinate-based  ...  A rich collection of topics lies at the intersections of mobile and pervasive computing with many other areas of computer science.  ...  He has a BS in computer science from the University of California at Berkeley and an MS and PhD in computer science from the University of Washington.  ... 
doi:10.2200/s00115ed1v01y200804mpc004 fatcat:cbvw7weeibhxjnbwnp4y4mat3m

Visualization in Operations Management Research

Rahul Basole, Elliot Bendoly, Aravind Chandrasekaran, Kevin Linderman
2021 INFORMS Journal on Data Science  
We close with a consideration of emerging trends and their implications for researchers and practitioners as well as recommendations for both authors and reviewers, regardless of domain, in evaluating  ...  The unprecedented availability of data, along with the growing variety of software packages to visualize it, presents both opportunities and challenges for operations management (OM) research.  ...  Figure 1 depicts the three generalized stages of research cycles common to OM and other management and social science disciplines with emphasis on the interrelated nature and opportunities for feedback  ... 
doi:10.1287/ijds.2021.0005 fatcat:ccndnxkyzzdcxglhpuce2aj4eq

Potential Neural Mediators of Mom Power Parenting Intervention Effects on Maternal Intersubjectivity and Stress Resilience

S. Shaun Ho, Maria Muzik, Katherine L. Rosenblum, Diana Morelen, Yoshio Nakamura, James E. Swain
2020 Frontiers in Psychiatry  
We examined the CFMT-related neural responses in a sample of healthy mothers (n = 45) in Study 1, and MP effects on CFMT with a pre-intervention (T1) and post-intervention (T2) design in two groups, MP  ...  Additionally, we discussed theoretical relationships between parenting stress and intersubjectivity in a novel dyadic active inference framework in a two-agent system to guide future research.  ...  Mapping Brain Systems to the Active Inference Framework The three systems in the social brain, i.e., the mirroring system, mentalizing system, and salience network can be mapped to three components of  ... 
doi:10.3389/fpsyt.2020.568824 pmid:33363481 pmcid:PMC7752922 fatcat:w66tvpvl65fbrnp7wc43gzfzkm

Geographic 'Place' and 'Community Information' Preferences

Quentin Jones, Sukeshini A. Grandhi, Samer Karam, Steve Whittaker, Changqing Zhou, Loren Terveen
2007 Computer Supported Cooperative Work (CSCW)  
However, acting effectively on this potential requires an understanding of how: (1) places and place-types relate to peopleÕs desire for place-related awareness of and communication with others; and (2  ...  People dynamically structure social interactions and activities at various locations in their environments in specialized types of places such as the office, home, coffee shop, museum and school.  ...  Acknowledgements This material is based on work supported by the United States National Science Foundation under Grant Numbers DST 0308018 and DST 0307459 and IIS 0534520.  ... 
doi:10.1007/s10606-007-9038-3 fatcat:6xhl7ittrve4zhs6mksug3u5sm
« Previous Showing results 1 — 15 out of 102 results