Assessing Level of Ubiquitous Computing Services for Ubiquitous Business Design
|
|
- Philomena Sanders
- 5 years ago
- Views:
Transcription
1 Sep Journal of Electronic Science and Technology of China Vol.2 No.3 Assessing Level of Ubiquitous Computing Services for Ubiquitous Business Design KWON Ohbyung (College of Management and International Relations, Kyunghee University Kyunggi Korea) Abstract We are entering into a new era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge sharing, and calm services. Some people refer to this as the ubiquitous network business model because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Moreover, immediate access to ideas, goods, and services will be of greater value than the traditional model of permanent and ponderous possession. This paper illustrates how ubiquitous computing technology can be combined with legacy computer-based information systems, along with thoughts on relevant issues of ubiquitous commerce. We also propose a model for how to assess levels of ubiquitous computing services. Key words ubiquitous computing service; AHP; ubiquitous business Methodologies for assessing the service levels and/or systems performance levels are still very rare. An approach for assessing the level of ubiquitous computing services is described. We have observed 23 service scenarios and then propose and discuss two criteria for evaluation criteria: level of ubiquity and level of usage. The level of ubiquity consists of personalization, context-awareness, intelligence, security&privacy, interface, and overall system level, whereas the level of usage consists of perceived usefulness, perceived ease of use, and task/technology fit. An analytical hierarchy process (AHP) model was developed as an assessment model. Evaluating levels of service is useful for analyzing who may be potential services users. Today, the focus is dramatically increasing for applying ubiquitous computing technology to create innovative services. Ubiquitous business is a kind of business that is enabled by ubiquitous computing technology. The abilities of the technology allow the business to find potential demand from all over the world, to distribute business units and/or functionalities remotely, and to co-operate more efficiently with other companies. Mobile business also includes increased capabilities, such as mobility and portability. These increased abilities allow customers access to advertisements at a particular point of interest. For example, customers can enter an online marketplace any time, anywhere, with their own portable devices. Although to date researchers have suggested several service scenarios and prototype systems that adopt ubiquitous computing technology, methodologies for assessing the service levels and/or systems performance levels are still very rare. Hence, this paper presents an approach for assessing the level of ubiquitous computing services. Until now, none was available. The remainder of the paper is organized as follows. In Section 2, we provide an overview ubiquitous computing and services. Sections 3 and 4 discuss the evaluation criteria of ubiquitous computing services with technology-driven and utility-driven perspectives, respectively. In section 5, we describe the design of the assessment model. In Section 6, we review our general conclusions. 1 Ubiquitous Computing Currently, researchers have proposed a variety of Received
2 No.3 KWON Ohbyung: Assessing Level of Ubiquitous Computing Services for Ubiquitous Business Design 141 ubiquitous services. In Ref. [1], We have selected 23 services from the literature and have classified them based on two dimensions: technical viability and business viability. As shown in Fig.1, the services located in the lower left area of the graph are believed to be available shortly. Low Business viability High u-smart home u-lease u-healthy home u-exhibition u-airport u-post u-supermarket u-hospital u-environmental protection u-campus u-home entertainment u-kindergarten u-office u-agriculture u-bending machine u-car u-travel u-warranty service u-logistics u-home u-edutainment u-marketing management u-banking High Technical viability Fig. 1 Ubiquitous computing services Low These services will be implemented in a similar manner as information systems. The current framework of computer-based information systems, despite its diversity, can be simplified as a combination of several components: data, model, knowledge, and dialog, with the help of networks. Based on the framework, an overall framework of ubiquitous service is shown in Fig.2. Sensors End users Anytime anywhere With any devices Events Acquisition module Dialogue subsystem Multimodal Context DB Context Inference module Action request module Context subsystem Application system Fig. 2 An overall framework of ubiquitous service Database Management Subsystem Controller Web Augmented Reality Multimedia Despite the improved availability that ubiquitous services have in overall framework and example services, a methodology for evaluating service levels is so far quite rare. The business viability and technical viability are useful for identifying the priority of services in terms of commercialization. However, evaluating which fit which particular services, in order to improve that service s level of market acceptance, is still a challenge. In other words, level of services need to be identified. Therefore, in this paper we propose a three dimensional view of ubiquitous computing services, including level of services, as shown in Fig.3. Level of services Business viability Technical viability Fig.3 A three dimensional view of the locus of ubiquitous computing services To begin building evaluation criteria for a ubiquitous computing service, we revisit the ideals that its initiator Marc Wesiser envisioned: As technology becomes more embedded and invisible, it calms our lives by removing the annoyances while keeping us connected with what is truly important. From the above sentence, we can extract some essential such as embeddedness, invisibility, and unobtrusinvess. Accordingly, in the next two sections, we propose and discuss two criteria for evaluation criteria: level of ubiquity and level of usage. 2 Level of Ubiquity: the Six Technology-Driven Evaluation Criteria for Ubiquitous Computing Services 2.1 Personalization In terms of service levels, three levels of services have been proposed [2] : personalization, passive context-aware, and active context-aware services. In the personalization service level, users manually provide profile, preference and contextual data. The
3 142 Journal of Electronic Science and Technology of China Vol.2 passive context-aware service automatically captures the user s context from the federated sensors. The service, however, is activated by events triggered by the user. For example, when a user clicks a menu in the interface, the service displays some recommendations about the restaurants. An active context-aware service not only describes applications that autonomously change their own content, but it can also trigger itself for proactive service. In this scenario, the user does not need to initiate any actions to start the service, nor is there a need to manually input personal or contextual data. Browns and Jonescall the active context-aware service proactive [3]. The push approach described by Chevist et al. also uses the same proactive concept [4], while passive context-aware and personalization services are described as the pull approach Proactive ubiquitous services that are based on an active context-aware service in turn can be classified as pull-based, push-based, and push-based automated modes. 2.2 Context Awareness Most of the legacy context-aware services [6~8] depend simply on location, providing location-based services. To overcome this limitation, we will use four kinds of context that Abowd previously classified [9] : TILE Time, Identity, Location, Entity. The context of time can be acquired when mobile devices such as PDAs or Bluetooth Service Provider Machines communicate with each other for a synchronized service. Identity context is information on other people around whom the current user is located. Using location context is one of the fundamental activities of the legacy context-aware system and tends to be co-leveraged with other contexts in order to derive internal context, rather than using location information directly on its own. Entity context is the data of sensed objects that Bluetooth hardware detects within the vicinity of the user s current location. Meanwhile, context-aware services may involve a variety of context, which can consist of both primitive and composite contexts. Composite context data are acquired with at least one kind of primitive context, which can be sensed by various sensors. [5]. 2.3 Intelligence The state that describes the maturity of the ubiquitous computing technology is known as calmness, following Weiser s original description. Learning, reasoning, and autonomy capabilities are selected to assess the level of intelligence. 2.4 Security & Privacy One key hurdle to ubiquitous computing, aside from technical advances, are concerns about users privacy. According to the vision of ubiquitous computing known as disappearing technology or calm technology, the invisibility must be found in the goal state of the ubiquitous computing services. However, invisibility can be an inhibitor of ubiquitous computing service usage due to security and privacy concerns. Hence, service providers must be attentive to these security and privacy concerns in order to effectively increase levels of service. 2.5 Overall Service Level Since ubiquitous computing is a type of information system, or at least adopts the typical evaluation criteria of information systems such response time, scalability, correctness, extendibility, etc., these should all be included in the assessment. 3 Level of Usage: the Usage Driven Evaluation Criteria of Ubiquitous Computing Services Systems levels of information technology or system have long been regarded as determinants of its overall effectiveness. In this paper, we advocate a more socio-technical approach to ubiquitous computing services as information systems. The outstanding research models on IT usage are task acceptance model (TAM) and task/technology fit (TTF) models. Perceived usefulness In Ref. [10], perceived usefulness is defined as the degree to which a person believes that using a particular system would enhance her/his job performance. This notion is known as a determinant of some user performance measures such as user participation, user involvement, and user attitude [11]. Perceived ease of use Perceived ease of use is the degree to which a
4 No.3 KWON Ohbyung: Assessing Level of Ubiquitous Computing Services for Ubiquitous Business Design 143 person believes that using a particular system would be free of effort [12]. Perceived ease of use is thought to be determined by intrinsic motivation, control, and emotion [13]. In many literatures [5,12,14~21], the concept has been regarded as crucial when deciding if an information technology would be acceptable to an individual or an organization. Perceived ease of use is also adaptable to test how an information system is acceptable by the enterprise [22]. These discussions naturally lead us to consider perceived ease of use to assess the level of ubiquitous computing services. Task/technology fit Goodhue explored Task/Technology Fit (TTF), which suggests that better outcomes (i.e., performance) will result when there is a match between the task and the technology used [18]. Items assessed by the Task/Technology Fit model include the quality, currency, relevance and ease of determining what data is available and where, ease of use of the system [10], response time, user satisfaction [23], and how the data displayed is readable and usable [24]. The measures could be subjective or objective. 4 An Assessment Model By the two categories of the criteria level of ubiquity and that of usage an AHP model to assess the level of ubiquitous computing service is developed as shown in Fig. 4. Using the level of ubiquitous computing services, the next question is to estimate potential demand: who will be the buyers of the service? To do this, a variety of methods can be suggested. In this paper, we propose a relative level of service approach to demand identification. The underlying assumption is that the potential buyer would compare a particular ubiquitous computing service with legacy services to determine if she/he would better replace the legacy service with the new service. Hence, the buying decision is subjective and relative. Factors of each criterion for determining level of service (LoS) are listed in Tab.1. 5 Concluding Remarks In this paper, we have proposed a method to assess ubiquitous computing services and systems in terms of level of service. AHP is adopted to represent the assessment model, which includes both technology-driven and utility-driven criteria. One of the main contributions of this paper is that we include both behavioral aspects, as well as technical aspects, for consideration in the assessment. We have included a broad range of each: criteria for five technical aspects and three behavioral aspects. Evaluating levels of service is useful for analyzing who may be potential services users. We believe that ubiquitous computing technology s commercial success would rely on how the level of service itself is suited to the user s level, as well as conventional business success such as financial planning. Level of Ubiquitous Computing Service Level of Ubiquity Level of Usage Overall Service level Personalizat-ion Context awareness Intelligence Security & Privacy Perceived usefulness Perceived ease of use Task/ technology fit Overall Service level Personalization Context awareness Intelligence Security & Privacy Perceived usefulness Perceived ease of use Task/ Technology fit Fig.4 An AHP model of ubiquitous computing service evaluation
5 144 Journal of Electronic Science and Technology of China Vol.2 Tab.1 Criteria of estimating level of service of ubiquitous computing services Criteria Factors Range User preference Personaliz ation Context-a wareness Intelligenc e Security & Privacy Interface Overall service level User profile User context Location tracking Time tracking Identity tracking Entity tracking Seamlessness Composite context Context reusability Service coverage Learning Reasoning Autonomy Ad hoc collaboration negotiation Standardization Trust Privacy detection Authentication Authorization Usability Pull & push End user s device Response time Conversion efforts Scalability Extendibility Reconfigurability no, bounded, yes indoor, outdoor by restricted, anywhere pull only, push only, all {PDA, cellular phone, multimodal, etc.} Not satisfactory, so so, satisfactory Not satisfactory, so so, satisfactory Not considered, considered Not considered, considered Not considered, considered The assessment model proposed here is not yet validated yet. Some significant criteria might be unconsidered and omitted. The correctness of the AHP model depends on the correctness of the relative importance of the criteria. The Delphi method will be useful to identify the relative importance of the criteria for further evaluation of actual services. Acknowledgements This research is partially supported by the Ubiquitous Autonomic Computing and Network Project, the Ministry of Science and Technology (MOST) 21st Century Frontier R&D Program in Korea. References [1] Lee H G, Kwon O B. The 1st Annual Report on the Ubiquitous Computing Services [M]. MOST, Korea: 2004 [2] Barkhuus L, Dey A. Is Context-Aware Computing Taking Control Away from the User? Three Levels of Interactivity Examined[C]. Proceeding of the 5th International Conference on Ubiquitous Computing, Seattle USA, Oct 2003: [3] Browns P J, Jones G J F. Context-aware retrieval: Exploring a new environment for information retrieval and information filtering[j]. Personal and Ubiquitous Computing, 2001, 5(4): [4] Chevist K, Mitchell K, Davis N, et al. Investigating Context-Aware Information Push vs. Information Pull to Tourists[C]. Proceedings of Mobile HCI2001, Lille, France, 2001 [5] Davis F D. User acceptance of information technology: system characteristics, user perceptions and behavioral impacts [J]. International Journal of Man-Machine Studies, 1993, 38(3): [6] Schilit B N, Adams N I, Want R, et al. Context-Aware Computing Applications[C]. Proceedings of 1st International Workshop on Mobile Computing Systems and Applications, Santa Cruz, California, 1994: [7] Schilit B N, Adams N, Gold R, et al. The PARCTAB Mobile Computing System[C]. Proceedings of the Fourth Workshop on Workstation Operating Systems (WWOS-IV), Napa USA: October 1993: [8] Want R, Hopper A, Falcao V, et al. The active badge location system[j]. ACM Transactions on Information Systems, 1992, 10(1): [9] Abowd G D. Software Engineering Issues for Ubiquitous Computing [C]. Proceedings of ICSE'99, Los Angeles, CA: May 1999 [10] Davis F D. Perceived usefulness, perceived ease of use and user acceptance of information technology[j] MIS Quarterly, 1989, 13(3): [11] Barki H, Hartwick J. Measuring user participation, user involvement, and user attitude[j]. MIS Quarterly, 1994, 18(1): [12] Igbaria M, Zinatelli N, Cragg P, et al. Personal computing
6 No.3 KWON Ohbyung: Assessing Level of Ubiquitous Computing Services for Ubiquitous Business Design 145 acceptance in small firms: A structural equation model [J]. MIS Quarterly, 1997, 21(3): [13] Venkatesh V. Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model [J]. Information Systems Research, 2000, 11(4): [14] Adams D A, Nelson R R, Todd P A, et al. Perceived usefulness, ease of use, and usage of information technology: A replication [J]. MIS Quarterly, Jun 1992, 16(2): [15] Baroudi J J, Olson M H, Ives B, et al. An empirical study of the impact of user involvement on system usage and information satisfaction[j]. Communications of the ACM, 1986, 29(3): [16] Davis F D, Bagozzi R P, Warshaw P R, et al. User acceptance of computer technology: A comparison of two theoretical models [J]. Management Science, 1989, 35(8): [17] Gelderman M. The relation between user satisfaction, usage of information systems and performance[j]. Information And Management, 1998, 34(1): [18] Goodhue D L, Thompson R L. Task-technology fit and individual performance[j]. MIS Quarterly, 1995, 19(2): [19] Igbaria M, Iivari J, Maragahh H, et al. Why do individuals use computer technology? A Finnish case study[j]. Information And Management, 1995, 29(5): [20] Subramanian G H. A replication of perceived usefulness and perceived ease of use measurement[j]. Decision Sciences, 1994, 25(5/6): [21] Szajna B. Determining information system usage: Some issues and examples [J]. Information and Management, 1993, 25(3): [22] Jackson C M, Chow S. Toward an understanding of the behavioral intention to use an information system [J]. Decision Sciences, 1997, 28(2): [23] Bailey J E, Sammy W P. Development of a tool for measuring and analyzing computer user satisfaction [J]. Management Science, 1983, 29(5): [24] Zmud R W. An empirical investigation of the dimensionality of the concept of information[j]. Decision Sciences, 1978, 9(2): Brief Introduction to Author(s) KWON Ohbyung is an associate professor of college of management and international relations in Kyunghee university, Korea. He received the B.S. degree in business administration from Seoul National University and M.S and Ph.D. in management information system from Korea Advanced Institute of Science and Technology. In 1996, he has worked for Yanbian University, Jilin, China. His current interests include: decision support systems, agent-based technology, ubiquitous computing services, and mobile commerce.
Wireless B2B Mobile Commerce: A Study on the Usability, Acceptance, and Process Fit
Wireless B2B Mobile Commerce: A Study on the Usability, Acceptance, and Process Fit Submitted to: The Workshop on Ubiquitous Computing Environments Michele L. Gribbins, Judith Gebauer, Michael J. Shaw
More informationINTERACTION AND SOCIAL ISSUES IN A HUMAN-CENTERED REACTIVE ENVIRONMENT
INTERACTION AND SOCIAL ISSUES IN A HUMAN-CENTERED REACTIVE ENVIRONMENT TAYSHENG JENG, CHIA-HSUN LEE, CHI CHEN, YU-PIN MA Department of Architecture, National Cheng Kung University No. 1, University Road,
More informationENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS
BY SERAFIN BENTO MASTER OF SCIENCE in INFORMATION SYSTEMS Edmonton, Alberta September, 2015 ABSTRACT The popularity of software agents demands for more comprehensive HAI design processes. The outcome of
More informationHELPING THE DESIGN OF MIXED SYSTEMS
HELPING THE DESIGN OF MIXED SYSTEMS Céline Coutrix Grenoble Informatics Laboratory (LIG) University of Grenoble 1, France Abstract Several interaction paradigms are considered in pervasive computing environments.
More informationCharting Past, Present, and Future Research in Ubiquitous Computing
Charting Past, Present, and Future Research in Ubiquitous Computing Gregory D. Abowd and Elizabeth D. Mynatt Sajid Sadi MAS.961 Introduction Mark Wieser outlined the basic tenets of ubicomp in 1991 The
More informationUbiquitous Home Simulation Using Augmented Reality
Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January 17-19, 2007 112 Ubiquitous Home Simulation Using Augmented Reality JAE YEOL
More informationUser interface for remote control robot
User interface for remote control robot Gi-Oh Kim*, and Jae-Wook Jeon ** * Department of Electronic and Electric Engineering, SungKyunKwan University, Suwon, Korea (Tel : +8--0-737; E-mail: gurugio@ece.skku.ac.kr)
More informationAn Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation
Computer and Information Science; Vol. 9, No. 1; 2016 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education An Integrated Expert User with End User in Technology Acceptance
More informationSpace Copy & Paste: Grabbing Space- Based User Experience to Support Reminiscence
Space Copy & Paste: Grabbing Space- Based User Experience to Support Reminiscence Ohbyung Kwon obkwon@khu.ac.kr Jae Mun Sim deskmoon@khu.co.kr Nam Yeon Lee Research Center for Ubiquitous Business and Services
More informationContext Information vs. Sensor Information: A Model for Categorizing Context in Context-Aware Mobile Computing
Context Information vs. Sensor Information: A Model for Categorizing Context in Context-Aware Mobile Computing Louise Barkhuus Department of Design and Use of Information Technology The IT University of
More informationContext-Aware Interaction in a Mobile Environment
Context-Aware Interaction in a Mobile Environment Daniela Fogli 1, Fabio Pittarello 2, Augusto Celentano 2, and Piero Mussio 1 1 Università degli Studi di Brescia, Dipartimento di Elettronica per l'automazione
More informationUnderstanding the evolution of Technology acceptance model
ISSN: 2321-7782 (Online) Volume 1, Issue 6, November 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Understanding
More informationFrom Information Technology to Mobile Information Technology: Applications in Hospitality and Tourism
From Information Technology to Mobile Information Technology: Applications in Hospitality and Tourism Sunny Sun, Rob Law, Markus Schuckert *, Deniz Kucukusta, and Basak Denizi Guillet all School of Hotel
More informationE-commerce Technology Acceptance (ECTA) Framework for SMEs in the Middle East countries with reference to Jordan
Association for Information Systems AIS Electronic Library (AISeL) UK Academy for Information Systems Conference Proceedings 2009 UK Academy for Information Systems 3-31-2009 E-commerce Technology Acceptance
More informationJITTA JOURNAL OF INFORMATION TECHNOLOGY THEORY AND APPLICATION
JITTA JOURNAL OF INFORMATION TECHNOLOGY THEORY AND APPLICATION APPLYING MARKUS AND ROBEY S CAUSAL STRUCTURE TO EXAMINE USER TECHNOLOGY ACCEPTANCE RESEARCH: A NEW APPROACH HESHAN SUN, Syracuse University
More informationPervasive Computing: Study for Homes
Research Cell: An International Journal of Engineering Sciences ISSN: 2229-6913 Issue Sept 2011, Vol. 4 71 Pervasive Computing: Study for Homes Department of Computer Science, Himachal Pradesh University,
More informationDiffusion of Virtual Innovation
Diffusion of Virtual Innovation Mark A. Fuller Washington State University Andrew M. Hardin University of Nevada, Las Vegas Christopher L. Scott Washington State University Abstract Drawing on Rogers diffusion
More informationFramework Programme 7
Framework Programme 7 1 Joining the EU programmes as a Belarusian 1. Introduction to the Framework Programme 7 2. Focus on evaluation issues + exercise 3. Strategies for Belarusian organisations + exercise
More informationA Context Taxonomy Supporting Public System Design
Faculty of Computer Science, Institute of Software and Multimedia Technology Junior Professorship in Software Engineering of Ubiquitous Systems A Context Taxonomy Supporting Public System Design Pisa,
More informationConFra: A Context Aware Human Machine Interface Framework for In-vehicle Infotainment Applications
ConFra: A Context Aware Human Machine Interface Framework for In-vehicle Infotainment Applications Hemant Sharma, Dr. Roger Kuvedu-Libla, and Dr. A. K. Ramani Abstract The omnipresent integration of computer
More informationCatholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands
INTELLIGENT AGENTS Catholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands Keywords: Intelligent agent, Website, Electronic Commerce
More informationEXTENDED TABLE OF CONTENTS
EXTENDED TABLE OF CONTENTS Preface OUTLINE AND SUBJECT OF THIS BOOK DEFINING UC THE SIGNIFICANCE OF UC THE CHALLENGES OF UC THE FOCUS ON REAL TIME ENTERPRISES THE S.C.A.L.E. CLASSIFICATION USED IN THIS
More informationAMIMaS: Model of architecture based on Multi-Agent Systems for the development of applications and services on AmI spaces
AMIMaS: Model of architecture based on Multi-Agent Systems for the development of applications and services on AmI spaces G. Ibáñez, J.P. Lázaro Health & Wellbeing Technologies ITACA Institute (TSB-ITACA),
More informationTowards affordance based human-system interaction based on cyber-physical systems
Towards affordance based human-system interaction based on cyber-physical systems Zoltán Rusák 1, Imre Horváth 1, Yuemin Hou 2, Ji Lihong 2 1 Faculty of Industrial Design Engineering, Delft University
More informationCyber-Physical Production Systems. Professor Svetan Ratchev University of Nottingham
Cyber-Physical Production Systems Professor Svetan Ratchev University of Nottingham Contents 1. Introduction 3 2. Key definitions 4 2.1 Cyber-Physical systems 4 2.2 Cyber-Physical Production Systems 4
More informationInSciTe Adaptive: Intelligent Technology Analysis Service Considering User Intention
InSciTe Adaptive: Intelligent Technology Analysis Service Considering User Intention Jinhyung Kim, Myunggwon Hwang, Do-Heon Jeong, Sa-Kwang Song, Hanmin Jung, Won-kyung Sung Korea Institute of Science
More informationShort Course on Computational Illumination
Short Course on Computational Illumination University of Tampere August 9/10, 2012 Matthew Turk Computer Science Department and Media Arts and Technology Program University of California, Santa Barbara
More informationDevelopment and Integration of Artificial Intelligence Technologies for Innovation Acceleration
Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Research Supervisor: Minoru Etoh (Professor, Open and Transdisciplinary Research Initiatives, Osaka University)
More informationRCAPS Working Paper Series
RCAPS Working Paper Series RWP-16004 The Adoption of Information System for Organic Agricultural Small and Medium Enterprises (SMEs) in Chiang Mai November 17, 2016 Chat Chuchuen* and Sirikul Tulasombat
More informationSoftware-Intensive Systems Producibility
Pittsburgh, PA 15213-3890 Software-Intensive Systems Producibility Grady Campbell Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University SSTC 2006. - page 1 Producibility
More informationEnhancing industrial processes in the industry sector by the means of service design
ServDes2018 - Service Design Proof of Concept Politecnico di Milano 18th-19th-20th, June 2018 Enhancing industrial processes in the industry sector by the means of service design giuseppe@attoma.eu, peter.livaudais@attoma.eu
More informationUser Acceptance of Desktop Based Computer Software Using UTAUT Model and addition of New Moderators
User Acceptance of Desktop Based Computer Software Using UTAUT Model and addition of New Moderators Mr. Aman Kumar Sharma Department of Computer Science Himachal Pradesh University Shimla, India sharmaas1@gmail.com
More informationConstructing the Ubiquitous Intelligence Model based on Frame and High-Level Petri Nets for Elder Healthcare
Constructing the Ubiquitous Intelligence Model based on Frame and High-Level Petri Nets for Elder Healthcare Jui-Feng Weng, *Shian-Shyong Tseng and Nam-Kek Si Abstract--In general, the design of ubiquitous
More informationMSc(CompSc) List of courses offered in
Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The
More informationDOCTORAL THESIS (Summary)
LUCIAN BLAGA UNIVERSITY OF SIBIU Syed Usama Khalid Bukhari DOCTORAL THESIS (Summary) COMPUTER VISION APPLICATIONS IN INDUSTRIAL ENGINEERING PhD. Advisor: Rector Prof. Dr. Ing. Ioan BONDREA 1 Abstract Europe
More informationPervasive Services Engineering for SOAs
Pervasive Services Engineering for SOAs Dhaminda Abeywickrama (supervised by Sita Ramakrishnan) Clayton School of Information Technology, Monash University, Australia dhaminda.abeywickrama@infotech.monash.edu.au
More informationA User Interface Level Context Model for Ambient Assisted Living
not for distribution, only for internal use A User Interface Level Context Model for Ambient Assisted Living Manfred Wojciechowski 1, Jinhua Xiong 2 1 Fraunhofer Institute for Software- und Systems Engineering,
More informationOpportunities and threats and acceptance of electronic identification cards in Germany and New Zealand. Masterarbeit
Opportunities and threats and acceptance of electronic identification cards in Germany and New Zealand Masterarbeit zur Erlangung des akademischen Grades Master of Science (M.Sc.) im Studiengang Wirtschaftswissenschaft
More informationToward the Synchronized Experiences between Real and Virtual Museum
Toward the Synchronized Experiences between Real and Virtual Abstract Yong-Moo Kwon, Jie-Eun Hwang, Tae-Sung Lee, Min-Jeong Lee, Jai-Kyung Suhl, and Sae-Woon Ryu Imaging Media Research Center, Korea Institute
More informationPan-Canadian Trust Framework Overview
Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document
More informationINFORMATION TECHNOLOGY ACCEPTANCE BY UNIVERSITY LECTURES: CASE STUDY AT APPLIED SCIENCE PRIVATE UNIVERSITY
INFORMATION TECHNOLOGY ACCEPTANCE BY UNIVERSITY LECTURES: CASE STUDY AT APPLIED SCIENCE PRIVATE UNIVERSITY Hanadi M.R Al-Zegaier Assistant Professor, Business Administration Department, Applied Science
More informationEncouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY
Encouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY The Internet is changing the way that individuals launch businesses, established companies function, and
More informationIntroduction to Computational Intelligence in Healthcare
1 Introduction to Computational Intelligence in Healthcare H. Yoshida, S. Vaidya, and L.C. Jain Abstract. This chapter presents introductory remarks on computational intelligence in healthcare practice,
More informationin the New Zealand Curriculum
Technology in the New Zealand Curriculum We ve revised the Technology learning area to strengthen the positioning of digital technologies in the New Zealand Curriculum. The goal of this change is to ensure
More informationHuman-Computer Interaction
Human-Computer Interaction Prof. Antonella De Angeli, PhD Antonella.deangeli@disi.unitn.it Ground rules To keep disturbance to your fellow students to a minimum Switch off your mobile phone during the
More informationSchool of Computing, National University of Singapore 3 Science Drive 2, Singapore ABSTRACT
NUROP CONGRESS PAPER AGENT BASED SOFTWARE ENGINEERING METHODOLOGIES WONG KENG ONN 1 AND BIMLESH WADHWA 2 School of Computing, National University of Singapore 3 Science Drive 2, Singapore 117543 ABSTRACT
More informationDaniel Fallman, Ph.D. Research Director, Umeå Institute of Design Associate Professor, Dept. of Informatics, Umeå University, Sweden
Ubiquitous Computing Daniel Fallman, Ph.D. Research Director, Umeå Institute of Design Associate Professor, Dept. of Informatics, Umeå University, Sweden Stanford University 2008 CS376 In Ubiquitous Computing,
More informationDoes Involving Users in Software Development Really Influence System Success?
Voice of evidence Editor: Tore Dybå sintef tore.dyba@sintef.no Editor: Helen Sharp The open University, London h.c.sharp@open.ac.uk Does Involving Users in Software Development Really Influence System
More informationINAM-R2O07 - Environmental Intelligence
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2018 340 - EPSEVG - Vilanova i la Geltrú School of Engineering 707 - ESAII - Department of Automatic Control MASTER'S DEGREE IN AUTOMATIC
More informationFrom model to case study on digital convergence maturity
From model to case study on digital convergence maturity Seung-Jun Yeon, Sung-Hyun Hwang, Hee-Kyung Kong Abstract This study was conducted with the larger goal of designing a maturity model for digital
More informationMixed Reality technology applied research on railway sector
Mixed Reality technology applied research on railway sector Yong-Soo Song, Train Control Communication Lab, Korea Railroad Research Institute Uiwang si, Korea e-mail: adair@krri.re.kr Jong-Hyun Back, Train
More information- Basics of informatics - Computer network - Software engineering - Intelligent media processing - Human interface. Professor. Professor.
- Basics of informatics - Computer network - Software engineering - Intelligent media processing - Human interface Computer-Aided Engineering Research of power/signal integrity analysis and EMC design
More informationAccessibility on the Library Horizon. The NMC Horizon Report > 2017 Library Edition
Accessibility on the Library Horizon The NMC Horizon Report > 2017 Library Edition Panelists Melissa Green Academic Technologies Instruction Librarian The University of Alabama @mbfortson Panelists Melissa
More informationMotivation and objectives of the proposed study
Abstract In recent years, interactive digital media has made a rapid development in human computer interaction. However, the amount of communication or information being conveyed between human and the
More informationIntroductions. Characterizing Knowledge Management Tools
Characterizing Knowledge Management Tools Half-day Tutorial Developed by Kurt W. Conrad, Brian (Bo) Newman, and Dr. Art Murray Presented by Kurt W. Conrad conrad@sagebrushgroup.com Based on A ramework
More informationDefinition of Pervasive Grid
Definition of Pervasive Grid a Pervasive Grid is a hardware and software infrastructure or space/environment that provides proactive, autonomic, trustworthy, and inexpensive access to pervasive resource
More informationIntroduction to Humans in HCI
Introduction to Humans in HCI Mary Czerwinski Microsoft Research 9/18/2001 We are fortunate to be alive at a time when research and invention in the computing domain flourishes, and many industrial, government
More informationJD Edwards UX One. Solution Overview. January Copyright 2017, Oracle and/or its affiliates. All rights reserved.
JD Edwards UX One Solution Overview January 2017 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationABCPhD CALL4SCHOLARSHIP 33 Research topic: Design for All in Healthcare Facilities
ABC PhD DOCTORAL PROGRAM IN ARCHITECTURE BUILT ENVIRONMENT AND CONSTRUCTION ENGINEERING ABCPhD CALL4SCHOLARSHIP 33 Research topic: Design for All in Healthcare Facilities (33 - Annex 1.2) Funding and management
More informationA Context Taxonomy Supporting Public System Design
A Context Taxonomy Supporting Public System Design Romina Kühn, Christine Keller, Thomas Schlegel Technische Universität Dresden Nöthnitzer Str. 46, Dresden {Romina.Kuehn, Christine.Keller, Thomas.Schlegel}@tu-dresden.de
More informationDownload report from:
fa Agenda Background and Context Vision and Roles Barriers to Implementation Research Agenda End Notes Background and Context Statement of Task Key Elements Consider current state of the art in autonomy
More informationTHE GREEK UNIVERSITIES INTO THE DIGITAL WORLD THE U-PORTAL CASE STUDY
THE GREEK UNIVERSITIES INTO THE DIGITAL WORLD THE U-PORTAL CASE STUDY Evangelos Vlachogiannis, Nikos Viorres Dept. of Product and Systems Design Engineering University of the Aegean, Syros GR-84100, Greece
More informationIncreasing the precision of mobile sensing systems through super-sampling
Increasing the precision of mobile sensing systems through super-sampling RJ Honicky, Eric A. Brewer, John F. Canny, Ronald C. Cohen Department of Computer Science, UC Berkeley Email: {honicky,brewer,jfc}@cs.berkeley.edu
More informationThe User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space
, pp.62-67 http://dx.doi.org/10.14257/astl.2015.86.13 The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space Bokyoung Park, HyeonGyu Min, Green Bang and Ilju Ko Department
More informationConnecting Commerce. Mining industry confidence in the digital environment. Written by
Connecting Commerce Mining industry confidence in the digital environment Written by About the research This article is part of the Connecting Commerce research programme from The Economist Intelligence
More informationFactors Influencing Professionals Decision for Cloud Computing Adoption
Factors Influencing Professionals Decision for Cloud Computing Adoption Authors: Suman Kishore Mathur 1, Tejal V Dhulla 2 Assistant Professor - Dr. V. N. Bedekar Institute of Management Studies, Thane
More informationA New Trend of Knowledge Management: A Study of Mobile Knowledge Management
Management Science and Engineering Vol. 8, No. 4, 2014, pp. 1-5 DOI: 10.3968/5786 ISSN 1913-0341 [Print] ISSN 1913-035X [Online] www.cscanada.net www.cscanada.org A New Trend of Knowledge Management: A
More informationIndustry 4.0. Advanced and integrated SAFETY tools for tecnhical plants
Industry 4.0 Advanced and integrated SAFETY tools for tecnhical plants Industry 4.0 Industry 4.0 is the digital transformation of manufacturing; leverages technologies, such as Big Data and Internet of
More informationIntroduction: What are the agents?
Introduction: What are the agents? Roope Raisamo (rr@cs.uta.fi) Department of Computer Sciences University of Tampere http://www.cs.uta.fi/sat/ Definitions of agents The concept of agent has been used
More informationpreface Motivation Figure 1. Reality-virtuality continuum (Milgram & Kishino, 1994) Mixed.Reality Augmented. Virtuality Real...
v preface Motivation Augmented reality (AR) research aims to develop technologies that allow the real-time fusion of computer-generated digital content with the real world. Unlike virtual reality (VR)
More informationBuilding Spatial Experiences in the Automotive Industry
Building Spatial Experiences in the Automotive Industry i-know Data-driven Business Conference Franz Weghofer franz.weghofer@magna.com Video Agenda Digital Factory - Data Backbone of all Virtual Representations
More informationUsing Dynamic Capability Evaluation to Organize a Team of Cooperative, Autonomous Robots
Using Dynamic Capability Evaluation to Organize a Team of Cooperative, Autonomous Robots Eric Matson Scott DeLoach Multi-agent and Cooperative Robotics Laboratory Department of Computing and Information
More informationA Knowledge-Centric Approach for Complex Systems. Chris R. Powell 1/29/2015
A Knowledge-Centric Approach for Complex Systems Chris R. Powell 1/29/2015 Dr. Chris R. Powell, MBA 31 years experience in systems, hardware, and software engineering 17 years in commercial development
More informationCategorization of Technologies: Insights from the Technology Acceptance Literature
Categorization of Technologies: Insights from the Technology Acceptance Literature Michael E. Ellis University of Central Arkansas Miguel I. Aguirre-Urreta Texas Tech University Kiljae (Kay) Lee Embry-Riddle
More informationVIP-Emulator: To Design Interactive Architecture for adaptive mixed Reality Space
VIP-Emulator: To Design Interactive Architecture for adaptive mixed Reality Space Muhammad Azhar, Fahad, Muhammad Sajjad, Irfan Mehmood, Bon Woo Gu, Wan Jeong Park,Wonil Kim, Joon Soo Han, Yun Jang, and
More informationWhat Do Librarians Want? How Google Has Changed Traditional Expectations
What Do Librarians Want? How Google Has Changed Traditional Expectations 9 th Fiesole Collection Development Retreat University of Hong Kong 14 April 2007 Results of Serials Solutions November 2006 Survey
More informationThis list supersedes the one published in the November 2002 issue of CR.
PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.
More informationPrototyping: Accelerating the Adoption of Transformative Capabilities
Prototyping: Accelerating the Adoption of Transformative Capabilities Mr. Elmer Roman Director, Joint Capability Technology Demonstration (JCTD) DASD, Emerging Capability & Prototyping (EC&P) 10/27/2016
More informationSMART HOME Insights on consumer attitudes to the smart home. The truth behind the hype. Smart home. Understand. Adopt. Success. About GfK.
The truth behind the hype The smart home gold rush There is a smart home gold rush happening now as all sorts of organizations look to maximize their involvement in tomorrow s home. No manufacturer, utility
More informationIntelligent Power Economy System (Ipes)
American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-02, Issue-08, pp-108-114 www.ajer.org Research Paper Open Access Intelligent Power Economy System (Ipes) Salman
More informationAGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS. Nuno Sousa Eugénio Oliveira
AGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS Nuno Sousa Eugénio Oliveira Faculdade de Egenharia da Universidade do Porto, Portugal Abstract: This paper describes a platform that enables
More informationAssessment of Smart Machines and Manufacturing Competence Centre (SMACC) Scientific Advisory Board Site Visit April 2018.
Assessment of Smart Machines and Manufacturing Competence Centre (SMACC) Scientific Advisory Board Site Visit 25-27 April 2018 Assessment Report 1. Scientific ambition, quality and impact Rating: 3.5 The
More informationEmpirical Research Regarding the Importance of Digital Transformation for Romanian SMEs. Livia TOANCA 1
Empirical Research Regarding the Importance of Digital Transformation for Romanian SMEs Livia TOANCA 1 ABSTRACT As the need for digital transformation becomes more and more self-evident with the rapid
More information{ TECHNOLOGY CHANGES } EXECUTIVE FOCUS TRANSFORMATIVE TECHNOLOGIES. & THE ENGINEER Engineering and technology
{ TECHNOLOGY CHANGES } EXECUTIVE FOCUS By Mark Strandquest TECHNOLOGIES & THE ENGINEER Engineering and technology are forever intertwined. By definition, engineering is the application of knowledge in
More informationThe Science In Computer Science
Editor s Introduction Ubiquity Symposium The Science In Computer Science The Computing Sciences and STEM Education by Paul S. Rosenbloom In this latest installment of The Science in Computer Science, Prof.
More informationOverview Agents, environments, typical components
Overview Agents, environments, typical components CSC752 Autonomous Robotic Systems Ubbo Visser Department of Computer Science University of Miami January 23, 2017 Outline 1 Autonomous robots 2 Agents
More informationAutomatically Adjusting Player Models for Given Stories in Role- Playing Games
Automatically Adjusting Player Models for Given Stories in Role- Playing Games Natham Thammanichanon Department of Computer Engineering Chulalongkorn University, Payathai Rd. Patumwan Bangkok, Thailand
More informationPerformance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication
Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication Ahmet Onur Durahim, İsmail Fatih Yıldırım, Erkay Savaş and Albert Levi durahim, ismailfatih, erkays, levi@sabanciuniv.edu
More informationExploring the New Trends of Chinese Tourists in Switzerland
Exploring the New Trends of Chinese Tourists in Switzerland Zhan Liu, HES-SO Valais-Wallis Anne Le Calvé, HES-SO Valais-Wallis Nicole Glassey Balet, HES-SO Valais-Wallis Address of corresponding author:
More informationJOURNAL OF BUSINESS AND MANAGEMENT Vol. 5, No. 2, 2016:
JOURNAL OF BUSINESS AND MANAGEMENT Vol. 5, No. 2, 2016: 277-282 THE EFFECTS OF TECHNOLOGY READINESS AND TECHNOLOGY ACCEPTANCE TOWARD CITIZENS PARTICIPATION IN BANDUNG SMART CITY PROJECT Febryansyah Aminullah
More information23270: AUGMENTED REALITY FOR NAVIGATION AND INFORMATIONAL ADAS. Sergii Bykov Technical Lead Machine Learning 12 Oct 2017
23270: AUGMENTED REALITY FOR NAVIGATION AND INFORMATIONAL ADAS Sergii Bykov Technical Lead Machine Learning 12 Oct 2017 Product Vision Company Introduction Apostera GmbH with headquarter in Munich, was
More informationApplication of combined TOPSIS and AHP method for Spectrum Selection in Cognitive Radio by Channel Characteristic Evaluation
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 10, Number 2 (2017), pp. 71 79 International Research Publication House http://www.irphouse.com Application of
More informationThe Acceptance Design Model for Evaluating the Adoption of Folksonomies in UUM Library WEB OPAC
The Acceptance Design Model for Evaluating the Adoption of Folksonomies in UUM Library WEB Adebambo Hameed O. a, Raji Ridwan A. b, Akanmu Semiu A. a,b,* a School of Technology Management and Logistics,
More informationFactors Affecting the Decision of Adoption Cloud Computing Technology
Factors Affecting the Decision of Adoption Cloud Computing Technology Thabit Atobishi Kaposvár University, Doctoral School of Management and Organizational Sciences, Hungary thabit.tobishi@gmail.com Szilárd
More informationINTELLIGENT GUIDANCE IN A VIRTUAL UNIVERSITY
INTELLIGENT GUIDANCE IN A VIRTUAL UNIVERSITY T. Panayiotopoulos,, N. Zacharis, S. Vosinakis Department of Computer Science, University of Piraeus, 80 Karaoli & Dimitriou str. 18534 Piraeus, Greece themisp@unipi.gr,
More informationComputer-Augmented Environments: Back to the Real World
Computer-Augmented Environments: Back to the Real World Hans-W. Gellersen Lancaster University Department of Computing Ubiquitous Computing Research HWG 1 What I thought this talk would be about Back to
More informationMetrology in the Digital Transformation
Metrology in the Digital Transformation This project proposal is about to establish a European metrology data infrastructure, a European Metrology Cloud to support the processes of conformity assessment
More informationData and Knowledge as Infrastructure. Chaitan Baru Senior Advisor for Data Science CISE Directorate National Science Foundation
Data and Knowledge as Infrastructure Chaitan Baru Senior Advisor for Data Science CISE Directorate National Science Foundation 1 Motivation Easy access to data The Hello World problem (courtesy: R.V. Guha)
More informationMission Space. Value-based use of augmented reality in support of critical contextual environments
Mission Space Value-based use of augmented reality in support of critical contextual environments Vicki A. Barbur Ph.D. Senior Vice President and Chief Technical Officer Concurrent Technologies Corporation
More informationSMART CITY VNPT s APPROACH & EXPERIENCE. VNPT Group
SMART CITY VNPT s APPROACH & EXPERIENCE VNPT Group Thanh Hoa, 5 th July 2018 1 SmartCity AGENDA 1 Technology context for Smart City 2 VNPT s Approach for Smart City 3 VNPT s Experience in Smart City Development
More information