首页 > 最新文献

2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)最新文献

英文 中文
Trust and independence aware decision fusion in distributed networks 分布式网络中信任与独立感知决策融合
Xinlei Wang, Jin-Hee Cho, Kevin S. Chan, Moonjeong Chang, A. Swami, P. Mohapatra
In distributed network environments, decisions must often be made based on incomplete or uncertain evidence whose sources may be dependent. Properly fusing potentially unreliable and dependent information from multiple sources is critical to effective decision making. The Transferable Belief Model (TBM), an extension of Dempster-Shafer Theory (DST), is a well known information fusion framework that can cope with conflicting evidences. However, neither DST nor TBM deals with misbehaving data sources and dependence of fusion data, which are often observed in dynamic multi-hop network environments. In this work, we propose a decision fusion framework that considers multi-dimensional trust and independence of information using a provenance technique, to enhance fusion reliability. We consider three information trust dimensions: correctness, completeness, and timeliness. Our simulation results show that the proposed framework yields a higher correct decision ratio, compared with the baseline counterparts.
在分布式网络环境中,决策通常必须基于不完整或不确定的证据,这些证据的来源可能是依赖的。正确融合来自多个来源的可能不可靠和依赖的信息对于有效决策至关重要。可转移信念模型(TBM)是对Dempster-Shafer理论(DST)的扩展,是一个著名的信息融合框架,可以处理证据冲突。然而,DST和TBM都没有处理在动态多跳网络环境中经常观察到的不正常数据源和融合数据的依赖性。在这项工作中,我们提出了一个考虑多维信任和信息独立性的决策融合框架,使用一种来源技术来提高融合的可靠性。我们考虑三个信息信任维度:正确性、完整性和及时性。仿真结果表明,与基线框架相比,所提出的框架产生了更高的正确决策率。
{"title":"Trust and independence aware decision fusion in distributed networks","authors":"Xinlei Wang, Jin-Hee Cho, Kevin S. Chan, Moonjeong Chang, A. Swami, P. Mohapatra","doi":"10.1109/PerComW.2013.6529545","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529545","url":null,"abstract":"In distributed network environments, decisions must often be made based on incomplete or uncertain evidence whose sources may be dependent. Properly fusing potentially unreliable and dependent information from multiple sources is critical to effective decision making. The Transferable Belief Model (TBM), an extension of Dempster-Shafer Theory (DST), is a well known information fusion framework that can cope with conflicting evidences. However, neither DST nor TBM deals with misbehaving data sources and dependence of fusion data, which are often observed in dynamic multi-hop network environments. In this work, we propose a decision fusion framework that considers multi-dimensional trust and independence of information using a provenance technique, to enhance fusion reliability. We consider three information trust dimensions: correctness, completeness, and timeliness. Our simulation results show that the proposed framework yields a higher correct decision ratio, compared with the baseline counterparts.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"848 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126961037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Evaluating energy-efficiency of hardware-based security mechanisms 评估基于硬件的安全机制的能效
Christian Haas, Stephan Munz, J. Wilke, A. Hergenröder
Security in Wireless Sensor Networks (WSNs) is an omnipresent topic. In many application scenarios, like the surveillance of critical areas or infrastructures, security mechanisms have to be used to build reliable and secure applications. Up to now, most of the used cryptographic algorithms have been implemented in software despite the resource constraints in terms of processing power, memory and energy. In the past few years, the usage of special hardware accelerated security modules has been proposed as a viable alternative to software implementations. However, the energy-efficiency has not yet been evaluated in-depth. In this paper, we analyze the VaultIC420 security module and present an evaluation of its energy-efficiency. We compare the performance and energy-efficiency of the hardware module to common software implementations like TinyECC. For the energy measurements, we use IRIS sensor nodes in the SANDbed testbed at the Karlsruhe Institute of Technology. Our evaluation shows, that the VaultIC420 can save up to 76% of energy using different MAC layer protocols. It also shows, that the current draw of the VaultIC420 requires a duty-cycling mechanisms to achieve any savings compared to the software implementation.
无线传感器网络的安全是一个无处不在的话题。在许多应用程序场景中,例如监视关键区域或基础设施,必须使用安全机制来构建可靠和安全的应用程序。到目前为止,尽管在处理能力、内存和能量方面存在资源限制,但大多数使用的加密算法都是在软件中实现的。在过去的几年中,使用特殊的硬件加速安全模块已被提议作为软件实现的可行替代方案。然而,能源效率尚未得到深入评价。本文对VaultIC420安全模块进行了分析,并对其能效进行了评价。我们将硬件模块的性能和能效与常见的软件实现(如TinyECC)进行了比较。对于能量测量,我们在卡尔斯鲁厄理工学院的SANDbed测试台上使用IRIS传感器节点。我们的评估表明,使用不同的MAC层协议,VaultIC420可以节省高达76%的能源。它还表明,与软件实现相比,VaultIC420的当前绘制需要一个任务循环机制来实现任何节省。
{"title":"Evaluating energy-efficiency of hardware-based security mechanisms","authors":"Christian Haas, Stephan Munz, J. Wilke, A. Hergenröder","doi":"10.1109/PerComW.2013.6529559","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529559","url":null,"abstract":"Security in Wireless Sensor Networks (WSNs) is an omnipresent topic. In many application scenarios, like the surveillance of critical areas or infrastructures, security mechanisms have to be used to build reliable and secure applications. Up to now, most of the used cryptographic algorithms have been implemented in software despite the resource constraints in terms of processing power, memory and energy. In the past few years, the usage of special hardware accelerated security modules has been proposed as a viable alternative to software implementations. However, the energy-efficiency has not yet been evaluated in-depth. In this paper, we analyze the VaultIC420 security module and present an evaluation of its energy-efficiency. We compare the performance and energy-efficiency of the hardware module to common software implementations like TinyECC. For the energy measurements, we use IRIS sensor nodes in the SANDbed testbed at the Karlsruhe Institute of Technology. Our evaluation shows, that the VaultIC420 can save up to 76% of energy using different MAC layer protocols. It also shows, that the current draw of the VaultIC420 requires a duty-cycling mechanisms to achieve any savings compared to the software implementation.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114959504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
User independent, multi-modal spotting of subtle arm actions with minimal training data 用户独立的,多模式的细微的手臂动作与最小的训练数据发现
Gerald Bauer, Ulf Blanke, P. Lukowicz, B. Schiele
We address a specific, particularly difficult class of activity recognition problems defined by (1) subtle, and hardly discriminative hand motions such as a short press or pull, (2) large, ill defined NULL class (any other hand motion a person may express during normal life), and (3) difficulty of collecting sufficient training data, that generalizes well from one to multiple users. In essence we intend to spot activities such as opening a cupboard, pressing a button, or taking an object from a shelve in a large data stream that contains typical every day activity. We focus on body-worn sensors without instrumenting objects, we exploit available infrastructure information, and we perform a one-to-many-users training scheme for minimal training effort. We demonstrate that a state of the art motion sensors based approach performs poorly under such conditions (Equal Error Rate of 18% in our experiments). We present and evaluate a new multi modal system based on a combination of indoor location with a wrist mounted proximity sensor, camera and inertial sensor that raises the EER to 79%.
我们解决了一个特定的,特别困难的一类活动识别问题,其定义为:(1)微妙的,几乎没有区别的手部动作,如短的按压或拉,(2)大的,定义不清的NULL类(一个人在正常生活中可能表达的任何其他手部动作),以及(3)收集足够的训练数据的困难,从一个到多个用户都可以很好地概括。从本质上讲,我们打算在包含典型日常活动的大数据流中发现诸如打开橱柜、按下按钮或从架子上取下物品之类的活动。我们专注于没有仪器对象的身体穿戴传感器,我们利用可用的基础设施信息,我们执行一对多用户培训方案,以减少培训工作量。我们证明,在这种条件下,基于运动传感器的最先进的方法表现不佳(在我们的实验中错误率为18%)。我们提出并评估了一种新的多模态系统,该系统将室内定位与手腕安装的接近传感器、摄像头和惯性传感器相结合,将EER提高到79%。
{"title":"User independent, multi-modal spotting of subtle arm actions with minimal training data","authors":"Gerald Bauer, Ulf Blanke, P. Lukowicz, B. Schiele","doi":"10.1109/PerComW.2013.6529448","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529448","url":null,"abstract":"We address a specific, particularly difficult class of activity recognition problems defined by (1) subtle, and hardly discriminative hand motions such as a short press or pull, (2) large, ill defined NULL class (any other hand motion a person may express during normal life), and (3) difficulty of collecting sufficient training data, that generalizes well from one to multiple users. In essence we intend to spot activities such as opening a cupboard, pressing a button, or taking an object from a shelve in a large data stream that contains typical every day activity. We focus on body-worn sensors without instrumenting objects, we exploit available infrastructure information, and we perform a one-to-many-users training scheme for minimal training effort. We demonstrate that a state of the art motion sensors based approach performs poorly under such conditions (Equal Error Rate of 18% in our experiments). We present and evaluate a new multi modal system based on a combination of indoor location with a wrist mounted proximity sensor, camera and inertial sensor that raises the EER to 79%.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117095308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ineluctable background checking on social networks: Linking job seeker's résumé and posts 社交网络上不可避免的背景调查:将求职者的履历和职位联系起来
Tomotaka Okuno, A. Utsumi, Masatsugu Ichino, H. Yoshiura, I. Echizen
A growing source of concern is that the privacy of individuals can be violated by linking information from multiple sources. For example, the linking of a person's anonymized information with other information about that person can lead to de-anonymization of the person. To investigate the social risks of such linking, we investigated the use of social networks for background checking, which is the process of evaluating the qualifications of job seekers, and evaluated the risk posed by the linking of information the employer already has with information on social networks. After clarifying the risk, we developed a system that links information from different sources: information extracted from a job seeker's résumé and anonymous posts on social networks. The system automatically calculates the similarity between information in the résumé and in the posts, and identifies the job seeker's social network accounts even though the profiles may have been anonymized. As a part of our system, we developed a novel method for quantifying the implications of terms in a résumé by using the posts on social networks. In an evaluation using the résumés of two job seekers and the tweets of 100 users, the system identified the accounts of both job seekers with reasonably good accuracy (true positive rate of 0.941 and true negative rate of 0.999). These findings reveal the real social threat of linking information from different sources. Our research should thus form the basis for further study of the relationship between privacy in social networks and the freedom to express opinions.
越来越令人担忧的是,将来自多个来源的信息链接起来可能会侵犯个人隐私。例如,将一个人的匿名信息与有关该人的其他信息链接起来可能导致该人的去匿名化。为了调查这种链接的社会风险,我们调查了使用社交网络进行背景调查的情况,这是评估求职者资格的过程,并评估了雇主已经拥有的信息与社交网络上的信息链接所带来的风险。在明确了风险之后,我们开发了一个系统,将不同来源的信息联系起来:从求职者的履历和社交网络上的匿名帖子中提取的信息。该系统会自动计算简历和职位信息之间的相似度,并识别求职者的社交网络账户,即使这些个人资料可能是匿名的。作为我们系统的一部分,我们开发了一种新的方法,通过使用社交网络上的帖子来量化一份报告中术语的含义。在使用两个求职者的rsamsumsams和100个用户的tweet进行评估时,系统以相当好的准确率识别了两个求职者的账户(真阳性率为0.941,真阴性率为0.999)。这些发现揭示了将不同来源的信息联系起来的真正的社会威胁。因此,我们的研究应该为进一步研究社交网络中的隐私与表达意见自由之间的关系奠定基础。
{"title":"Ineluctable background checking on social networks: Linking job seeker's résumé and posts","authors":"Tomotaka Okuno, A. Utsumi, Masatsugu Ichino, H. Yoshiura, I. Echizen","doi":"10.1109/PerComW.2013.6529494","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529494","url":null,"abstract":"A growing source of concern is that the privacy of individuals can be violated by linking information from multiple sources. For example, the linking of a person's anonymized information with other information about that person can lead to de-anonymization of the person. To investigate the social risks of such linking, we investigated the use of social networks for background checking, which is the process of evaluating the qualifications of job seekers, and evaluated the risk posed by the linking of information the employer already has with information on social networks. After clarifying the risk, we developed a system that links information from different sources: information extracted from a job seeker's résumé and anonymous posts on social networks. The system automatically calculates the similarity between information in the résumé and in the posts, and identifies the job seeker's social network accounts even though the profiles may have been anonymized. As a part of our system, we developed a novel method for quantifying the implications of terms in a résumé by using the posts on social networks. In an evaluation using the résumés of two job seekers and the tweets of 100 users, the system identified the accounts of both job seekers with reasonably good accuracy (true positive rate of 0.941 and true negative rate of 0.999). These findings reveal the real social threat of linking information from different sources. Our research should thus form the basis for further study of the relationship between privacy in social networks and the freedom to express opinions.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129772122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards monitoring firefighting teams with the smartphone 朝着用智能手机监控消防队的方向发展
S. Feese, B. Arnrich, M. Rossi, G. Tröster, M. Burtscher, Bertolt Meyer, K. Jonas
Two important aspects for efficient and safe firefighting operations are team communication behavior and physical activity coordination. In close cooperation with a firefighting brigade we investigate the potential of modern smartphones to acquire objective data on team communication and physical activity in an automatic way. We envision that such a monitoring is helpful for improving post incident feedback to enhance the efficiency and safety of firefighting operations. In this contribution we present our findings of a feasibility study in which two firefighting teams had to extinguish a kitchen fire. We present the obtained measures of speech and physical activity levels and show how the difference in performance between the two teams can be explained by the smartphone measures.
高效安全消防作业的两个重要方面是团队沟通行为和身体活动协调。在与消防队的密切合作中,我们调查了现代智能手机的潜力,以自动方式获取关于团队沟通和身体活动的客观数据。我们认为,这种监测有助于改善事故后的反馈,从而提高消防行动的效率和安全性。在这篇文章中,我们介绍了我们对可行性研究的发现,其中两个消防小组必须扑灭一场厨房火灾。我们展示了获得的语音和身体活动水平的测量,并展示了两个团队之间的表现差异如何可以通过智能手机测量来解释。
{"title":"Towards monitoring firefighting teams with the smartphone","authors":"S. Feese, B. Arnrich, M. Rossi, G. Tröster, M. Burtscher, Bertolt Meyer, K. Jonas","doi":"10.1109/PerComW.2013.6529521","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529521","url":null,"abstract":"Two important aspects for efficient and safe firefighting operations are team communication behavior and physical activity coordination. In close cooperation with a firefighting brigade we investigate the potential of modern smartphones to acquire objective data on team communication and physical activity in an automatic way. We envision that such a monitoring is helpful for improving post incident feedback to enhance the efficiency and safety of firefighting operations. In this contribution we present our findings of a feasibility study in which two firefighting teams had to extinguish a kitchen fire. We present the obtained measures of speech and physical activity levels and show how the difference in performance between the two teams can be explained by the smartphone measures.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128743610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
HMM-driven Smart White-space-aware Frame Control Protocol for coexistence of ZigBee and WiFi hmm驱动的智能空白感知帧控制协议,用于ZigBee和WiFi共存
Jie Yuan, Ted Ward, Sam Honarvar, Tingting Chen, Johnson P. Thomas
ZigBee has been used more and more extensively in various applications such as wireless patient monitoring, herds monitoring, smart control in home networking and game remote controllers, etc. Most of these applications are performance-sensitive so the throughput and packet delivery ratio should be guaranteed for ZigBee system to work properly. However, since both WiFi and ZigBee are operated in unlicensed ISM spectrum, the interferences from WiFi hotspots make the coexistence of ZigBee and WiFi a big challenge. WiFi traffic contains quite a lot of white spaces between frame clusters in the time domain which could be taken advantage of to improve the performance of the systems with the coexistence of ZigBee and WiFi. Most existing mechanisms dealing with the coexistence of heterogeneous wireless systems neglects this important fact. In this paper, we propose a novel approach that ensures high performance of ZigBee in spite of the presence of strong interference from WiFi, and at the same time keep the WiFi performance almost unaffected. Our approach is to learn a Hidden Markov Model (HMM) based on traces of WiFi white-spaces in the current network. With such a HMM model we can accurately characterize the dynamic distribution of the durations of white spaces in different times. Based on the HMM model of white spaces and the analysis of system performance we develop a novel ZigBee frame control protocol called HMM-driven Smart White-space-aware Frame Control Protocol which can allow ZigBee networks to coexist with WiFi networks with desired link throughput and packet delivery ratio. Some initial experimental results have shown the effectiveness of our protocol.
ZigBee在无线病人监护、畜群监护、家庭联网智能控制、游戏遥控器等各种应用中得到了越来越广泛的应用。这些应用大多对性能很敏感,因此要保证ZigBee系统的正常工作,必须保证吞吐量和分组传输率。然而,由于WiFi和ZigBee都是在未经许可的ISM频谱中运行,WiFi热点的干扰使得ZigBee和WiFi的共存成为一个很大的挑战。WiFi流量在时域中包含大量帧簇之间的空白,利用这些空白可以提高ZigBee和WiFi共存的系统的性能。大多数处理异构无线系统共存的现有机制都忽略了这一重要事实。在本文中,我们提出了一种新的方法,可以在WiFi存在强烈干扰的情况下保证ZigBee的高性能,同时保持WiFi的性能几乎不受影响。我们的方法是基于当前网络中WiFi空白的痕迹来学习隐马尔可夫模型(HMM)。利用该HMM模型,可以准确表征不同时间空白时间的动态分布。基于空白的HMM模型和系统性能分析,我们开发了一种新的ZigBee帧控制协议,即HMM驱动的智能空白感知帧控制协议,该协议可以使ZigBee网络与WiFi网络共存,并具有理想的链路吞吐量和分组传输比。一些初步的实验结果表明了我们的方案的有效性。
{"title":"HMM-driven Smart White-space-aware Frame Control Protocol for coexistence of ZigBee and WiFi","authors":"Jie Yuan, Ted Ward, Sam Honarvar, Tingting Chen, Johnson P. Thomas","doi":"10.1109/PerComW.2013.6529513","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529513","url":null,"abstract":"ZigBee has been used more and more extensively in various applications such as wireless patient monitoring, herds monitoring, smart control in home networking and game remote controllers, etc. Most of these applications are performance-sensitive so the throughput and packet delivery ratio should be guaranteed for ZigBee system to work properly. However, since both WiFi and ZigBee are operated in unlicensed ISM spectrum, the interferences from WiFi hotspots make the coexistence of ZigBee and WiFi a big challenge. WiFi traffic contains quite a lot of white spaces between frame clusters in the time domain which could be taken advantage of to improve the performance of the systems with the coexistence of ZigBee and WiFi. Most existing mechanisms dealing with the coexistence of heterogeneous wireless systems neglects this important fact. In this paper, we propose a novel approach that ensures high performance of ZigBee in spite of the presence of strong interference from WiFi, and at the same time keep the WiFi performance almost unaffected. Our approach is to learn a Hidden Markov Model (HMM) based on traces of WiFi white-spaces in the current network. With such a HMM model we can accurately characterize the dynamic distribution of the durations of white spaces in different times. Based on the HMM model of white spaces and the analysis of system performance we develop a novel ZigBee frame control protocol called HMM-driven Smart White-space-aware Frame Control Protocol which can allow ZigBee networks to coexist with WiFi networks with desired link throughput and packet delivery ratio. Some initial experimental results have shown the effectiveness of our protocol.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130634159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Community context management research and challenges in pervasive and social computing 社区环境管理在普适和社会计算中的研究和挑战
N. Kalatzis, N. Liampotis, I. Roussaki, Pavlos Kosmides, Ioannis V. Papaioannou, S. Xynogalas
Context-awareness is one of the main aspects of pervasive computing environments. Recently, some social networking systems have also started to exploit context information. These two paradigms serve different purposes. Pervasive computing systems have been designed mainly to address the needs of individual users, thus neglecting the social nature of humans. On the other hand, social computing focuses on exploiting the social relations between users, on promoting their interactions and on supporting the sharing of digital resources among them. However, the recent development and popularity of social networking systems has happened in isolation from the developments in pervasive computing. This paper elaborates on the role of context in both pervasive and social computing environments and introduces the approach of the SOCIETIES project that integrates full scale pervasive functionality in social networking systems to develop the next generation of social media systems. Finally, it discusses the new research challenges that emerge in pervasive social media regarding community context-awareness and the respective benefits that the end users may experience.
上下文感知是普适计算环境的一个主要方面。最近,一些社交网络系统也开始利用上下文信息。这两种范式服务于不同的目的。普适计算系统的设计主要是为了满足个人用户的需求,从而忽略了人类的社会本质。另一方面,社会计算侧重于利用用户之间的社会关系,促进用户之间的互动,支持用户之间数字资源的共享。然而,最近社交网络系统的发展和普及与普适计算的发展是分离的。本文详细阐述了上下文在普及和社会计算环境中的作用,并介绍了社会项目的方法,该项目将全面普及的功能集成到社会网络系统中,以开发下一代社会媒体系统。最后,它讨论了在无处不在的社交媒体中出现的关于社区上下文意识的新研究挑战以及最终用户可能体验到的各自好处。
{"title":"Community context management research and challenges in pervasive and social computing","authors":"N. Kalatzis, N. Liampotis, I. Roussaki, Pavlos Kosmides, Ioannis V. Papaioannou, S. Xynogalas","doi":"10.1109/PerComW.2013.6529466","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529466","url":null,"abstract":"Context-awareness is one of the main aspects of pervasive computing environments. Recently, some social networking systems have also started to exploit context information. These two paradigms serve different purposes. Pervasive computing systems have been designed mainly to address the needs of individual users, thus neglecting the social nature of humans. On the other hand, social computing focuses on exploiting the social relations between users, on promoting their interactions and on supporting the sharing of digital resources among them. However, the recent development and popularity of social networking systems has happened in isolation from the developments in pervasive computing. This paper elaborates on the role of context in both pervasive and social computing environments and introduces the approach of the SOCIETIES project that integrates full scale pervasive functionality in social networking systems to develop the next generation of social media systems. Finally, it discusses the new research challenges that emerge in pervasive social media regarding community context-awareness and the respective benefits that the end users may experience.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124018886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Is Twitter a good enough social sensor for sports TV? 对于体育电视来说,Twitter是一个足够好的社交传感器吗?
V. Vasudevan, Jehan Wickramasuriya, Siqi Zhao, Lin Zhong
The globalization of TV programming (especially in the Sports and Reality segments) is leading to a bewildering amount of choice for TV watchers. The social currency around knowing what's happening in these programs as they happen combined with notable undulations in the interestingness of these programs leads to a navigation problem for the TV watcher. The pervasive use of Twitter in conjunction with TV watching makes it a potential sensor for real-time TV, and therefore a building block in solving the user problem of interstitially navigating to the most interesting program at any point in time. Given that users have to tune into shows with peak moments as soon as those peak moments happen, interstitial navigation has to be high enough performance to enable TV event detection and user tune in within tens of seconds of the event. The question being addressed in this paper is - Do Twitter's social sensing capabilities have sufficient precision and timeliness to cater to the `extreme' navigation needs of sports fans? And if so - how can we design a TV event detection framework that can be extended to multiple sports, and beyond sports. We focus on navigation for sports programming in the narrative, as an extremely demanding TV application that also has high market attractiveness. However, we anticipate that the ideas and architecture proposed herein apply to any TV programming that lends itself to interstitial viewing, and elicits a high level of real-time user participation in social networks.
电视节目的全球化(尤其是体育和真人秀节目)给电视观众带来了令人眼花缭乱的选择。当这些节目发生的时候,人们就会知道这些节目中发生了什么,再加上这些节目有趣程度的显著波动,这给电视观众带来了导航问题。Twitter与电视观看相结合的广泛使用使其成为实时电视的潜在传感器,因此它是解决用户在任何时间点上导航到最有趣节目的问题的构建块。考虑到用户必须在高峰时刻出现时立即收听节目,插页式导航必须具有足够高的性能,以便能够检测电视事件,并在事件发生后数十秒内收听节目。本文要解决的问题是——Twitter的社会感知能力是否有足够的精度和及时性来满足体育迷的“极端”导航需求?如果是这样,我们如何设计一个电视事件检测框架,它可以扩展到多个体育项目,甚至超越体育项目。我们专注于体育节目在叙事中的导航,作为一种要求极高的电视应用,也具有很高的市场吸引力。然而,我们期望本文提出的想法和架构适用于任何适合插播式观看的电视节目,并在社交网络中引发高水平的实时用户参与。
{"title":"Is Twitter a good enough social sensor for sports TV?","authors":"V. Vasudevan, Jehan Wickramasuriya, Siqi Zhao, Lin Zhong","doi":"10.1109/PerComW.2013.6529478","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529478","url":null,"abstract":"The globalization of TV programming (especially in the Sports and Reality segments) is leading to a bewildering amount of choice for TV watchers. The social currency around knowing what's happening in these programs as they happen combined with notable undulations in the interestingness of these programs leads to a navigation problem for the TV watcher. The pervasive use of Twitter in conjunction with TV watching makes it a potential sensor for real-time TV, and therefore a building block in solving the user problem of interstitially navigating to the most interesting program at any point in time. Given that users have to tune into shows with peak moments as soon as those peak moments happen, interstitial navigation has to be high enough performance to enable TV event detection and user tune in within tens of seconds of the event. The question being addressed in this paper is - Do Twitter's social sensing capabilities have sufficient precision and timeliness to cater to the `extreme' navigation needs of sports fans? And if so - how can we design a TV event detection framework that can be extended to multiple sports, and beyond sports. We focus on navigation for sports programming in the narrative, as an extremely demanding TV application that also has high market attractiveness. However, we anticipate that the ideas and architecture proposed herein apply to any TV programming that lends itself to interstitial viewing, and elicits a high level of real-time user participation in social networks.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123627428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Improving energy efficiency through activity-aware control of office appliances using proximity sensing - A real-life study 通过使用接近感应的办公设备的活动感知控制来提高能源效率-一项真实的研究
Paola Jaramillo, O. Amft
Energy efficiency is a key operational characteristic of today's office environments. In this paper, we present a system architecture to control desk appliances such as computer screens based on recognised desk and computer work activities. In a real-life intervention study at seven desks, we use screen-attached ultrasound sensors and explore a proximity-based activity recognition approach for saving energy by automatically turing computer screens off when not using them. We analyse online performance of our approach regarding recognition rate and screen resume delay. Furthermore, we present a comparative analysis of our proximity-controlled approach against the computer-controlled power management and a non-controlled baseline to quantify energy saving benefits. Our results show energy savings of up to 43% and 55% for proximity-controlled computer screens compared to computer-controlled and non-controlled scenarios respectively.
能源效率是当今办公环境的一个关键操作特征。在本文中,我们提出了一种基于可识别的桌面和计算机工作活动来控制桌面设备(如计算机屏幕)的系统架构。在一项现实生活中的干预研究中,我们使用了附着在屏幕上的超声波传感器,并探索了一种基于接近度的活动识别方法,通过在不使用电脑屏幕时自动关闭电脑屏幕来节省能源。我们分析了我们的方法在识别率和屏幕恢复延迟方面的在线性能。此外,我们提出了比较分析我们的接近控制方法与计算机控制的电源管理和非控制基线,以量化节能效益。我们的研究结果显示,与计算机控制和非控制场景相比,近距离控制的计算机屏幕分别节省了43%和55%的能源。
{"title":"Improving energy efficiency through activity-aware control of office appliances using proximity sensing - A real-life study","authors":"Paola Jaramillo, O. Amft","doi":"10.1109/PerComW.2013.6529576","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529576","url":null,"abstract":"Energy efficiency is a key operational characteristic of today's office environments. In this paper, we present a system architecture to control desk appliances such as computer screens based on recognised desk and computer work activities. In a real-life intervention study at seven desks, we use screen-attached ultrasound sensors and explore a proximity-based activity recognition approach for saving energy by automatically turing computer screens off when not using them. We analyse online performance of our approach regarding recognition rate and screen resume delay. Furthermore, we present a comparative analysis of our proximity-controlled approach against the computer-controlled power management and a non-controlled baseline to quantify energy saving benefits. Our results show energy savings of up to 43% and 55% for proximity-controlled computer screens compared to computer-controlled and non-controlled scenarios respectively.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123690207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Studying the effectiveness of android application permissions requests 研究android应用程序权限请求的有效性
Kevin Benton, L. Camp, Vaibhav Garg
Popular platforms including Android and Facebook have adopted a permissions-based model. Under this model applications (apps) are required to declare specific access to user information required for functionality. We conducted two user studies on Amazon's Mechanical Turk to test the efficacy of these permissions requests on the Android platform. We found permissions were ineffective, even with the addition of an additional text warning. Conversely, we found that an app's download count had a strong effect on app installations. In order to determine if it was a failure of our text-based warning, we ran a second experiment with a previously proven visual indicator.
包括Android和Facebook在内的流行平台都采用了基于许可的模式。在这个模型下,应用程序需要声明对功能所需的用户信息的特定访问。我们对亚马逊的Mechanical Turk进行了两次用户研究,以测试这些权限请求在Android平台上的有效性。我们发现权限是无效的,即使添加了额外的文本警告。相反,我们发现应用的下载次数对应用安装有很大影响。为了确定这是否是我们基于文本的警告的失败,我们使用先前证明的视觉指示器进行了第二次实验。
{"title":"Studying the effectiveness of android application permissions requests","authors":"Kevin Benton, L. Camp, Vaibhav Garg","doi":"10.1109/PerComW.2013.6529497","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529497","url":null,"abstract":"Popular platforms including Android and Facebook have adopted a permissions-based model. Under this model applications (apps) are required to declare specific access to user information required for functionality. We conducted two user studies on Amazon's Mechanical Turk to test the efficacy of these permissions requests on the Android platform. We found permissions were ineffective, even with the addition of an additional text warning. Conversely, we found that an app's download count had a strong effect on app installations. In order to determine if it was a failure of our text-based warning, we ran a second experiment with a previously proven visual indicator.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127644676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
期刊
2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1