首页 > 最新文献

Advances in Mobile Multimedia最新文献

英文 中文
Secure and usable authentication on mobile devices 在移动设备上安全且可用的身份验证
Pub Date : 2012-12-03 DOI: 10.1145/2428955.2429004
R. Schlöglhofer, J. Sametinger
Mobile devices contain a multitude of sensitive data and provide access to even more data as well as services somewhere on the Internet. Even if only temporarily in the hands of non-entitled persons, privacy is at stake. Authentication protects against unauthorized usage. Today's operating systems of mobile devices offer authentication mechanisms. However, they are either vulnerable in some situations or not user friendly enough to be widely adopted. In this paper we suggest a novel authentication system which meets both the requirements of security and usability. For that purpose, we have analyzed existing authentication methods as well as targeting attacks. The resulting Android application SecureLock is a generic authentication system, which offers PIN and password, but also a property-based authentication method by means of NFC tags, and a novel image-based method called GesturePuzzle. The application has been evaluated and compared with other approaches for security and usability.
移动设备包含大量敏感数据,并提供对更多数据以及互联网上某处服务的访问。即使只是暂时掌握在没有资格的人手中,隐私也受到了威胁。身份验证可以防止未经授权的使用。今天的移动设备操作系统提供身份验证机制。然而,它们要么在某些情况下很脆弱,要么不够用户友好,无法被广泛采用。本文提出了一种既满足安全性要求又满足可用性要求的新型认证系统。为此,我们分析了现有的身份验证方法以及目标攻击。由此产生的Android应用SecureLock是一个通用的身份验证系统,它提供PIN和密码,但也提供基于NFC标签的基于属性的身份验证方法,以及一种名为gesturezzle的基于图像的新方法。对该应用程序进行了评估,并与其他方法进行了安全性和可用性的比较。
{"title":"Secure and usable authentication on mobile devices","authors":"R. Schlöglhofer, J. Sametinger","doi":"10.1145/2428955.2429004","DOIUrl":"https://doi.org/10.1145/2428955.2429004","url":null,"abstract":"Mobile devices contain a multitude of sensitive data and provide access to even more data as well as services somewhere on the Internet. Even if only temporarily in the hands of non-entitled persons, privacy is at stake. Authentication protects against unauthorized usage. Today's operating systems of mobile devices offer authentication mechanisms. However, they are either vulnerable in some situations or not user friendly enough to be widely adopted. In this paper we suggest a novel authentication system which meets both the requirements of security and usability. For that purpose, we have analyzed existing authentication methods as well as targeting attacks. The resulting Android application SecureLock is a generic authentication system, which offers PIN and password, but also a property-based authentication method by means of NFC tags, and a novel image-based method called GesturePuzzle. The application has been evaluated and compared with other approaches for security and usability.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123078103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
SAPHE: simple accelerometer based wireless pairing with heuristic trees SAPHE:基于启发式树的简单加速度计无线配对
Pub Date : 2012-12-03 DOI: 10.1145/2428955.2428989
B. Groza, R. Mayrhofer
Accelerometers provide a good source of entropy for bootstrapping a secure communication channel in autonomous and spontaneous interactions between mobile devices that share a common context but were not previously associated. We propose two simple and efficient key exchange protocols based on accelerometer data that use only simple hash functions combined with heuristic search trees. Using heuristics such as the Euclidean distance proves to be beneficial as it allows a more effective recovery of the shared key. While the first protocol seems to give just some performance improvements, the second, which we call hashed heuristic tree, is more secure than previous proposals since it increases the difference in protocol execution between benign and malicious parties. Nevertheless, the hashed heuristic tree is an entirely new approach which has the advantage of allowing different heuristics in the search, leaving plenty of room for future variants and optimizations.
加速度计提供了一个很好的熵源,用于在共享公共上下文但以前没有关联的移动设备之间的自主和自发交互中引导安全通信通道。我们提出了两种简单有效的基于加速度计数据的密钥交换协议,它们只使用简单的哈希函数和启发式搜索树。使用诸如欧几里得距离之类的启发式方法被证明是有益的,因为它允许更有效地恢复共享密钥。虽然第一个协议似乎只提供了一些性能改进,但第二个协议,我们称之为哈希启发式树,比以前的提议更安全,因为它增加了良性和恶意方之间协议执行的差异。然而,散列启发式树是一种全新的方法,它的优点是允许在搜索中使用不同的启发式方法,为未来的变体和优化留下了足够的空间。
{"title":"SAPHE: simple accelerometer based wireless pairing with heuristic trees","authors":"B. Groza, R. Mayrhofer","doi":"10.1145/2428955.2428989","DOIUrl":"https://doi.org/10.1145/2428955.2428989","url":null,"abstract":"Accelerometers provide a good source of entropy for bootstrapping a secure communication channel in autonomous and spontaneous interactions between mobile devices that share a common context but were not previously associated. We propose two simple and efficient key exchange protocols based on accelerometer data that use only simple hash functions combined with heuristic search trees. Using heuristics such as the Euclidean distance proves to be beneficial as it allows a more effective recovery of the shared key. While the first protocol seems to give just some performance improvements, the second, which we call hashed heuristic tree, is more secure than previous proposals since it increases the difference in protocol execution between benign and malicious parties. Nevertheless, the hashed heuristic tree is an entirely new approach which has the advantage of allowing different heuristics in the search, leaving plenty of room for future variants and optimizations.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117140271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Towards face unlock: on the difficulty of reliably detecting faces on mobile phones 面向人脸解锁:关于在手机上可靠检测人脸的困难
Pub Date : 2012-12-03 DOI: 10.1145/2428955.2429008
R. Findling, R. Mayrhofer
Currently, reliable face detection and recognition are becoming more important on mobile devices -- e.g. to unlock the screen. However, using only frontal face images for authentication purposes can no longer be considered secure under the assumption of easy availability of frontal snapshots of the respective device owners from social networks or other media. In most current implementations, a sufficiently high-resolution face image displayed on another mobile device will be enough to circumvent security measures. In this paper, we analyze current methods to face detection and recognition regarding their usability in the mobile domain, and then propose an approach to a Face Unlock system on a smart phone intended to be more secure than current approaches while still being convenient to use: we use both frontal and profile face information available during a pan shot around the user's head, by combining camera images and movement sensor data. Current results to face detection are promising, but reliable face recognition needs further research.
目前,可靠的人脸检测和识别在移动设备上变得越来越重要,例如解锁屏幕。然而,在假设从社交网络或其他媒体上可以轻松获得各自设备所有者的正面快照的情况下,仅使用正面图像进行身份验证不再被认为是安全的。在目前的大多数实现中,在另一个移动设备上显示足够高分辨率的人脸图像将足以绕过安全措施。在本文中,我们分析了当前的人脸检测和识别方法在移动领域的可用性,然后提出了一种智能手机上的人脸解锁系统的方法,该方法比目前的方法更安全,同时仍然方便使用:我们通过结合相机图像和运动传感器数据,在用户头部周围的平移拍摄过程中使用正面和侧面人脸信息。目前人脸检测的研究成果很有前景,但可靠的人脸识别还有待进一步研究。
{"title":"Towards face unlock: on the difficulty of reliably detecting faces on mobile phones","authors":"R. Findling, R. Mayrhofer","doi":"10.1145/2428955.2429008","DOIUrl":"https://doi.org/10.1145/2428955.2429008","url":null,"abstract":"Currently, reliable face detection and recognition are becoming more important on mobile devices -- e.g. to unlock the screen. However, using only frontal face images for authentication purposes can no longer be considered secure under the assumption of easy availability of frontal snapshots of the respective device owners from social networks or other media. In most current implementations, a sufficiently high-resolution face image displayed on another mobile device will be enough to circumvent security measures. In this paper, we analyze current methods to face detection and recognition regarding their usability in the mobile domain, and then propose an approach to a Face Unlock system on a smart phone intended to be more secure than current approaches while still being convenient to use: we use both frontal and profile face information available during a pan shot around the user's head, by combining camera images and movement sensor data. Current results to face detection are promising, but reliable face recognition needs further research.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123558936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
An accurate lecture video segmentation method by using sift and adaptive threshold 一种基于sift和自适应阈值的演讲视频精确分割方法
Pub Date : 2012-12-03 DOI: 10.1145/2428955.2429011
H. Jeong, Tak-Eun Kim, Myoung-Ho Kim
Much research has been done in the past for segmenting lecture videos by detecting slide transitions. However, they do not perform well on certain kinds of videos recorded under non-stationary settings: the changes of a camera position or focus during a lecture. Since such non-stationary settings greatly affect visual properties of slides, the existing approaches utilizing global features and a global threshold, often have trouble in computing similarities between slides. In this paper, we propose a highly accurate method for lecture video segmentation by using SIFT and an adaptive threshold. By using SIFT, we can reliably match two slides whose contents are the same but are visually different. We also propose an adaptive threshold selection algorithm that detects slide transitions accurately by considering characteristics of features. Through various experiments that use real lecture videos, we show that our method provides 30% improvement in the average F1-score over other existing methods.
在过去,通过检测幻灯片过渡来分割讲座视频已经做了很多研究。然而,它们在非固定设置下录制的某些类型的视频中表现不佳:在讲座期间相机位置或焦点的变化。由于这种非平稳设置极大地影响了幻灯片的视觉属性,现有的利用全局特征和全局阈值的方法在计算幻灯片之间的相似度时经常遇到麻烦。本文提出了一种基于SIFT和自适应阈值的演讲视频分割方法。通过SIFT,我们可以可靠地匹配两张内容相同但视觉上不同的幻灯片。我们还提出了一种自适应阈值选择算法,该算法通过考虑特征的特征来准确检测滑动过渡。通过使用真实讲座视频的各种实验,我们表明我们的方法比其他现有方法的平均f1分数提高了30%。
{"title":"An accurate lecture video segmentation method by using sift and adaptive threshold","authors":"H. Jeong, Tak-Eun Kim, Myoung-Ho Kim","doi":"10.1145/2428955.2429011","DOIUrl":"https://doi.org/10.1145/2428955.2429011","url":null,"abstract":"Much research has been done in the past for segmenting lecture videos by detecting slide transitions. However, they do not perform well on certain kinds of videos recorded under non-stationary settings: the changes of a camera position or focus during a lecture. Since such non-stationary settings greatly affect visual properties of slides, the existing approaches utilizing global features and a global threshold, often have trouble in computing similarities between slides. In this paper, we propose a highly accurate method for lecture video segmentation by using SIFT and an adaptive threshold. By using SIFT, we can reliably match two slides whose contents are the same but are visually different. We also propose an adaptive threshold selection algorithm that detects slide transitions accurately by considering characteristics of features. Through various experiments that use real lecture videos, we show that our method provides 30% improvement in the average F1-score over other existing methods.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133939431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Service level agreement (SLA) assurance for cloud services: a survey from a transactional risk perspective 云服务的服务水平协议(SLA)保证:从事务风险角度的调查
Pub Date : 2012-12-03 DOI: 10.1145/2428955.2429005
Le Sun, Jaipal Singh, O. Hussain
Cloud computing is a new paradigm for service-based computing and is gaining popularity. An efficient way for the assurances of the expected service levels in cloud computing is to establish a tailor-made Service Level Agreement (SLA) and to ensure the commitment of SLAs by service providers. In this paper, we conduct a survey of the state of the art in cloud SLA assurance from two aspects -- pre- and post-interaction phases, based on which research gaps in existing approaches are identified. New research requirements for SLA assurance are then presented.
云计算是基于服务的计算的一种新范式,并且越来越受欢迎。保证云计算中预期服务水平的一种有效方法是建立定制的服务水平协议(SLA),并确保服务提供商对SLA的承诺。在本文中,我们从交互前和交互后两个方面对云SLA保证的现状进行了调查,并在此基础上确定了现有方法中的研究差距。然后提出了SLA保证的新研究需求。
{"title":"Service level agreement (SLA) assurance for cloud services: a survey from a transactional risk perspective","authors":"Le Sun, Jaipal Singh, O. Hussain","doi":"10.1145/2428955.2429005","DOIUrl":"https://doi.org/10.1145/2428955.2429005","url":null,"abstract":"Cloud computing is a new paradigm for service-based computing and is gaining popularity. An efficient way for the assurances of the expected service levels in cloud computing is to establish a tailor-made Service Level Agreement (SLA) and to ensure the commitment of SLAs by service providers. In this paper, we conduct a survey of the state of the art in cloud SLA assurance from two aspects -- pre- and post-interaction phases, based on which research gaps in existing approaches are identified. New research requirements for SLA assurance are then presented.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133691845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Be-code: information embedding for logo images Be-code:标识图像信息嵌入
Pub Date : 2012-12-03 DOI: 10.1145/2428955.2429015
Kazuha Yamada, Y. Yamashita, M. Toyoura, Xiaoyang Mao, Satoshi Takatsu, Chihiro Sugawara
2D image codes are widely used for inputting information to mobile devices with cameras. QR code is a typical example of such codes. Conventional image codes do not have semantics in images themselves. Such codes may spoil the quality of design when attached on commercial products. We propose a novel code, Be-code, for embedding data into logo images. Be-code is generated from a logo image by modifying some of the edge pixels according to the bits to be embedded, but avoiding causing obvious change to the appearance of the original logo image. Algorithm for extracting information from the camera captured Be-code is also presented. The original logo image is not required in decoding. In experiments, embedded data could be decoded at a high success rate.
二维图像代码被广泛用于向带有摄像头的移动设备输入信息。QR码是这类代码的典型例子。传统的图像代码在图像本身中没有语义。当这些规范被附加在商业产品上时,可能会破坏设计的质量。我们提出了一种新的代码,Be-code,用于将数据嵌入到徽标图像中。be -code是通过根据要嵌入的位修改一些边缘像素从标志图像生成的,但避免对原始标志图像的外观造成明显的变化。提出了从摄像机捕获的Be-code中提取信息的算法。在解码时不需要原始徽标图像。在实验中,嵌入式数据的解码成功率很高。
{"title":"Be-code: information embedding for logo images","authors":"Kazuha Yamada, Y. Yamashita, M. Toyoura, Xiaoyang Mao, Satoshi Takatsu, Chihiro Sugawara","doi":"10.1145/2428955.2429015","DOIUrl":"https://doi.org/10.1145/2428955.2429015","url":null,"abstract":"2D image codes are widely used for inputting information to mobile devices with cameras. QR code is a typical example of such codes. Conventional image codes do not have semantics in images themselves. Such codes may spoil the quality of design when attached on commercial products. We propose a novel code, Be-code, for embedding data into logo images. Be-code is generated from a logo image by modifying some of the edge pixels according to the bits to be embedded, but avoiding causing obvious change to the appearance of the original logo image. Algorithm for extracting information from the camera captured Be-code is also presented. The original logo image is not required in decoding. In experiments, embedded data could be decoded at a high success rate.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115475923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic video content annotation at the object level 对象级语义视频内容注释
Pub Date : 2012-12-03 DOI: 10.1145/2428955.2428991
Vanessa El-Khoury, Martin Jergler, David Coquil, H. Kosch
A vital prerequisite for fine-grained video content processing (indexing, querying, retrieval, adaptation, etc.) is the production of accurate metadata describing its structure and semantics. Several annotation tools were presented in the literature generating metadata at different granularities (i.e. scenes, shots, frames, objects). These tools have a number of limitations with respect to the annotation of objects. Though they provide functionalities to localize and annotate an object in a frame, the propagation of this information in the next frames still requires human intervention. Furthermore, they are based on video models that lack expressiveness along the spatial and semantic dimensions. To address these shortcomings, we propose the Semantic Video Content Annotation Tool (SVCAT) for structural and high-level semantic annotation. SVCAT is a semi-automatic annotation tool compliant with the MPEG-7 standard, which produces metadata according to an object-based video content model described in this paper. In particular, the novelty of SVCAT lies in its automatic propagation of the object localization and description metadata realized by tracking their contour through the video, thus drastically alleviating the task of the annotator. Experimental results show that SVCAT provides accurate metadata to object-based applications, particularly exact contours of multiple deformable objects.
细粒度视频内容处理(索引、查询、检索、改编等)的一个重要先决条件是生成描述其结构和语义的准确元数据。文献中提出了几种标注工具,用于生成不同粒度(即场景、镜头、帧、对象)的元数据。这些工具在对象注释方面有许多限制。尽管它们提供了在框架中对对象进行本地化和注释的功能,但是在下一个框架中传播这些信息仍然需要人工干预。此外,它们基于视频模型,缺乏空间和语义维度的表达能力。为了解决这些问题,我们提出了语义视频内容注释工具(SVCAT),用于结构和高级语义注释。SVCAT是一种符合MPEG-7标准的半自动标注工具,它根据本文描述的基于对象的视频内容模型生成元数据。特别是,SVCAT的新颖之处在于,它通过视频跟踪物体的轮廓来实现物体定位和描述元数据的自动传播,从而大大减轻了注释者的任务。实验结果表明,SVCAT为基于对象的应用提供了准确的元数据,特别是多个可变形对象的精确轮廓。
{"title":"Semantic video content annotation at the object level","authors":"Vanessa El-Khoury, Martin Jergler, David Coquil, H. Kosch","doi":"10.1145/2428955.2428991","DOIUrl":"https://doi.org/10.1145/2428955.2428991","url":null,"abstract":"A vital prerequisite for fine-grained video content processing (indexing, querying, retrieval, adaptation, etc.) is the production of accurate metadata describing its structure and semantics. Several annotation tools were presented in the literature generating metadata at different granularities (i.e. scenes, shots, frames, objects). These tools have a number of limitations with respect to the annotation of objects. Though they provide functionalities to localize and annotate an object in a frame, the propagation of this information in the next frames still requires human intervention. Furthermore, they are based on video models that lack expressiveness along the spatial and semantic dimensions. To address these shortcomings, we propose the Semantic Video Content Annotation Tool (SVCAT) for structural and high-level semantic annotation. SVCAT is a semi-automatic annotation tool compliant with the MPEG-7 standard, which produces metadata according to an object-based video content model described in this paper. In particular, the novelty of SVCAT lies in its automatic propagation of the object localization and description metadata realized by tracking their contour through the video, thus drastically alleviating the task of the annotator. Experimental results show that SVCAT provides accurate metadata to object-based applications, particularly exact contours of multiple deformable objects.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121935627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The adoption of mobile tourism services: an empirical study 移动旅游服务的采用:实证研究
Pub Date : 2012-12-03 DOI: 10.1145/2428955.2428972
Shang Gao, Per Christian Røinend, J. Krogstie
This study is investigating the adoption of mobile tourism services in Norway. By expanding the Technology Acceptance Model (TAM), a research model, called mobile services acceptance model including seven research hypotheses is presented. The proposed research model and research hypotheses were empirically tested using data collected from a survey of 47 users of a mobile tourism service called extended Mobile Tourist Service Recommender (MTSR) in a city in Norway. The findings indicated that the fitness of the research model is good and strong support was found for the seven research hypotheses. Among all the factors, the personal initiatives and characteristics had the most significant influence on the intention to use MTSR.
本研究旨在调查挪威移动旅游服务的采用情况。通过对技术接受模型(TAM)的扩展,提出了包含7个研究假设的移动服务接受模型。本文通过对挪威某城市47名移动旅游服务扩展移动旅游服务推荐(MTSR)用户的调查数据,对提出的研究模型和研究假设进行了实证检验。研究结果表明,研究模型的适应度较好,七个研究假设得到了强有力的支持。在所有因素中,个人主动性和特征对MTSR使用意愿的影响最为显著。
{"title":"The adoption of mobile tourism services: an empirical study","authors":"Shang Gao, Per Christian Røinend, J. Krogstie","doi":"10.1145/2428955.2428972","DOIUrl":"https://doi.org/10.1145/2428955.2428972","url":null,"abstract":"This study is investigating the adoption of mobile tourism services in Norway. By expanding the Technology Acceptance Model (TAM), a research model, called mobile services acceptance model including seven research hypotheses is presented. The proposed research model and research hypotheses were empirically tested using data collected from a survey of 47 users of a mobile tourism service called extended Mobile Tourist Service Recommender (MTSR) in a city in Norway. The findings indicated that the fitness of the research model is good and strong support was found for the seven research hypotheses. Among all the factors, the personal initiatives and characteristics had the most significant influence on the intention to use MTSR.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129623181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Do not judge an interactive book by its cover: a field research 不要从封面来判断一本互动书籍:实地研究
Pub Date : 2012-12-03 DOI: 10.1145/2428955.2428966
Selene Uras, Daniele Ardu, Gavino Paddeu, M. Deriu
In this paper we report the results of a field research performed on Wonderbook (WB), an augmented book created for the local science festival and appositely developed to transmit formative concepts concerning ICT (Information Communication Technology). We believe that it is important to establish whether interactive installations enriched with enjoyable contents could be an efficacy modality to transmit learning concepts, thus we have performed a field analysis comprising different measures such as field observation, semi-structured interviews, focus groups organized before and after the visit to the festival, self reports (both drawings and written compositions); we have also collected log file data of the interactive application to have also an objective measure. We especially focus on gathering the maximum number of information both from the interactive process and from the pre-existing knowledge in order to be able to evaluate the efficacy of WB to transmit learning concepts. We believe that this research could be useful for developing and evaluating the potentiality of similar interactive installations used in formative contexts.
在本文中,我们报告了对Wonderbook (WB)进行实地研究的结果,Wonderbook是为当地科学节创建的一本增强书,并适当地开发用于传播有关ICT(信息通信技术)的形成性概念。我们认为,重要的是要确定充满愉快内容的互动装置是否可以成为传递学习概念的有效方式,因此我们进行了现场分析,包括不同的措施,如实地观察,半结构化访谈,在参观艺术节前后组织的焦点小组,自我报告(包括图纸和书面作文);我们还收集了交互式应用程序的日志文件数据,以便有一个客观的度量。我们特别关注从交互过程和已有知识中收集最大数量的信息,以便能够评估WB传递学习概念的功效。我们相信,这项研究可能有助于开发和评估在形成环境中使用的类似互动装置的潜力。
{"title":"Do not judge an interactive book by its cover: a field research","authors":"Selene Uras, Daniele Ardu, Gavino Paddeu, M. Deriu","doi":"10.1145/2428955.2428966","DOIUrl":"https://doi.org/10.1145/2428955.2428966","url":null,"abstract":"In this paper we report the results of a field research performed on Wonderbook (WB), an augmented book created for the local science festival and appositely developed to transmit formative concepts concerning ICT (Information Communication Technology). We believe that it is important to establish whether interactive installations enriched with enjoyable contents could be an efficacy modality to transmit learning concepts, thus we have performed a field analysis comprising different measures such as field observation, semi-structured interviews, focus groups organized before and after the visit to the festival, self reports (both drawings and written compositions); we have also collected log file data of the interactive application to have also an objective measure. We especially focus on gathering the maximum number of information both from the interactive process and from the pre-existing knowledge in order to be able to evaluate the efficacy of WB to transmit learning concepts.\u0000 We believe that this research could be useful for developing and evaluating the potentiality of similar interactive installations used in formative contexts.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127280219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A fuzzy-based data replication system for QoS improvement in MANETs 一种基于模糊的无线网络QoS改进数据复制系统
Pub Date : 2012-12-03 DOI: 10.1145/2428955.2428997
L. Barolli, Evjola Spaho, Makoto Ikeda, Elis Kulla, F. Xhafa, M. Younas
In Mobile Ad hoc Networks (MANETs), mobile wireless devices communicate together in an autonomous fashion. The transmission is done by multi-hop routes. Because of mobility and limited resources in MANET, it is difficult to guarantee the QoS requirements. In this work, we propose a fuzzy-based system, which improves the QoS of MANETs via data replication. We aim to support critical requirement applications based on MANETs such as disaster management scenarios in which data retrieval is an important requirement to support real time decision making. There are several techniques to optimize data replication strategy for this task. In this paper, we use fuzzy logic and build a system which has three input linguistic parameters and one output linguistic parameter. We evaluate by simulations the proposed system. The simulation results show that the proposed system has a good decision.
在移动自组织网络(manet)中,移动无线设备以自主方式进行通信。传输是通过多跳路由完成的。由于MANET的移动性和资源的有限性,很难保证QoS的要求。在这项工作中,我们提出了一个基于模糊的系统,该系统通过数据复制来提高manet的QoS。我们的目标是支持基于manet的关键需求应用程序,例如灾难管理场景,其中数据检索是支持实时决策的重要需求。有几种技术可以优化此任务的数据复制策略。本文运用模糊逻辑,构建了一个具有三个输入语言参数和一个输出语言参数的系统。通过仿真对所提出的系统进行了评价。仿真结果表明,该系统具有良好的决策效果。
{"title":"A fuzzy-based data replication system for QoS improvement in MANETs","authors":"L. Barolli, Evjola Spaho, Makoto Ikeda, Elis Kulla, F. Xhafa, M. Younas","doi":"10.1145/2428955.2428997","DOIUrl":"https://doi.org/10.1145/2428955.2428997","url":null,"abstract":"In Mobile Ad hoc Networks (MANETs), mobile wireless devices communicate together in an autonomous fashion. The transmission is done by multi-hop routes. Because of mobility and limited resources in MANET, it is difficult to guarantee the QoS requirements. In this work, we propose a fuzzy-based system, which improves the QoS of MANETs via data replication. We aim to support critical requirement applications based on MANETs such as disaster management scenarios in which data retrieval is an important requirement to support real time decision making. There are several techniques to optimize data replication strategy for this task. In this paper, we use fuzzy logic and build a system which has three input linguistic parameters and one output linguistic parameter. We evaluate by simulations the proposed system. The simulation results show that the proposed system has a good decision.","PeriodicalId":135195,"journal":{"name":"Advances in Mobile Multimedia","volume":"66 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132313921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Advances in Mobile Multimedia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1