首页 > 最新文献

2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)最新文献

英文 中文
Question first: Passive interaction model for gathering experience and knowledge from the elderly 问题一:向老年人收集经验和知识的被动互动模式
Atsushi Hiyama, Yuki Nagai, M. Hirose, Masatomo Kobayashi, Hironobu Takagi
We propose the "Question First" interaction model, which aims to reduce the barriers to accessing online mobile information transmission for the elderly and aggregate their useful experience and knowledge for younger generations. "Question First" helps elderly users to transfer their knowledge or experiences by simply answering questions through conventional mobile terminals. The proposed interaction model is based on extending conventional interaction modes of phone calls and em ails, helping elderly users become fam iliar with social networking, without the requirement of learning to use social networking service interfaces. Ultimately, we aim to expand the social participation of the elderly in both online communication and online work such as crowdsourcing. We report the results of a two-week user study on the crowdsourcing of participants' experience and knowledge through online communication, and analyze the information obtained to evaluate the efficiency of this interaction model by extracting features of each participant's knowledge and experience via the proposed method.
我们提出了“问题优先”的互动模式,旨在减少老年人访问在线移动信息传播的障碍,并为年轻一代收集他们的有用经验和知识。“问题先行”帮助老年用户通过传统移动终端简单回答问题,传递知识或经验。本文提出的交互模型是在扩展传统的电话和电子邮件交互模式的基础上,帮助老年用户熟悉社交网络,而不需要学习使用社交网络服务接口。最终,我们的目标是扩大老年人在网上交流和网上工作(如众包)方面的社会参与。我们报告了一项为期两周的通过在线交流众包参与者经验和知识的用户研究结果,并通过所提出的方法提取每个参与者的知识和经验特征,分析所获得的信息以评估该交互模型的效率。
{"title":"Question first: Passive interaction model for gathering experience and knowledge from the elderly","authors":"Atsushi Hiyama, Yuki Nagai, M. Hirose, Masatomo Kobayashi, Hironobu Takagi","doi":"10.1109/PerComW.2013.6529473","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529473","url":null,"abstract":"We propose the \"Question First\" interaction model, which aims to reduce the barriers to accessing online mobile information transmission for the elderly and aggregate their useful experience and knowledge for younger generations. \"Question First\" helps elderly users to transfer their knowledge or experiences by simply answering questions through conventional mobile terminals. The proposed interaction model is based on extending conventional interaction modes of phone calls and em ails, helping elderly users become fam iliar with social networking, without the requirement of learning to use social networking service interfaces. Ultimately, we aim to expand the social participation of the elderly in both online communication and online work such as crowdsourcing. We report the results of a two-week user study on the crowdsourcing of participants' experience and knowledge through online communication, and analyze the information obtained to evaluate the efficiency of this interaction model by extracting features of each participant's knowledge and experience via the proposed method.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132469787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Toward large-scale situation awareness applications on camera networks 面向摄像机网络的大规模态势感知应用
Kirak Hong
Ubiquitous deployment of cameras and recent advances in video analytics enable a new class of applications, situation awareness using camera networks. The application class includes surveillance, traffic monitoring, and assisted living that autonomously generate actionable knowledge from a large number of camera streams. Despite technological advances, developing a large-scale situation awareness application still remains a challenge due to the programming complexity, highly dynamic workloads, and latency-sensitive quality of service. To solve the problem, my research topic concerns developing a programming model and a runtime system to support large-scale situation awareness applications on camera networks. The programming model requires a minimal set of domain-specific handlers from the domain experts, allowing them to focus on the algorithmic aspect of situation awareness applications rather than the details of distributed programming. The runtime system provides automatic resource management using smart cameras and the cloud for handling dynamic workloads and ensuring latency-sensitive quality of services.
摄像机无处不在的部署和视频分析的最新进展使使用摄像机网络的新一类应用——态势感知成为可能。应用类包括监控、交通监控和辅助生活,它们可以从大量的摄像头流中自动生成可操作的知识。尽管技术进步了,但由于编程复杂性、高度动态的工作负载和对延迟敏感的服务质量,开发大规模的态势感知应用程序仍然是一个挑战。为了解决这个问题,我的研究课题是开发一个编程模型和一个运行时系统,以支持摄像机网络上的大规模态势感知应用。编程模型需要来自领域专家的一组最小的特定于领域的处理程序,使他们能够专注于情况感知应用程序的算法方面,而不是分布式编程的细节。运行时系统使用智能摄像头和云提供自动资源管理,以处理动态工作负载并确保对延迟敏感的服务质量。
{"title":"Toward large-scale situation awareness applications on camera networks","authors":"Kirak Hong","doi":"10.1109/PerComW.2013.6529530","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529530","url":null,"abstract":"Ubiquitous deployment of cameras and recent advances in video analytics enable a new class of applications, situation awareness using camera networks. The application class includes surveillance, traffic monitoring, and assisted living that autonomously generate actionable knowledge from a large number of camera streams. Despite technological advances, developing a large-scale situation awareness application still remains a challenge due to the programming complexity, highly dynamic workloads, and latency-sensitive quality of service. To solve the problem, my research topic concerns developing a programming model and a runtime system to support large-scale situation awareness applications on camera networks. The programming model requires a minimal set of domain-specific handlers from the domain experts, allowing them to focus on the algorithmic aspect of situation awareness applications rather than the details of distributed programming. The runtime system provides automatic resource management using smart cameras and the cloud for handling dynamic workloads and ensuring latency-sensitive quality of services.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128106681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DiTON: Towards facilitating distributed transactions in opportunistic networks DiTON:在机会主义网络中促进分布式交易
Chance Eary, Mohan J. Kumar, G. Záruba
Opportunistic networks (ONs) exploit mobility of wireless devices to route messages and distribute content independent of fixed network infrastructure. An inherent property of ONs is that the unpredictable mobility of devices results in brief and intermittent connections between networked nodes. This presents a challenge to implementing useful distributed system paradigms, such as distributed transactions. Transactions are a sequence of read and write operations that must be executed in a reliable and coherent fashion, even in the presence of multiple concurrent operations or process failures. Distributed transactions require the participation of multiple processes utilizing data available locally to collaborate with other processes. In this work in progress paper, we outline the requirements behind a novel cache-based mechanism for distributed transactions in ONs. The requirements are defined with the expectation that the proposed mechanism will be robust and energy efficient.
机会网络(on)利用无线设备的移动性来路由消息并独立于固定网络基础设施分发内容。网络的一个固有特性是,设备不可预测的移动性导致网络节点之间的连接短暂而断断续续。这对实现有用的分布式系统范例(如分布式事务)提出了挑战。事务是必须以可靠和一致的方式执行的一系列读写操作,即使在存在多个并发操作或进程失败时也是如此。分布式事务需要多个流程的参与,这些流程利用本地可用的数据与其他流程协作。在这篇正在进行的论文中,我们概述了一种新的基于缓存的分布式事务机制背后的需求。这些要求是根据所提议的机制健壮和节能的期望来定义的。
{"title":"DiTON: Towards facilitating distributed transactions in opportunistic networks","authors":"Chance Eary, Mohan J. Kumar, G. Záruba","doi":"10.1109/PerComW.2013.6529520","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529520","url":null,"abstract":"Opportunistic networks (ONs) exploit mobility of wireless devices to route messages and distribute content independent of fixed network infrastructure. An inherent property of ONs is that the unpredictable mobility of devices results in brief and intermittent connections between networked nodes. This presents a challenge to implementing useful distributed system paradigms, such as distributed transactions. Transactions are a sequence of read and write operations that must be executed in a reliable and coherent fashion, even in the presence of multiple concurrent operations or process failures. Distributed transactions require the participation of multiple processes utilizing data available locally to collaborate with other processes. In this work in progress paper, we outline the requirements behind a novel cache-based mechanism for distributed transactions in ONs. The requirements are defined with the expectation that the proposed mechanism will be robust and energy efficient.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133388997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Signal sensing and modulation classification using pervasive sensor networks 基于普适传感器网络的信号感知与调制分类
W. Su
This paper discusses the use of asynchronous low-cost sensors in distributed locations for sensing and classifying weak wireless signals. This weak signal may not be identified by using a single sensor alone, but can be detected and classified by fusing multiple weak signals collected by sensor networks. The asynchronous signal copies have unwanted offsets in time, frequency, and phase due to the diversities in local oscillators and unknown communication channels. This work proposes a post-synchronization method to estimate and compensate for offsets in the fusion process without adjusting the sensor parameters. The properly combined signal from the distributed sensors achieves a higher processing gain for reliable signal exploitation.
本文讨论了在分布式位置使用异步低成本传感器对微弱无线信号进行感知和分类。这种弱信号可能无法通过单独使用单个传感器来识别,但可以通过融合传感器网络收集的多个弱信号来检测和分类。由于本地振荡器和未知通信信道的多样性,异步信号副本在时间、频率和相位上有不必要的偏移。本文提出了一种无需调整传感器参数即可估计和补偿融合过程中的偏移量的后同步方法。对分布式传感器的信号进行适当的组合,可以获得较高的处理增益,从而实现可靠的信号开发。
{"title":"Signal sensing and modulation classification using pervasive sensor networks","authors":"W. Su","doi":"10.1109/PerComW.2013.6529538","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529538","url":null,"abstract":"This paper discusses the use of asynchronous low-cost sensors in distributed locations for sensing and classifying weak wireless signals. This weak signal may not be identified by using a single sensor alone, but can be detected and classified by fusing multiple weak signals collected by sensor networks. The asynchronous signal copies have unwanted offsets in time, frequency, and phase due to the diversities in local oscillators and unknown communication channels. This work proposes a post-synchronization method to estimate and compensate for offsets in the fusion process without adjusting the sensor parameters. The properly combined signal from the distributed sensors achieves a higher processing gain for reliable signal exploitation.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Managing large-scale mapping and localization for pedestrians using inertial sensors 使用惯性传感器管理大规模的行人映射和定位
Maria Garcia Puyol, P. Robertson, M. Angermann
Pedestrian navigation in indoor environments without a pre-installed infrastructure still presents many challenges. There are different approaches that address the problem using prior knowledge about the environment when the building plans or similar are available. Since this is not always the case, a family of technologies based on the principle of Simultaneous Localization and Mapping (SLAM) has been proposed. In this paper we will present some estimates on how a mapping process based on FootSLAM - a form of SLAM for pedestrians - might scale for a large-scale collaborative effort eventually encompassing most of our public indoor space, where the mapping entities are humans. Our assumptions on pedestrian motion and area visiting rate together with calculations based on the computational requirements of pedestrian SLAM algorithms allow us to make estimates with regard to the feasibility, scalability and computational cost of wide-scale mapping of indoor areas by pedestrians.
在没有预先安装基础设施的室内环境中,行人导航仍然面临许多挑战。当建筑计划或类似的东西可用时,有不同的方法可以利用对环境的先验知识来解决问题。由于情况并非总是如此,因此提出了一系列基于同时定位和映射(SLAM)原理的技术。在本文中,我们将对基于FootSLAM(行人SLAM的一种形式)的测绘过程如何扩展到大规模的协作工作,最终包括我们大部分的公共室内空间,其中的测绘实体是人类,提出一些估计。我们对行人运动和区域访问率的假设,以及基于行人SLAM算法计算需求的计算,使我们能够对行人对室内区域进行大比例尺测绘的可行性、可扩展性和计算成本进行估计。
{"title":"Managing large-scale mapping and localization for pedestrians using inertial sensors","authors":"Maria Garcia Puyol, P. Robertson, M. Angermann","doi":"10.1109/PerComW.2013.6529468","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529468","url":null,"abstract":"Pedestrian navigation in indoor environments without a pre-installed infrastructure still presents many challenges. There are different approaches that address the problem using prior knowledge about the environment when the building plans or similar are available. Since this is not always the case, a family of technologies based on the principle of Simultaneous Localization and Mapping (SLAM) has been proposed. In this paper we will present some estimates on how a mapping process based on FootSLAM - a form of SLAM for pedestrians - might scale for a large-scale collaborative effort eventually encompassing most of our public indoor space, where the mapping entities are humans. Our assumptions on pedestrian motion and area visiting rate together with calculations based on the computational requirements of pedestrian SLAM algorithms allow us to make estimates with regard to the feasibility, scalability and computational cost of wide-scale mapping of indoor areas by pedestrians.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128662466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A taxonomy of cyber attack and defence mechanisms for emergency management networks 应急管理网络的网络攻击和防御机制分类
G. Loukas, D. Gan, Tuan Vuong
Emergency management is increasingly dependent on networks for information gathering, coordination and physical system control, and consequently is increasingly vulnerable to network failures. A cyber attack could cause such network failures intentionally, so as to impede the work of first responders and maximise the impact of a physical emergency. We propose a taxonomy of existing and potential research that is relevant in this setting, covering attack types that have already occurred or are likely to occur, and defence mechanisms that are already in use or would be applicable.
应急管理越来越依赖于网络进行信息收集、协调和物理系统控制,因此越来越容易受到网络故障的影响。网络攻击可能会故意造成这种网络故障,从而阻碍急救人员的工作,并最大限度地发挥物理紧急情况的影响。我们提出了一个与此设置相关的现有和潜在研究的分类法,涵盖了已经发生或可能发生的攻击类型,以及已经使用或将适用的防御机制。
{"title":"A taxonomy of cyber attack and defence mechanisms for emergency management networks","authors":"G. Loukas, D. Gan, Tuan Vuong","doi":"10.1109/PerComW.2013.6529554","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529554","url":null,"abstract":"Emergency management is increasingly dependent on networks for information gathering, coordination and physical system control, and consequently is increasingly vulnerable to network failures. A cyber attack could cause such network failures intentionally, so as to impede the work of first responders and maximise the impact of a physical emergency. We propose a taxonomy of existing and potential research that is relevant in this setting, covering attack types that have already occurred or are likely to occur, and defence mechanisms that are already in use or would be applicable.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"407 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116034593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Who, how, and why? Enhancing privacy awareness in Ubiquitous Computing 谁,怎么做,为什么?在普适计算中提升私隐意识
Bastian Könings, F. Schaub, M. Weber
The combination and integration of sensing and interaction capabilities with almost ubiquitous inter-connectivity are basic requirements for context-aware systems to unobtrusively and invisibly support users in their daily activities. However, the invisible nature of such systems also threatens users' privacy. Users often lack awareness about a system's capabilities to gather data or to intervene in user activities, or even the system's presence. We propose a model to enhance user-centric privacy awareness by consistently modeling observations and disturbances of users. The model allows to capture who is affecting a user's privacy, how privacy is affected, and why it is affected. We further discuss how this model can be instantiated with discovery of channel policies.
感知和交互能力与几乎无处不在的互联性的结合和集成是上下文感知系统在日常活动中不显眼和无形地支持用户的基本要求。然而,这种系统的不可见性也威胁到用户的隐私。用户通常不了解系统收集数据或干预用户活动的能力,甚至不了解系统的存在。我们提出了一个模型,通过一致地建模用户的观察和干扰来增强以用户为中心的隐私意识。该模型允许捕获谁在影响用户的隐私,隐私如何受到影响,以及为什么受到影响。我们将进一步讨论如何通过发现通道策略来实例化该模型。
{"title":"Who, how, and why? Enhancing privacy awareness in Ubiquitous Computing","authors":"Bastian Könings, F. Schaub, M. Weber","doi":"10.1109/PerComW.2013.6529517","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529517","url":null,"abstract":"The combination and integration of sensing and interaction capabilities with almost ubiquitous inter-connectivity are basic requirements for context-aware systems to unobtrusively and invisibly support users in their daily activities. However, the invisible nature of such systems also threatens users' privacy. Users often lack awareness about a system's capabilities to gather data or to intervene in user activities, or even the system's presence. We propose a model to enhance user-centric privacy awareness by consistently modeling observations and disturbances of users. The model allows to capture who is affecting a user's privacy, how privacy is affected, and why it is affected. We further discuss how this model can be instantiated with discovery of channel policies.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117222415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A novel mechanism to construct a compatible overlay on heterogeneous mobile peers 一种在异构移动对等体上构建兼容覆盖的新机制
Chuan-Chi Lai, Chuan-Ming Liu, Ying-Chi Su
As the mobile computing environment emerges, people can use different mobile devices to access information ubiquitously. This has shifted the researchers' sights to Mobile P2P (MP2P) systems, where the membership among peers is more dynamic and ad hoc. In the ubiquitous environments, the mobile devices generally are heterogeneous. In this paper, we consider the MP2P systems where the mobile peers are heterogeneous and propose a mechanism, named Heterogeneity-aware Overlay Technique (HOT), to build up an unstructured overlay. The proposed mechanism considers the overall ability, including power, network, CPU, and memory to set up the overlay. An ability equation is thus defined and the resulting overlay can ensure a good quality of service while the topology mismatching problem is alleviated. Last, we present our simulation for the proposed mechanism and compare the results with other related approaches. The simulation result shows that our proposed mechanism can effectively achieve a better service quality and mitigate the topology mismatching problem.
随着移动计算环境的出现,人们可以使用不同的移动设备无处不在地访问信息。这将研究人员的目光转向了移动P2P (MP2P)系统,在这种系统中,对等体之间的成员关系更加动态和特别。在无处不在的环境中,移动设备通常是异构的。在本文中,我们考虑了移动对等体是异构的MP2P系统,并提出了一种机制,称为异构感知覆盖技术(HOT),以建立一个非结构化的覆盖。提出的机制考虑了建立覆盖的整体能力,包括电源、网络、CPU和内存。由此定义了一个能力方程,得到的叠加在保证良好的服务质量的同时减轻了拓扑不匹配问题。最后,我们对所提出的机制进行了仿真,并将结果与其他相关方法进行了比较。仿真结果表明,该机制能够有效地提高服务质量,缓解拓扑不匹配问题。
{"title":"A novel mechanism to construct a compatible overlay on heterogeneous mobile peers","authors":"Chuan-Chi Lai, Chuan-Ming Liu, Ying-Chi Su","doi":"10.1109/PerComW.2013.6529460","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529460","url":null,"abstract":"As the mobile computing environment emerges, people can use different mobile devices to access information ubiquitously. This has shifted the researchers' sights to Mobile P2P (MP2P) systems, where the membership among peers is more dynamic and ad hoc. In the ubiquitous environments, the mobile devices generally are heterogeneous. In this paper, we consider the MP2P systems where the mobile peers are heterogeneous and propose a mechanism, named Heterogeneity-aware Overlay Technique (HOT), to build up an unstructured overlay. The proposed mechanism considers the overall ability, including power, network, CPU, and memory to set up the overlay. An ability equation is thus defined and the resulting overlay can ensure a good quality of service while the topology mismatching problem is alleviated. Last, we present our simulation for the proposed mechanism and compare the results with other related approaches. The simulation result shows that our proposed mechanism can effectively achieve a better service quality and mitigate the topology mismatching problem.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125387883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Constructivist ambient intelligent agent for smart environments 智能环境的建构主义环境智能体
A. Najjar, P. Reignier
Building a smart home is a multi-disciplinary and challenging problem. Our goal is to build an agent that can propose context aware services to the users. High variability of users' needs and the uniqueness of every home are difficult to handle using “Classical AI”. We propose an alternative approach inspired by Developmental Artificial Intelligence and Constructivism Theory. Being constructivist means that the agent builds its knowledge in situ through user's interactions. This continuous interaction process enables the user to customize or bring up the system to meet his personal needs. We have made a first experiment by learning schemas from a simulated two-weeks home scenario. This preliminary experiment gives us indications that Constructivism is a promising approach for ambient intelligence.
建设智能家居是一个多学科的、具有挑战性的问题。我们的目标是构建一个能够向用户提供上下文感知服务的代理。用户需求的高度可变性和每个家庭的独特性很难用“经典人工智能”来处理。我们提出了一种受发展人工智能和建构主义理论启发的替代方法。建构主义意味着智能体通过用户的交互在原地构建其知识。这种持续的交互过程使用户能够定制或启动系统以满足他的个人需求。我们做了第一个实验,从一个模拟的两周家庭场景中学习图式。这一初步实验表明,建构主义是研究环境智能的一种很有前途的方法。
{"title":"Constructivist ambient intelligent agent for smart environments","authors":"A. Najjar, P. Reignier","doi":"10.1109/PerComW.2013.6529515","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529515","url":null,"abstract":"Building a smart home is a multi-disciplinary and challenging problem. Our goal is to build an agent that can propose context aware services to the users. High variability of users' needs and the uniqueness of every home are difficult to handle using “Classical AI”. We propose an alternative approach inspired by Developmental Artificial Intelligence and Constructivism Theory. Being constructivist means that the agent builds its knowledge in situ through user's interactions. This continuous interaction process enables the user to customize or bring up the system to meet his personal needs. We have made a first experiment by learning schemas from a simulated two-weeks home scenario. This preliminary experiment gives us indications that Constructivism is a promising approach for ambient intelligence.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125402267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
How many places do you visit a day? 你一天参观几个地方?
Michela Papandrea, Matteo Zignani, S. Gaito, S. Giordano, G. P. Rossi
People mobility enormously augmented in the last decades. However, despite the increased possibilities of fast reaching far places, the places that a person commonly visits remain limited in number. The number of visited places of each person is regulated by some laws that are statistically similar among individuals. In our previous work, we firstly argued that a person visit most frequently always few places, and we confirmed that by some initial experiments. Here, in addition to further validating this result, we build a more sophisticate view of the places visited by the people. Namely, on top of our previous work, which identifies the class of Mostly Visited Points of Interest, we define two next classes: the Occasionally and the Exceptionally Visited Points of Interest classes. We argue and validate on real data, that also the occasional places are very limited in number, while the exceptional ones can grow at will, and by the analysis of the classes of visited points we can distinguish the type of users mobility. This paper firstly demonstrates this property in large experimental scenario, and put the basis for new understanding of people places in several areas as localization, social interactions and human mobility modelling.
在过去的几十年里,人们的流动性大大增强了。然而,尽管快速到达遥远地方的可能性增加了,人们经常去的地方数量仍然有限。每个人访问的地方的数量是由一些法律规定的,这些法律在统计上是相似的。在我们之前的工作中,我们首先提出一个人去的最频繁的地方总是很少的,我们通过一些初步的实验证实了这一点。在这里,除了进一步验证这一结果外,我们还建立了一个更复杂的人们访问过的地方的视图。也就是说,在我们之前的工作的基础上,我们确定了最常访问的兴趣点类,我们定义了两个接下来的类:偶尔访问的兴趣点类和特别访问的兴趣点类。我们在真实数据上论证和验证,偶尔出现的地点数量也非常有限,而特殊的地方可以随意增长,通过对访问点的分类分析,我们可以区分用户移动的类型。本文首先在大型实验场景中证明了这一特性,并在定位、社会互动和人类流动建模等几个领域为人们对地点的新理解奠定了基础。
{"title":"How many places do you visit a day?","authors":"Michela Papandrea, Matteo Zignani, S. Gaito, S. Giordano, G. P. Rossi","doi":"10.1109/PerComW.2013.6529485","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529485","url":null,"abstract":"People mobility enormously augmented in the last decades. However, despite the increased possibilities of fast reaching far places, the places that a person commonly visits remain limited in number. The number of visited places of each person is regulated by some laws that are statistically similar among individuals. In our previous work, we firstly argued that a person visit most frequently always few places, and we confirmed that by some initial experiments. Here, in addition to further validating this result, we build a more sophisticate view of the places visited by the people. Namely, on top of our previous work, which identifies the class of Mostly Visited Points of Interest, we define two next classes: the Occasionally and the Exceptionally Visited Points of Interest classes. We argue and validate on real data, that also the occasional places are very limited in number, while the exceptional ones can grow at will, and by the analysis of the classes of visited points we can distinguish the type of users mobility. This paper firstly demonstrates this property in large experimental scenario, and put the basis for new understanding of people places in several areas as localization, social interactions and human mobility modelling.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127079238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
期刊
2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1