Three Dimensional Context-Aware Tailoring of Information

نویسندگان

  • Tor-Morten Grønli
  • George Ghinea
چکیده

Purpose The paper explores the notion of context in ubiquitous computing. Personal Information Managers exploit the ubiquitous paradigm in mobile computing to integrate services and programs for business and leisure. Recognizing that every situation is constituted by information and events, context will vary depending on the situation users are in. The paper aims to show the viability of tailoring contextual information to provide user with timely and relevant information. Design/methodology/approach – An experiment was conducted with testing on a group of real world users. The test group used the application for approximately half a day each and performed a number of tasks Findings – Results from the conducted experiment show the viability of tailoring contextual information to provide user with timely and relevant information. Among the questions in the questionnaire the users were asked to state whether or not they would like to use this application in their daily life. Statistically significant results indicates that the users found value in using the application in a daily life. Originality/value – The novelty in this work is a new exploration and implementation of context by integrating three dimensions of context: social information, activity information and geographical position. ____________________________________________________________ __

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Context-aware Modeling for Spatio-temporal Data Transmitted from a Wireless Body Sensor Network

Context-aware systems must be interoperable and work across different platforms at any time and in any place. Context data collected from wireless body area networks (WBAN) may be heterogeneous and imperfect, which makes their design and implementation difficult. In this research, we introduce a model which takes the dynamic nature of a context-aware system into consideration. This model is con...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Context-Aware Recommender Systems: A Review of the Structure Research

 Recommender systems are a branch of retrieval systems and information matching, which through identifying the interests and requires of the user, help the users achieve the desired information or service through a massive selection of choices. In recent years, the recommender systems apply describing information in the terms of the user, such as location, time, and task, in order to produce re...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Pushing context-awareness down to the core: more flexibility for the PerLa language

Information technology is increasingly pervading our environment, making real Mark Weiser’s vision of a “disappearing technology”. The work described in this paper focuses on using context to enable pervasive system personalization, allowing context-aware sensor-data tailoring. Since sensor networks, besides data collection, are also able to produce active behaviours, the tailoring capabilities...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Online Information Review

دوره 34  شماره 

صفحات  -

تاریخ انتشار 2010