Jogger: models for context-sensitive reminding

نویسندگان

  • Ece Kamar
  • Eric Horvitz
چکیده

We describe research on principles of context-sensitive reminding that show promise for serving in systems that work to jog peoples’ memories about information that they may forget. The methods center on the construction and use of a set of distinct probabilistic models that predict (1) items that may be forgotten, (2) the expected relevance of the items in a situation, and (3) the cost of interruption associated with alerting about a reminder. We describe the use of this set of models in the Jogger prototype that employs predictions and decision-theoretic optimization to compute the value of reminders about meetings.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigation of Principles of Context-Sensitive Reminding

We describe research on principles of context-sensitive reminding that show promise for serving in systems that work to jog peoples’ memories about information that they may forget. The methods center on the construction and use of a set of distinct probabilistic models that predict (1) items that may be forgotten, (2) the expected relevance of the items, and (3) the cost of interruption associ...

متن کامل

Remote analogical reminding.

Remote analogical reminding is hypothesized to occur when one episode is cued by another sharing similar themes but not similar object, character, or event descriptions. We report three experiments exploring this view. Subjects' remindings in Experiment 1 showed sensitivity to remote analogical similarity even though targets were encoded only briefly in an incidental learning paradigm. Experime...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

An Approach to Context Aware Event Reminding

In this paper we present a method for event reminding. Our method is designed for scheduling leaving time from one location to catch the event at different location. We use a mobile device to track user activities and discover patterns in her activities by analyzing locations where she spends time, time when she is travelling, type of transportation she uses and weather conditions. These observ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011