Jogger: models for context-sensitive reminding
نویسندگان
چکیده
We describe research on principles of context-sensitive reminding that show promise for serving in systems that work to jog peoples’ memories about information that they may forget. The methods center on the construction and use of a set of distinct probabilistic models that predict (1) items that may be forgotten, (2) the expected relevance of the items in a situation, and (3) the cost of interruption associated with alerting about a reminder. We describe the use of this set of models in the Jogger prototype that employs predictions and decision-theoretic optimization to compute the value of reminders about meetings.
منابع مشابه
Investigation of Principles of Context-Sensitive Reminding
We describe research on principles of context-sensitive reminding that show promise for serving in systems that work to jog peoples’ memories about information that they may forget. The methods center on the construction and use of a set of distinct probabilistic models that predict (1) items that may be forgotten, (2) the expected relevance of the items, and (3) the cost of interruption associ...
متن کاملRemote analogical reminding.
Remote analogical reminding is hypothesized to occur when one episode is cued by another sharing similar themes but not similar object, character, or event descriptions. We report three experiments exploring this view. Subjects' remindings in Experiment 1 showed sensitivity to remote analogical similarity even though targets were encoded only briefly in an incidental learning paradigm. Experime...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملAn Approach to Context Aware Event Reminding
In this paper we present a method for event reminding. Our method is designed for scheduling leaving time from one location to catch the event at different location. We use a mobile device to track user activities and discover patterns in her activities by analyzing locations where she spends time, time when she is travelling, type of transportation she uses and weather conditions. These observ...
متن کامل