• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

A Survey of Context-Aware Mobile Computing Research (2000)

by G Chen, D Kotz
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 692
Next 10 →

A Context Modeling Survey

by Thomas Strang, Claudia Linnhoff-Popien - In: Workshop on Advanced Context Modelling, Reasoning and Management, UbiComp 2004 - The Sixth International Conference on Ubiquitous Computing, Nottingham/England , 2004
"... Context-awareness is one of the drivers of the ubiquitous computing paradigm, whereas a well designed model is a key accessor to the context in any context-aware system. This paper provides a survey of the the most relevant current approaches to modeling context for ubiquitous computing. Numerous ap ..."
Abstract - Cited by 292 (2 self) - Add to MetaCart
Context-awareness is one of the drivers of the ubiquitous computing paradigm, whereas a well designed model is a key accessor to the context in any context-aware system. This paper provides a survey of the the most relevant current approaches to modeling context for ubiquitous computing. Numerous approaches are reviewed, classified relative to their core elements and evaluated with respect to their appropriateness for ubiquitous computing. 1.
(Show Context)

Citation Context

...odeling approaches under examination in section 4, before we summarize our paper with a conclusion in section 5. 2. FUNDAMENTALS In the literature several definitions of the term context can be found =-=[36, 35, 32, 37, 10, 16, 41]-=-. A detailed discussion of the differences within these definitions is out of the scope of this paper but has some impact on the models introduced in the next section. A selection of some context-awar...

An Ontology for Context-Aware Pervasive Computing Environments

by Harry Chen, Tim Finin, Anupam Joshi - Special Issue on Ontologies for Distributed Systems, Knowledge Engineering Review , 2003
"... Ontologies are a key component for building open and dynamic distributed pervasive computing systems in which agents and devices share contextual information. We describe our use of the Web Ontology Language OWL and other tools for building the foundation ontology for the Context Broker Archite ..."
Abstract - Cited by 257 (9 self) - Add to MetaCart
Ontologies are a key component for building open and dynamic distributed pervasive computing systems in which agents and devices share contextual information. We describe our use of the Web Ontology Language OWL and other tools for building the foundation ontology for the Context Broker Architecture (CoBrA), a new context-aware pervasive computing framework. The current version of the CoBrA ontology models the basic concepts of people, agents, places, and presentation events in an intelligent meeting room environment. It provides a vocabulary of terms for classes and properties suitable for building practical systems that model context in pervasive computing environments. We also describe our ongoing research in developing an OWL inference engine using Flora-2 and in extending the present CoBrA ontology to use the DAML spatial and temporal ontologies.
(Show Context)

Citation Context

...spaces (e.g., intelligent meeting rooms, smart homes, and smart vehicles). Context-aware systems are computer systems that can provide relevant services and information to users by exploiting context =-=[4]-=-. By context, we mean information about a location, its environmental attributes (e.g., noise level, light intensity, temperature, and motion) and the people, devices, objects and software agents it c...

Practical robust localization over large-scale 802.11 wireless networks

by Andreas Haeberlen, Algis Rudys, Eliot Flannery, Dan S. Wallach, Andrew M. Ladd, Lydia E. Kavraki - in Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MOBICOM
"... We demonstrate a system built using probabilistic techniques that allows for remarkably accurate localization across our entire office building using nothing more than the built-in signal intensity meter supplied by standard 802.11 cards. While prior systems have required significant investments of ..."
Abstract - Cited by 189 (2 self) - Add to MetaCart
We demonstrate a system built using probabilistic techniques that allows for remarkably accurate localization across our entire office building using nothing more than the built-in signal intensity meter supplied by standard 802.11 cards. While prior systems have required significant investments of human labor to build a detailed signal map, we can train our system by spending less than one minute per office or region, walking around with a laptop and recording the observed signal intensities of our building’s unmodified base stations. We actually collected over two minutes of data per office or region, about 28 man-hours of effort. Using less than half of this data to train the localizer, we can localize a user to the precise, correct location in over 95 % of our attempts, across the entire building. Even in the most pathological cases, we almost never localize a user any more distant than to the neighboring office. A user can obtain this level of accuracy with only two or three signal intensity measurements, allowing for a high frame rate of localization results. Furthermore, with a brief calibration period, our system can be adapted to work with previously unknown user hardware. We present results demonstrating the robustness of our system against a variety of untrained time-varying phenomena, including the presence or absence of people in the building across the day. Our system is sufficiently robust to enable a variety of locationaware applications without requiring special-purpose hardware or complicated training and calibration procedures.
(Show Context)

Citation Context

...s designed to compensate for variations in hardware and time-varying phenomena. We discuss our results in Section 5 and present our conclusions in Section 6. 1.1 Related work Location-aware computing =-=[10,22]-=- is primarily concerned with determining the location of a mobile computing device. Early inbuilding location-sensing systems required specialized hardware to ascertain a device’s location. For exampl...

WLAN Location Determination via Clustering and Probability Distributions

by Moustafa Youssef, Ashok Agrawala, A. Udaya Shankar - In IEEE PerCom 2003 , 2003
"... We present a WLAN location determination technique, the Joint Clustering technique, that uses (1) signal strength probability distributions to address the noisy wireless channel, and (2) clustering of locations to reduce the computational cost of searching the radio map. The Joint Clustering techniq ..."
Abstract - Cited by 175 (6 self) - Add to MetaCart
We present a WLAN location determination technique, the Joint Clustering technique, that uses (1) signal strength probability distributions to address the noisy wireless channel, and (2) clustering of locations to reduce the computational cost of searching the radio map. The Joint Clustering technique reduces computational cost by more than an order of magnitude, compared to the current state of the art techniques, allowing non-centralized implementation on mobile clients. Results from 802.11-equipped iPAQ implementations show that the new technique gives user location to within 7 feet with over 90% accuracy.
(Show Context)

Citation Context

...e popular, the importance of context-aware applications increases. This in turn fuels the need to determine user location, with which the system can provide location-specific information and services =-=[6]-=-. Many systems over the years have tackled the problem of determining and tracking the user position. Examples include GPS [7], wide-area cellular-based systems [16], infrared-based systems [18, 3], u...

A Statistical Modeling Approach to Location Estimation

by Teemu Roos, Petri Myllymaè Ki, Henry Tirri - IEEE Transactions on Mobile Computing , 2002
"... AbstractÐSome location estimation methods, such as the GPS satellite navigation system, require nonstandard features either in the mobile terminal or the network. Solutions based on generic technologies not intended for location estimation purposes, such as the cell-ID method in GSM/GPRS cellular ne ..."
Abstract - Cited by 107 (2 self) - Add to MetaCart
AbstractÐSome location estimation methods, such as the GPS satellite navigation system, require nonstandard features either in the mobile terminal or the network. Solutions based on generic technologies not intended for location estimation purposes, such as the cell-ID method in GSM/GPRS cellular networks, are usually problematic due to their inadequate location estimation accuracy. In order to enable accurate location estimation when only inaccurate measurements are available, we present an approach to location estimation that is different from the prevailing geometric one. We call our approach the statistical modeling approach. As an example application of the proposed statistical modeling framework, we present a location estimation method based on a statistical signal power model. We also present encouraging empirical results from simulated experiments supported by real-world field tests. Index TermsÐLocation estimation, mobile terminals, signal propagation, statistical modeling. 1
(Show Context)

Citation Context

...minals, signal propagation, statistical modeling. 1 INTRODUCTION LOCATION-AWARE computing is a recent interesting research area that exploits the possibilities of modern communication technology [6], =-=[9]-=-, [14], [17]. Locationaware devices can be located or can locate themselves, while, by location-aware services, we mean services based upon such location technologies. Location-aware computing has gre...

Understanding Mobile Contexts

by Sakari Tamminen, Antti Oulasvirta, Æ Antti Oulasvirta, Kalle Toiskallio, Anu Kankainen , 2004
"... Mobile urban environments present a challenge for context-aware computers because they differ from fixed indoor contexts such as offices, meeting rooms, and lecture halls in many important ways. Internal factors such as tasks and goals are different---external factors such as social resources are dy ..."
Abstract - Cited by 89 (14 self) - Add to MetaCart
Mobile urban environments present a challenge for context-aware computers because they differ from fixed indoor contexts such as offices, meeting rooms, and lecture halls in many important ways. Internal factors such as tasks and goals are different---external factors such as social resources are dynamic and unpredictable. An empirical, user-centred approach is needed to understand mobile contexts. In this paper, we present insights from an ethnomethodologically inspired study of 25 adult urbanites in Helsinki. The results describe typical phenomena in mobility: how situational and planned acts intermesh in navigation, how people construct personal and group spaces, and how temporal tensions develop and dissolve. Furthermore, we provide examples of social solutions to navigation problems, examine mobile multitasking, and consider design implications for mobile and context-aware human-- computer interaction.
(Show Context)

Citation Context

..., and lecture halls. Maybe because of the static nature of such contexts, it has tried to create rigid taxonomies and general “allembracing” definitions of context—with a negligible success (see e.g. =-=[3]-=-).sBecause of having deep social roots and involving dynamically changing environment, mobile context seems to be even tougher concept to be “defined”. Therefore, deciding, from an armchair, which att...

Is Context-Aware Computing Taking Control Away from the User? Three Levels of Interactivity Examined

by Louise Barkhuus, Louise Barkhuus, Anind Dey, Anind Dey - In Proceedings of Ubicomp 2003 , 2003
"... Context-aware computing promises a smooth interaction between humans and technology but few studies have been conducted with regards to how interactive an application should be. After defining three levels of interactivity between a mobile computing device and its user: personalization, passive ..."
Abstract - Cited by 79 (7 self) - Add to MetaCart
Context-aware computing promises a smooth interaction between humans and technology but few studies have been conducted with regards to how interactive an application should be. After defining three levels of interactivity between a mobile computing device and its user: personalization, passive context-awareness and active context-awareness, we test which approach will limit users' perceived sense of control. We also investigate users' preferences for the three approaches. We conducted an experimental case study, using mobile phone applications to exemplify the personalization and context-aware approaches. One result of our study is that users feel less in control when using either passive or active context-aware applications than when personalizing their own applications.
(Show Context)

Citation Context

...formation to the user but lets the user decide how to change the application behavior, where active context-awareness autonomously changes the application behavior according to the sensed information =-=[3]-=-. Drawing on the three types of interaction, it is our belief that users feel a loss of control when using passive or active context-aware applications but not when they personalize their mobile devic...

A data-oriented survey of context models

by Cristiana Bolchini, Carlo A. Curino, Elisa Quintarelli, Fabio A. Schreiber, Letizia Tanca - ACM SIGMOD Record , 2007
"... Context-aware systems are pervading everyday life, therefore context modeling is becoming a relevant issue and an expanding research field. This survey has the goal to provide a comprehensive evaluation framework, allowing application designers to compare context models with respect to a given targe ..."
Abstract - Cited by 75 (8 self) - Add to MetaCart
Context-aware systems are pervading everyday life, therefore context modeling is becoming a relevant issue and an expanding research field. This survey has the goal to provide a comprehensive evaluation framework, allowing application designers to compare context models with respect to a given target application; in particular we stress the analysis of those features which are relevant for the problem of data tailoring. The contribution of this paper is twofold: a general analysis framework for context models and an upto-date comparison of the most interesting, data-oriented approaches available in the literature. 1.
(Show Context)

Citation Context

...erformance of ontology manipulation, while preserving the user perception of operating on the complete ontology. Interesting surveys on context-aware systems and models have already been presented in =-=[5, 14, 39, 45]-=-; we contribute with a review on recent evolutions and new systems for context modeling, and challenge each model with respect to the problem of context-aware data tailoring. We believe that no “silve...

Travel recommender systems

by Francesco Ricci - IEEE Intelligent Systems
"... Mobile phones are becoming a primary platform for information access and when coupled with recommender systems technologies they can become key tools for mobile users both for leisure and business applications. Recommendation techniques can increase the usability of mobile systems providing personal ..."
Abstract - Cited by 68 (15 self) - Add to MetaCart
Mobile phones are becoming a primary platform for information access and when coupled with recommender systems technologies they can become key tools for mobile users both for leisure and business applications. Recommendation techniques can increase the usability of mobile systems providing personalized and more focussed content, hence limiting the negative effects of information overload. In this paper we review the major issues and opportunities that the mobile scenario opens to the application of recommender systems especially in the area of travel and tourism. We overview major techniques that have been proposed in the last years and we illustrate the supported functions. We also illustrate specific computational models that have been proposed for mobile recommender systems and we close the paper by presenting some possible future developments and extension in this area. 1

Metadata creation system for mobile images

by Risto Sarvas, Erick Herrarte, Anita Wilhelm, Marc Davis - In Proceedings of the 2nd international Conference on Mobile Systems, Applications, and Services , 2004
"... The amount of personal digital media is increasing, and managing it has become a pressing problem. Effective management of media content is not possible without content-related metadata. In this paper we describe a content metadata creation process for images taken with a mobile phone. The design go ..."
Abstract - Cited by 64 (13 self) - Add to MetaCart
The amount of personal digital media is increasing, and managing it has become a pressing problem. Effective management of media content is not possible without content-related metadata. In this paper we describe a content metadata creation process for images taken with a mobile phone. The design goals were to automate the creation of image content metadata by leveraging automatically available contextual metadata on the mobile phone, to use similarity processing algorithms for reusing shared metadata and images on a remote server, and to interact with the mobile phone user during image capture to confirm and augment the system supplied metadata. We built a prototype system to evaluate the designed metadata creation process. The main findings were that the creation process could be implemented with current technology and it facilitated the creation of semantic metadata at the time of image capture.
(Show Context)

Citation Context

...e.g., cellID or GPS coordinates),stemporal context (e.g., time, date), social context (e.g., user name,suser profile, presence of other users), and environmental contexts(e.g., temperature, lighting) =-=[6, 15]-=-.sMost of the easily available contextual metadata is semanticallyslow-level information that does not say much to a person aboutsimage contents. For example, location coordinates can be said tosbe ve...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University