Using Context for Supporting Users Efficiently
نویسنده
چکیده
A good software is a software that is invisible for the user. This is possible by making context explicit in the software. The increasingly interest for the notion of context appears through the number of approaches based on it. Initially, context was mainly considered in Engineering and Cognitive Science. Now even in Engineering, one sees two sub-approaches considering context at the level of the knowledge or the data, namely context-based and context-aware systems. For contextbased systems, most of the non formal approaches focus, in one way or another, on context in relationships with the user, aiming at a good computer system that is invisible for the user. Context-aware systems are concerned indirectly with users through a modeling of their dynamic environment. In this paper, we present, first, different viewpoints on context related to humanmachine interaction. We then consider why we need to focus on users through two aspects, on the one hand, on planning and plan execution, and, on the other hand, procedures and practice. The lesson learned is that an improvement of user’s support needs a consideration of
منابع مشابه
A semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملInformation Architecture of Research Institutes’ Website, Case Study: Iranian Research Institute for Information Science and Technology’s Website
Purpose: As mission-oriented organizations, research institutes have the task of answering community questions in specialized areas, and should therefore be able to effectively present their outputs to their target users. Achieving such a goal requires the proper use of information architecture principles to properly organize the information platform in which the research institutes interact wi...
متن کاملCommunication Support Technologies for e-Learners
Advancements in telecommunication services and networking, have remarkably improved information communication services. The growing need of proper and secure communication is based on using appropriate communication technologies to work effectively and efficiently to meet the objectives of the information users. For some time this has been a great problem. For example, if one element e.g. a cab...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملEffective Context and Familial Conditions on Drug Addiction Relapse: A Qualitative Study
Introduction: Family is one of the causative factors of initiation and relapse of addictive behaviors. Family is like a double-edged sword due to the fact that family may function both as a supporter of drug users as well as a shield to protect them against their withdrawal hardships, and also a cause of drug addiction relapse. Lack of sufficient knowledge and domestic studies on this issue, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003