Amigo Approach Towards Perceived Privacy

Size: px
Start display at page:

Download "Amigo Approach Towards Perceived Privacy"

Transcription

1 Amigo Approach Towards Perceived Privacy Maddy Janse, Peter Vink, Yeo LeeChin, and Abdullah Al Mahmud Philips Research, High Tech Campus 5, 5656 AE Eindhoven, The Netherlands Abstract. Perceived privacy, i.e., how end-users perceive that the system affects their privacy, is one of the key aspects for the acceptance by users of ambient intelligent systems and one of the most complex to handle. Exploratory, field and conceptual design studies were conducted to generate user requirements as input and constraints for the development of mechanisms for the enforcement of privacy preferences. Based on these field studies, a model was created and a prototype was implemented in which the context, the content, and the presence of people was discovered, and shared under various privacysensitive conditions. Keywords: perceived privacy, ambient intelligent system, networked home environment, extended home environment, context-aware applications. 1 Introduction Applications in extended networked home environments are intended to facilitate the communication between users of different households and to provide them with a feeling of a shared ambiance. Connecting people in this way influences their social relationships. Home, as we know it, is a place where people can retreat from society and its social rules. Extended home applications induce intrusions in this familiar and trusted environment. Since ambient intelligent systems are by definition unobtrusive and embedded in the user s environment, users might easily forget their existence and unwillingly have their privacy violated. Perceived privacy or how end-users perceive that the system affects their privacy is one of the key aspects for the acceptance of ambient intelligent systems by users. It is also one of the most complex problems to handle. It is about how, when, and to what extent data about people are revealed to other people within a dynamic social context. The Amigo research into perceived privacy started with user studies [1, 2]. These studies explored daily communications and their related privacy issues in the field by means of a system for presence detection and sharing that information across homes. Conceptual design studies investigated the sensitivity of masking or hiding information that is being shared between different parties in relation to the type of application. These studies provided, in addition to a set of design guidelines the following major observations on user behavior with regard to handling perceived privacy: People use many diverse mechanisms to preserve their social privacy, People share their personal information only within a small community of relatives and friends, M. Mühlhäuser et al. (Eds.): AmI 2007 Workshops, CCIS 11, pp , Springer-Verlag Berlin Heidelberg 2008

2 404 M. Janse et al. People need to perceive a clear benefit for information sharing, People control the level of detail of the information that is being shared, and they are consciously maintaining this control. These observations resulted in a change of approach with regard to the Amigo architecture; handling privacy at the middleware service level by means of a rule-based filter that incorporated user preferences and that would use these preferences to either pass on the data or not. Such a mechanism is not sufficient for handling the user s perceived privacy because it does not offer direct user control. In particular, the type of information that is shared, the level of detail in which the information is shared, with whom that information is shared, and whether it is shared by single individuals or groups of people are crucial variables to take into account. To further investigate these implications an application implementation was developed. 2 Design Concept The major aim is to design a privacy-aware application that is embedded in an ambient in-home network as envisioned by the Amigo project s extended home environment scenario. A content-sharing application was selected as most suitable for this purpose. In this application, context and content data are shared from various sources between different users and locations, context input is used for privacy-based decisions and context-aware feedback is given to users. A subset of the overall Amigo extended home environment scenario was selected (Table 1). Table 1. Application Scenario Maria and Jerry have one child, Roberto. Jerry travels a lot for his work. They use an Amigo system to stay in touch. The system can be used from any display device that is connected to the Internet. By using the system, Maria and Jerry can be together, while they are at different locations. They can exchange information, share pictures, play games, chat, share activities, feel each other s presence and share their social context. Jerry is in the US on a long business trip. Maria likes to show some pictures while they are being together with the family in the week-end. She has three different sets of pictures on the system. The first set of pictures is from her first marriage. She does not want anyone to see these pictures. The second set of pictures, taken at the Zoo, is recent. She wants to look at these pictures with Jerry and Roberto. The third set of pictures show the cocktails that she prepared a few days ago for their friends. She wants to look at these pictures with Jerry and not with Roberto. This sharing application is context dependent and reacts based on the user privacy setting. Two people at different locations can share photos, location and presence. For the technical realization, existing Amigo prototypes were used and where needed extended. To maintain the home ambiance a TV was used as a display medium. Users could set their privacy preferences and navigate by means of a few buttons on a TV remote control. The user interface is built with CE-HTML (a CEA/DLNA standard).

3 Amigo Approach Towards Perceived Privacy Conceptual Model The following design constraints were assumed: Context information is retrieved from the environment. Different control points are used to allow users to control which information they are sharing with their contacts and how that information is shared. The application should allow users to share information and activities with their contacts at other locations. This information includes content, for example the user s photos, context information, for example, the user s exact or approximate location, and the user s social situation. The application will use context information as data to be shared and as data to control the privacy settings, i.e., sharing depend on context. Feedback to the user regarding content and context changes should be represented in different ways, for example, by different icons and/or light colors. The crucial components for handling perceived privacy in the Amigo extended home environment are: the services, the applications, the control, the user and the user s contacts (Figure 1). The information flow between these components results in a context dependent setting, i.e., how the application reacts is context dependent. The service component collects and provides contextual information about the environment and its users, for example, about the house and its inhabitants, such as, recognizing the persons and knowing their activities. The impact of the service component is mostly determined by the sensitivity of the data that it provides. The control component allows users to control the flow of data between components. It provides an interface for setting privacy preferences. Default values can be used when a user has not specified any privacy preferences or when the absence of data is privacy sensitive. The application component provides access to contextual information. Privacy settings will differ per application and per application usage. Contacts communicate with the user; they constitute, for example, the user s family, friends, or any other contact defined by the user. Contacts also have a context dependent factor. The user is also a component in this model, as preference settings differ per person and their context is a dependent factor. Different value combinations of these components create different settings. Applications Services User Control Contacts Fig. 1. Context Dependent Setting - Components context-aware sharing application

4 406 M. Janse et al. The following example illustrates the role of these components for part of the application scenario: if Maria [users] is in her room [services (context)] and is using a sharing application [applications], and her husband Jerry is alone [services (context)] at another location [contacts] and is also logged in to an application [applications], then use setting A- share photos [setting (context dependent)]. In this example, two different services and applications are running at the same time at two different locations. Setting A is a decision made at Maria s location to determine the dissemination of the information (in this case, to share photos). 2.2 Sharing Information Information about presence, location, and content of a user is shared. Presence refers to the status of a user. This status can have different values, e.g., is online, is away, is busy or is offline. Location refers to where a person is located at a specified point in time. Different sources of location information can have different levels of detail, e.g., room, building, and city, for the physical location. Furthermore, they can have the value known location, and do not share. These values can be based on agreements between users. In this way, users have control over the precision by which their location context will be disclosed to other people. The value known location, which is comparable to Lederer et al. s (2003) [3] vague location ordinal precision level, can be used as a custom location setting to simplify the preferences setting for the user and different levels of detail can be shared depending on the character of relationships between persons. This implies that users maintain control by configuring their preference settings with regard to who will see what and when. The application will react according to these preferences setting. Eindhoven WDC AmbiLab Known Location Fig. 2. Example of different levels of precision for location. AmbiLab is the room, WDC is the building, and Eindhoven is the city. Each of these levels can have a within value that is known location and that may be shared or not shared. Content refers to information of interest to persons. Content can have different values for sharing. For example for photos, these values can be: private, public, or conditionally specified like sharing with X when X is alone.

5 Amigo Approach Towards Perceived Privacy Presenting Context Information The information that is being shared about presence, location and content is presented in relation to the context. From the many available choices for the presentation of this information, the use of icons, colored text and colored light was selected, mainly for feasibility reasons. The presence status of an individual person is presented by means of colored text on the TV display. The joined presence status and activities is presented by means of colored lights, i.e., presentation without explicit interruption and integration of prior defined agreements and social conventions. Different colors represent different contexts; for example, being logged on or not in the sharing application, or whether someone else is in the same room as the user or not. In this way, the user in location B gets information about location A. These presence settings represent a compound context; they combine different information sources: activity, availability and location of more than one person. The photo-sharing application is presented by means of photo icons. 3 Implementation Different services and applications are installed in two different Amigo homes (Figure 3). Each home has three main components, the Amigo server, the Amigo client and the Internet. In the prototype, information is shared between the Amigo server which is running various Amigo Intelligent User Services, the Amigo client, which is running the privacy aware applications, and between the two homes, A and B. Fig. 3. Information sharing between two Amigo homes The Amigo server consists of different services running in the home. It functions as a centralized database that stores contextual information about the home and its inhabitants and provides different types of information to the client, e.g., the location of the user. The Intelligent User Services [4, 5] from the Amigo middleware are used to

6 408 M. Janse et al. retrieve contextual information and user profiles. The Context Management Service (CMS) is used to track the location of a user and store this location information on the server. The User Modeling and Profiling Service (UMPS) is used to reason on user context and feedback and to store user profiles and privacy preference settings. The Amigo Client consists of different applications that are running in the home. These applications are, for example, a content sharing application, a lighting application (LivingColor light), and a game application. Users can set their application and location privacy preferences using the interfaces from the application. Users receive feedback from the application interface. Different user states are presented by different colors of light, e.g., online/offline/sharing photos. The Amigo client can be any display device that is connected to the Amigo server and the Internet; in this case a CE-HTML enabled television. Context information is shared between two homes through an application and the Internet. The Internet is used to connect the homes. The Jabber server is used to store the user s contacts information. The Flickr Server [6] is used to upload and store the content; in this case, the user s photos, which have privacy-level tags. The application communicates via a Jabber server (Jabber Software Foundation, 2006 [7]). It exchanges messages on user location information, user availability and application activity between the homes. The user s availability is shown as the user s current status, e.g., is online, is away, is busy or is offline. The Jabber Server is also used for initialization of a photo sharing request and establishing the connection between the two homes. Users are given control over which information is to be shared. Before information is passed from one component to another, it will first go through privacy decision points (PDP). PDPs consist of rule-based software that checks against the user privacy preferences that are stored in the UMPS. They control the information that is being shared between different applications across different homes. Users can modify their privacy settings from the privacy preferences interface. The PDP is enforced to make sure that the application will react according to these privacy settings and the presence and location of the user (user context). The set of photos adapts when the context of the user changes. In sum, this implementation provides a real networked environment in which we can explore the consequences of system variables on user s perceived privacy. 4 Discussion The prototype implementation was demonstrated as a walkthrough based on the initial usage scenario to expert users to generate feedback with regard to the initial user requirements and design guidelines. Such a running prototype system provides a much better carrier for eliciting user feedback with regard to privacy considerations than design concepts and visualizations. It has the advantages of demonstrating the consequences of changes in context and can support the exploration of different situations. The experts that participated in the walkthrough had very different backgrounds, among others, user system interaction; security and encryption; software engineering; system architecture; and CE applications. They trusted the system. They trusted it even more than they trusted other users. One of their quotes: If I know the capability

7 Amigo Approach Towards Perceived Privacy 409 of the system I will trust it; I will have less trust in the people who will be using it. It was also stated that the system will be trustworthy if it takes a conservative decision. This implies that the default value for the privacy setting should be very rigid. It is not desirable that other people know what these settings are. They also wanted a central control or setting to control the application themselves. Another issue regarding trust was expressed as: Can you trust the system that it is sufficiently aware of the context to adapt automatically to the right setting? Being sufficiently aware is the crux that needs more exploration and research work. The relation between system autonomy and privacy is another critical factor. Being able to cheat was one of the requirements revealed by the user studies. Setting different privacy preferences and changing them during a session elicited discussions on how this might affect people s social relationships. With regard to the level of detail for the preference settings it was clear that different levels have different meanings for different people. The following verbalizations illustrate these points: People don t need to know that you have set some kind of privacy setting for them ; If I change my privacy setting for a particular friend, people will infer something, as if I wish to hide something ; If I really wanted to show my privacy settings, I should be able to override them, by having a kind of don t embarrass-me button. Presenting the context information by means of colored light provides opportunities for personal and intimate ambiance sharing. For this the system should be flexible. The prototype only used one light per room, but participants actually desired to have a light presentation for each individual person. The different levels of precision that were maintained in the application for the disclosure of personal information need further exploration. It is quite clear that people require control over their personal information and that they like to vary this level of detail depending on the context at hand. These levels are different for each individual. It appears that people require about 3 levels of detail, but that these levels are at different depth for each individual. These settings might potentially cause social embarrassments and conflicts. In sum, the application implementation made it possible to explore and experiment with privacy settings in a context-aware environment enabled by the Amigo middleware. The results highlight the need for more exploration in different settings and conditions. But it also identified that some privacy controls should be handled in a generic fashion, such as employing privacy rules and that next steps in this research need to focus on constructing more generic models. Acknowledgement The Amigo project is funded by the European Commission as an integrated project (IP) in the Sixth Framework Programme under the contract number IST The Amigo partners are: Philips, Fagor Electrodomesticos, France Telecom, Fraunhofer IMS, Fraunhofer SIT, Ikerlan, INRIA, Italdesign-Giugiaro, SingularLogic, Europaeisches Microsoft Innovation Center, Telematica Instituut, ICCS-NTUA, Telefonica, Univ. Paderborn, VTT.

8 410 M. Janse et al. References [1] Amigo Deliverable D4.7. In: Janse, M., et al. (eds.) Intelligent User Services Privacy and personal security, IST Amigo (2007) [2] Janse, M.D., Vink, P., Soute, I., Boland, H.: Perceived Privacy in Ambient Intelligent Environments. In: Proceedings of the Context Awareness and Trust 2007 Workshop, CAT 2007, Moncton, New Brunswick, Canada, July 20, (2007) (On-line CEUR-WS proceedings ISSN ) [3] Lederer, S., Hong, J.I., Jiang, X., Dey, A.K., Landay, J.A., Mankoff, J.: Towards Privacy for Ubiquitous Computing, Technical Report UCB-CSD , Computer Science Division, University of California, Berkeley (2003) [4] Amigo Deliverable D4.7. In: Vink, P., et al. (eds.) Intelligent User Services Context Management Service, IST Amigo (2007) [5] Amigo Deliverable D4.7: Intelligent User Services User Modeling and Profiling Service. Otilia Kocsis & Elena Vidjiounaite. IST Amigo (2007) [6] [7] Jaber software foundation,

Privacy as Impression Management

Privacy as Impression Management Institute for Software Research Privacy as Impression Management Sameer Patil patil@uci.edu Alfred Kobsa kobsa@ics.uci.edu ISR Technical Report # UCI-ISR-03-13 Institute for Software Research ICS2 210

More information

A User Interface Level Context Model for Ambient Assisted Living

A User Interface Level Context Model for Ambient Assisted Living not for distribution, only for internal use A User Interface Level Context Model for Ambient Assisted Living Manfred Wojciechowski 1, Jinhua Xiong 2 1 Fraunhofer Institute for Software- und Systems Engineering,

More information

Interaction Design for the Disappearing Computer

Interaction Design for the Disappearing Computer Interaction Design for the Disappearing Computer Norbert Streitz AMBIENTE Workspaces of the Future Fraunhofer IPSI 64293 Darmstadt Germany VWUHLW]#LSVLIUDXQKRIHUGH KWWSZZZLSVLIUDXQKRIHUGHDPELHQWH Abstract.

More information

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Personal Data Protection Competency Framework for School Students. Intended to help Educators Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework

More information

Distributing Multimedia Elements to Multiple Networked Devices

Distributing Multimedia Elements to Multiple Networked Devices Distributing Multimedia Elements to Multiple Networked Devices Maddy Janse, Peter van der Stok Philips Research, NL 11th May 2005, Munich Jun Hu ID, TU/e 1/14 Hu? Pervasive computing, AmI? ICE-CREAM OZONE

More information

Collaboration on Interactive Ceilings

Collaboration on Interactive Ceilings Collaboration on Interactive Ceilings Alexander Bazo, Raphael Wimmer, Markus Heckner, Christian Wolff Media Informatics Group, University of Regensburg Abstract In this paper we discuss how interactive

More information

Spade 3 Game Design. Ankur Patankar MS Computer Science Georgia Tech College of Computing Cell: (404)

Spade 3 Game Design. Ankur Patankar MS Computer Science Georgia Tech College of Computing Cell: (404) Spade 3 Game Design By Ankur Patankar MS Computer Science Georgia Tech College of Computing ankur.patankar@gatech.edu Cell: (404) 824-3468 Design Game CS 8803 (Fall 2010) Page 1 ABSTRACT Spade 3 is a card

More information

INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN ICED 03 STOCKHOLM, AUGUST 19-21, 2003

INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN ICED 03 STOCKHOLM, AUGUST 19-21, 2003 INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN ICED 03 STOCKHOLM, AUGUST 19-21, 2003 A KNOWLEDGE MANAGEMENT SYSTEM FOR INDUSTRIAL DESIGN RESEARCH PROCESSES Christian FRANK, Mickaël GARDONI Abstract Knowledge

More information

How to Keep a Reference Ontology Relevant to the Industry: a Case Study from the Smart Home

How to Keep a Reference Ontology Relevant to the Industry: a Case Study from the Smart Home How to Keep a Reference Ontology Relevant to the Industry: a Case Study from the Smart Home Laura Daniele, Frank den Hartog, Jasper Roes TNO - Netherlands Organization for Applied Scientific Research,

More information

Implementing Privacy as Symmetry in Location-aware Systems

Implementing Privacy as Symmetry in Location-aware Systems Implementing Privacy as Symmetry in Location-aware Systems Anders Kofod-Petersen, Espen Klæboe, Jørgen Jervidalo, Kjetil Aaltvedt, Magnus Romnes, and Trond Martin Nyhus Department of Computer and Information

More information

Context-Aware Interaction in a Mobile Environment

Context-Aware Interaction in a Mobile Environment Context-Aware Interaction in a Mobile Environment Daniela Fogli 1, Fabio Pittarello 2, Augusto Celentano 2, and Piero Mussio 1 1 Università degli Studi di Brescia, Dipartimento di Elettronica per l'automazione

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

Mobile Interaction in Smart Environments

Mobile Interaction in Smart Environments Mobile Interaction in Smart Environments Karin Leichtenstern 1/2, Enrico Rukzio 2, Jeannette Chin 1, Vic Callaghan 1, Albrecht Schmidt 2 1 Intelligent Inhabited Environment Group, University of Essex {leichten,

More information

Design and Implementation Options for Digital Library Systems

Design and Implementation Options for Digital Library Systems International Journal of Systems Science and Applied Mathematics 2017; 2(3): 70-74 http://www.sciencepublishinggroup.com/j/ijssam doi: 10.11648/j.ijssam.20170203.12 Design and Implementation Options for

More information

AMIMaS: Model of architecture based on Multi-Agent Systems for the development of applications and services on AmI spaces

AMIMaS: Model of architecture based on Multi-Agent Systems for the development of applications and services on AmI spaces AMIMaS: Model of architecture based on Multi-Agent Systems for the development of applications and services on AmI spaces G. Ibáñez, J.P. Lázaro Health & Wellbeing Technologies ITACA Institute (TSB-ITACA),

More information

TA2 Newsletter April 2010

TA2 Newsletter April 2010 Content TA2 - making communications and engagement easier among groups of people separated in space and time... 1 The TA2 objectives... 2 Pathfinders to demonstrate and assess TA2... 3 World premiere:

More information

Panel Discussion. Dr. Dr. Norbert A. Streitz. The infinity Initiative Sophia Antipolis, 29. November Darmstadt, Germany

Panel Discussion. Dr. Dr. Norbert A. Streitz. The infinity Initiative Sophia Antipolis, 29. November Darmstadt, Germany The infinity Initiative Sophia Antipolis, 29. November 2007 Panel Discussion Dr. Dr. Norbert A. Streitz Darmstadt, Germany www.ipsi.fraunhofer.de/~streitz streitz@ipsi.fraunhofer.de Panel Discussion Topics

More information

Interactive Aircraft Cabin Simulator for Stress-Free Air Travel System: A Concurrent Engineering Design Approach

Interactive Aircraft Cabin Simulator for Stress-Free Air Travel System: A Concurrent Engineering Design Approach Interactive Aircraft Cabin Simulator for Stress-Free Air Travel System: A Concurrent Engineering Design Approach CheeFai Tan 1, Wei Chen and Matthias Rauterberg Designed Intelligence Group, Department

More information

Augmented Home. Integrating a Virtual World Game in a Physical Environment. Serge Offermans and Jun Hu

Augmented Home. Integrating a Virtual World Game in a Physical Environment. Serge Offermans and Jun Hu Augmented Home Integrating a Virtual World Game in a Physical Environment Serge Offermans and Jun Hu Eindhoven University of Technology Department of Industrial Design The Netherlands {s.a.m.offermans,j.hu}@tue.nl

More information

Towards an MDA-based development methodology 1

Towards an MDA-based development methodology 1 Towards an MDA-based development methodology 1 Anastasius Gavras 1, Mariano Belaunde 2, Luís Ferreira Pires 3, João Paulo A. Almeida 3 1 Eurescom GmbH, 2 France Télécom R&D, 3 University of Twente 1 gavras@eurescom.de,

More information

Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media

Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media Xinru Page School of Information and Computer Sciences University of California, Irvine Irvine, CA 92697 USA

More information

End User Tools for Ambient Intelligence Environments: An Overview.

End User Tools for Ambient Intelligence Environments: An Overview. See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/221100226 End User Tools for Ambient Intelligence Environments: An Overview. CONFERENCE PAPER

More information

Key factors in the development of digital libraries

Key factors in the development of digital libraries Key factors in the development of digital libraries PROF. JOHN MACKENZIE OWEN 1 Abstract The library traditionally has performed a role within the information chain, where publishers and libraries act

More information

A USEABLE, ONLINE NASA-TLX TOOL. David Sharek Psychology Department, North Carolina State University, Raleigh, NC USA

A USEABLE, ONLINE NASA-TLX TOOL. David Sharek Psychology Department, North Carolina State University, Raleigh, NC USA 1375 A USEABLE, ONLINE NASA-TLX TOOL David Sharek Psychology Department, North Carolina State University, Raleigh, NC 27695-7650 USA For over 20 years, the NASA Task Load index (NASA-TLX) (Hart & Staveland,

More information

Push-to-talk ios User Guide (v8.0)

Push-to-talk ios User Guide (v8.0) Push-to-talk ios User Guide (v8.0) PTT 8.0 ios - Table of Contents 1 Activating PTT on your ios device... 4 How to activate PTT on your Android Smartphone... 4 How to Logout and Login to the PTT Service...

More information

Catholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands

Catholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands INTELLIGENT AGENTS Catholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands Keywords: Intelligent agent, Website, Electronic Commerce

More information

Phantom-X. Unnur Gretarsdottir, Federico Barbagli and Kenneth Salisbury

Phantom-X. Unnur Gretarsdottir, Federico Barbagli and Kenneth Salisbury Phantom-X Unnur Gretarsdottir, Federico Barbagli and Kenneth Salisbury Computer Science Department, Stanford University, Stanford CA 94305, USA, [ unnurg, barbagli, jks ] @stanford.edu Abstract. This paper

More information

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS BY SERAFIN BENTO MASTER OF SCIENCE in INFORMATION SYSTEMS Edmonton, Alberta September, 2015 ABSTRACT The popularity of software agents demands for more comprehensive HAI design processes. The outcome of

More information

Using Agent Technology for Ambient Assisted Living

Using Agent Technology for Ambient Assisted Living Using Agent Technology for Ambient Assisted Living Nikolaos I. Spanoudakis 1 and Pavlos Moraitis 2 1 Applied Mathematics and Computers Laboratory Technical University of Crete, Greece nispanoudakis@isc.tuc.gr

More information

Can the Success of Mobile Games Be Attributed to Following Mobile Game Heuristics?

Can the Success of Mobile Games Be Attributed to Following Mobile Game Heuristics? Can the Success of Mobile Games Be Attributed to Following Mobile Game Heuristics? Reham Alhaidary (&) and Shatha Altammami King Saud University, Riyadh, Saudi Arabia reham.alhaidary@gmail.com, Shaltammami@ksu.edu.sa

More information

WEB I/O. Wireless On/Off Control USER MANUAL

WEB I/O. Wireless On/Off Control USER MANUAL Wireless On/Off Control Technical Support: Email: support@encomwireless.com Toll Free: 1 800 617 3487 Worldwide: (403) 230 1122 Fax: (403) 276 9575 Web: www.encomwireless.com Warnings and Precautions Warnings

More information

Methodology for Agent-Oriented Software

Methodology for Agent-Oriented Software ب.ظ 03:55 1 of 7 2006/10/27 Next: About this document... Methodology for Agent-Oriented Software Design Principal Investigator dr. Frank S. de Boer (frankb@cs.uu.nl) Summary The main research goal of this

More information

Pervasive Services Engineering for SOAs

Pervasive Services Engineering for SOAs Pervasive Services Engineering for SOAs Dhaminda Abeywickrama (supervised by Sita Ramakrishnan) Clayton School of Information Technology, Monash University, Australia dhaminda.abeywickrama@infotech.monash.edu.au

More information

A User-Friendly Interface for Rules Composition in Intelligent Environments

A User-Friendly Interface for Rules Composition in Intelligent Environments A User-Friendly Interface for Rules Composition in Intelligent Environments Dario Bonino, Fulvio Corno, Luigi De Russis Abstract In the domain of rule-based automation and intelligence most efforts concentrate

More information

AAL middleware specification

AAL middleware specification 2 AAL middleware specification Ambient Assisted Living Joint Programme project no. AAL-2013-6-060 Deliverable 5.2, version 1.0 Lead author: Co-author: Maciej Bogdański, Poznań Supercomputing and Networking

More information

Multi-sensory Tracking of Elders in Outdoor Environments on Ambient Assisted Living

Multi-sensory Tracking of Elders in Outdoor Environments on Ambient Assisted Living Multi-sensory Tracking of Elders in Outdoor Environments on Ambient Assisted Living Javier Jiménez Alemán Fluminense Federal University, Niterói, Brazil jjimenezaleman@ic.uff.br Abstract. Ambient Assisted

More information

SPTF: Smart Photo-Tagging Framework on Smart Phones

SPTF: Smart Photo-Tagging Framework on Smart Phones , pp.123-132 http://dx.doi.org/10.14257/ijmue.2014.9.9.14 SPTF: Smart Photo-Tagging Framework on Smart Phones Hao Xu 1 and Hong-Ning Dai 2* and Walter Hon-Wai Lau 2 1 School of Computer Science and Engineering,

More information

Door Prizes. Exploring Big Issues with Data in Society: Using Case Studies with Students

Door Prizes. Exploring Big Issues with Data in Society: Using Case Studies with Students 7/10/18 Exploring Big Issues with Data in Society: Using Case Studies with Students Door Prizes Kristin Fontichiaro University of Michigan School of Information 4T Virtual Conference on Data Literacy July

More information

Privacy Policy. Catalyst.Net Limited. Version 1.0

Privacy Policy. Catalyst.Net Limited. Version 1.0 Privacy Policy Catalyst.Net Limited Version 1.0 November 2017 1 Scope 1.1. This Privacy Policy describes how Catalyst collects, uses, discloses, stores and gives access to Personal Information in accordance

More information

Using the Tax Research Center

Using the Tax Research Center Using the Tax Research Center Always connect to the Tax Research Center through NAEA's website to receive the lowest possible price on research. Not a member? Join now members receive the absolutely lowest

More information

Panel: How to create intelligent services that leave the user in control

Panel: How to create intelligent services that leave the user in control Panel: How to create intelligent services that leave the user in control Panel Chairman George A. Papadopoulos, Associate Professor Department of Computer Science University of Cyprus george@cs.ucy.ac.cy

More information

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017 CONSENT IN THE TIME OF BIG DATA Richard Austin February 1, 2017 1 Agenda 1. Introduction 2. The Big Data Lifecycle 3. Privacy Protection The Existing Landscape 4. The Appropriate Response? 22 1. Introduction

More information

Science2Society Boosting innovation efficiency across Europe

Science2Society Boosting innovation efficiency across Europe Science2Society Boosting innovation efficiency across Europe BESTPRAC workshop September 20th, 2017 Brussels Bert Pluymers bert.pluymers@kuleuven.be This project has received funding from the European

More information

Today s Agenda. BIBSAM- The Royal Library Objectives for the 21st Century. Elsevier s Objective for the 21st Century

Today s Agenda. BIBSAM- The Royal Library Objectives for the 21st Century. Elsevier s Objective for the 21st Century Bringing the World s Largest Scientific Database to the Desktops of BIBSAM-The Royal Library Researchers. Today s Agenda Regional Sales Offices -- Teams Review of Library Objectives Lenerl Sharp Account

More information

Go Daddy Online Photo Filer

Go Daddy Online Photo Filer Getting Started and User Guide Discover an easier way to share, print and manage your photos online! Online Photo Filer gives you an online photo album site for sharing photos, as well as easy-to-use editing

More information

Personas & scenarios. TUTORIAL 3 Shyamli Sindhwani

Personas & scenarios. TUTORIAL 3 Shyamli Sindhwani Personas & scenarios TUTORIAL 3 Shyamli Sindhwani ssin820@aucklanduni.ac.nz Personas Archetype or character that represents a potential user of your website or system. A narrative description of a synthetic

More information

DocuSign for Sugar 7 v1.0. Overview. Quick Start Guide. Published December 5, 2013

DocuSign for Sugar 7 v1.0. Overview. Quick Start Guide. Published December 5, 2013 Quick Start Guide DocuSign for Sugar 7 v1.0 Published December 5, 2013 Overview This guide provides information on installing and signing documents with DocuSign for Sugar7. The Release Notes for DocuSign

More information

Kissenger: A Kiss Messenger

Kissenger: A Kiss Messenger Kissenger: A Kiss Messenger Adrian David Cheok adriancheok@gmail.com Jordan Tewell jordan.tewell.1@city.ac.uk Swetha S. Bobba swetha.bobba.1@city.ac.uk ABSTRACT In this paper, we present an interactive

More information

how many digital displays have rconneyou seen today?

how many digital displays have rconneyou seen today? Displays Everywhere (only) a First Step Towards Interacting with Information in the real World Talk@NEC, Heidelberg, July 23, 2009 Prof. Dr. Albrecht Schmidt Pervasive Computing University Duisburg-Essen

More information

CitiTag Multiplayer Infrastructure

CitiTag Multiplayer Infrastructure CitiTag Multiplayer Infrastructure Kevin Quick and Yanna Vogiazou KMI-TR-138 http://kmi.open.ac.uk/publications/papers/kmi-tr-138.pdf March, 2004 Introduction The current technical report describes the

More information

Demonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools

Demonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools Demonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools Avner Hatsek, Ohad Young, Erez Shalom, Yuval Shahar Medical Informatics Research Center Department of Information

More information

Entering Checkpoint Data

Entering Checkpoint Data Entering Checkpoint Data How do I change which Checkpoint Period I m viewing? To change the period from one to another, here are the steps: On the right side of the screen, click the grey drop-down "Change

More information

A Profile-based Trust Management Scheme for Ubiquitous Healthcare Environment

A Profile-based Trust Management Scheme for Ubiquitous Healthcare Environment A -based Management Scheme for Ubiquitous Healthcare Environment Georgia Athanasiou, Georgios Mantas, Member, IEEE, Maria-Anna Fengou, Dimitrios Lymberopoulos, Member, IEEE Abstract Ubiquitous Healthcare

More information

Click here to give us your feedback. New FamilySearch Reference Manual

Click here to give us your feedback. New FamilySearch Reference Manual Click here to give us your feedback. New FamilySearch Reference Manual January 25, 2011 2009 by Intellectual Reserve, Inc. All rights reserved Printed in the United States of America English approval:

More information

Ethical and social aspects of management information systems

Ethical and social aspects of management information systems Ethical and social aspects of management Marcos Sanches Commerce Électronique The challenge Why are contemporary and the Internet a challenge for the protection of privacy and intellectual property? How

More information

The Co-existence between Physical Space and Cyberspace

The Co-existence between Physical Space and Cyberspace The Co-existence between Physical Space and Cyberspace A Case Study WAN Peng-Hui, LIU Yung-Tung, and LEE Yuan-Zone Graduate Institute of Architecture, National Chiao Tung University, Hsinchu, Taiwan http://www.arch.nctu.edu.tw,

More information

ediana Embedded Systems for Energy-Efficient Buildings

ediana Embedded Systems for Energy-Efficient Buildings ediana Embedded Systems for Energy-Efficient Buildings www.artemis-ediana.eu Aitor Arriola, IKERLAN aarriola@ikerlan.es 4 th Concertation Meeting on Monitoring and Control Brussels, June 2 nd 2010 Project

More information

The OASIS Concept. Thessaloniki, Greece

The OASIS Concept. Thessaloniki, Greece The OASIS Concept Evangelos Bekiaris 1 and Silvio Bonfiglio 2 1 Centre for Research and Technology Hellas, Hellenic Institute of Transport, Thessaloniki, Greece abek@certh.gr 2 PHILIPS FIMI, Saronno, Italy

More information

FamilySearch Tools for Advanced Users

FamilySearch Tools for Advanced Users FamilySearch Tools for Advanced Users For this and more information about FamilySearch go to the FamilySearch blog at: https://www.familysearch.org/blog/ As with any website, there are many advanced capabilities

More information

Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture

Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture Western University Scholarship@Western Electronic Thesis and Dissertation Repository August 2011 Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture Diego Zuquim

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

Report. RRI National Workshop Germany. Karlsruhe, Feb 17, 2017

Report. RRI National Workshop Germany. Karlsruhe, Feb 17, 2017 Report RRI National Workshop Germany Karlsruhe, Feb 17, 2017 Executive summary The workshop was successful in its participation level and insightful for the state-of-art. The participants came from various

More information

GDPR Awareness. Kevin Styles. Certified Information Privacy Professional - Europe Member of International Association of Privacy professionals

GDPR Awareness. Kevin Styles. Certified Information Privacy Professional - Europe Member of International Association of Privacy professionals GDPR Awareness Kevin Styles Certified Information Privacy Professional - Europe Member of International Association of Privacy professionals Introduction Privacy and data protection are fundamental rights

More information

A Survey of Autonomic Computing Systems

A Survey of Autonomic Computing Systems A Survey of Autonomic Computing Systems Mohammad Reza Nami, Koen Bertels Computer Engineering Laboratory, Delft University of Technology Abstract The evolution of networks and Internet has introduced highly

More information

ASSEMBLY - 35TH SESSION

ASSEMBLY - 35TH SESSION A35-WP/52 28/6/04 ASSEMBLY - 35TH SESSION TECHNICAL COMMISSION Agenda Item 24: ICAO Global Aviation Safety Plan (GASP) Agenda Item 24.1: Protection of sources and free flow of safety information PROTECTION

More information

ieat: An Interactive Table for Restaurant Customers Experience Enhancement

ieat: An Interactive Table for Restaurant Customers Experience Enhancement ieat: An Interactive Table for Restaurant Customers Experience Enhancement George Margetis 1, Dimitris Grammenos 1, Xenophon Zabulis 1, and Constantine Stephanidis 1,2 1 Foundation for Research and Technology

More information

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain This fiche is part of the wider roadmap for cross-cutting KETs activities Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain Cross-cutting

More information

Sustainable information culture: what perception do information professionals have on their practices

Sustainable information culture: what perception do information professionals have on their practices Sustainable information culture: what perception do information professionals have on their practices Dominique Maurel, Associate Professor École de bibliothéconomie et des sciences de l information Université

More information

Introduction Pervasive Computing and Urban Development Issues for the individual and society JSY Chin, V Callaghan, G Clarke, H Hagras, M Colley Intelligent Inhabited Environments Group http://iieg.essex.ac.uk

More information

Auto-Explanation System: Player Satisfaction in Strategy-Based Board Games

Auto-Explanation System: Player Satisfaction in Strategy-Based Board Games Auto-Explanation System: Player Satisfaction in Strategy-Based Board Games Andrew Chiou 1 and Kok Wai Wong 2 1 School of Computing Sciences, CQUniversity Australia, Rockhampton Campus, Rockhampton Campus,

More information

The HiveSurf Prototype Project - Application for a Ubiquitous Computing World

The HiveSurf Prototype Project - Application for a Ubiquitous Computing World The HiveSurf Prototype Project - Application for a Ubiquitous Computing World Thomas Nicolai Institute for Media and Communications Management University of St.Gallen thomas.nicolai@unisg.ch Florian Resatsch

More information

Pervasive Computing: Study for Homes

Pervasive Computing: Study for Homes Research Cell: An International Journal of Engineering Sciences ISSN: 2229-6913 Issue Sept 2011, Vol. 4 71 Pervasive Computing: Study for Homes Department of Computer Science, Himachal Pradesh University,

More information

OBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK

OBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK xv Preface Advancement in technology leads to wide spread use of mounting cameras to capture video imagery. Such surveillance cameras are predominant in commercial institutions through recording the cameras

More information

MANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS

MANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS MANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS T.VENGATTARAMAN, P. DHAVACHELVAN Department of Computer Science, Pondicherry University, Puducherry, India. vengat.mailbox@gmail.com, dhavachelvan@gmail.com

More information

An Audio-Haptic Mobile Guide for Non-Visual Navigation and Orientation

An Audio-Haptic Mobile Guide for Non-Visual Navigation and Orientation An Audio-Haptic Mobile Guide for Non-Visual Navigation and Orientation Rassmus-Gröhn, Kirsten; Molina, Miguel; Magnusson, Charlotte; Szymczak, Delphine Published in: Poster Proceedings from 5th International

More information

Violent Intent Modeling System

Violent Intent Modeling System for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716

More information

Legacy FamilySearch Overview

Legacy FamilySearch Overview Legacy FamilySearch Overview Legacy Family Tree is "Tree Share" Certified for FamilySearch Family Tree. This means you can now share your Legacy information with FamilySearch Family Tree and of course

More information

ANEC response to the CEN-CENELEC questionnaire on the possible need for standardisation on smart appliances

ANEC response to the CEN-CENELEC questionnaire on the possible need for standardisation on smart appliances ANEC response to the CEN-CENELEC questionnaire on the possible need for standardisation on smart appliances In June 2015, the CEN and CENELEC BT members were invited to share their views on the need for

More information

Online Identity By CommonLit Staff 2014

Online Identity By CommonLit Staff 2014 Name: Class: Online Identity By CommonLit Staff 2014 Consider the different ways we express our identity, especially in the new age of technology. The Internet has heavily shaped our notion of identity.

More information

Agent-Based Systems. Agent-Based Systems. Agent-Based Systems. Five pervasive trends in computing history. Agent-Based Systems. Agent-Based Systems

Agent-Based Systems. Agent-Based Systems. Agent-Based Systems. Five pervasive trends in computing history. Agent-Based Systems. Agent-Based Systems Five pervasive trends in computing history Michael Rovatsos mrovatso@inf.ed.ac.uk Lecture 1 Introduction Ubiquity Cost of processing power decreases dramatically (e.g. Moore s Law), computers used everywhere

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number

More information

Performance Evaluation of an Online Text-Based Strategy Game

Performance Evaluation of an Online Text-Based Strategy Game Performance Evaluation of an Online Text-Based Strategy Game Nazleeni S. Haron, Mohd K. Zaime, Izzatdin A. Aziz and Mohd H. Hasan Abstract Text-based game is supposed to be a low resource consumption application

More information

Field Device Manager Express

Field Device Manager Express Honeywell Process Solutions Field Device Manager Express Software Installation User's Guide EP-FDM-02430X R430 June 2012 Release 430 Honeywell Notices and Trademarks Copyright 2010 by Honeywell International

More information

Screens for Content. Kids Media Journeys revealed

Screens for Content. Kids Media Journeys revealed Screens for Content Kids Media Journeys revealed Every day children look for media content on-screen - be it on, tablet, smartphone, offline or online. We followed their content journey to understand what

More information

Promoting citizen-based services through local cultural partnerships

Promoting citizen-based services through local cultural partnerships Promoting citizen-based services through local cultural partnerships CALIMERA Policy Conference Copenhagen, January 2005 Ian Pigott European Commission Directorate General Information Society Directorate

More information

04 - Introduction to Privacy

04 - Introduction to Privacy 04 - Introduction to Privacy Lorrie Cranor, Blase Ur, and Rich Shay Engineering & Public Policy January 22, 2015 05-436 / 05-836 / 08-534 / 08-734 Usable Privacy and Security 1 Today! What does privacy

More information

Selecting Photos for Sharing

Selecting Photos for Sharing MHCI Team Ben Elgart Saara Kamppari Bridget Lewis Ajay Prasad Yong Woo Rhee Lalatendu Satpathy Microsoft Live Labs Steven Drucker Selecting Photos for Sharing Client-Sponsored MHCI Capstone Project Ben

More information

IoT in Health and Social Care

IoT in Health and Social Care IoT in Health and Social Care Preserving Privacy: Good Practice Brief NOVEMBER 2017 Produced by Contents Introduction... 3 The DASH Project... 4 Why the Need for Guidelines?... 5 The Guidelines... 6 DASH

More information

HCI: CONTEXTUAL INQUIRY STORYBOARDS, DESIGN PATTERNS. Dr Kami Vaniea

HCI: CONTEXTUAL INQUIRY STORYBOARDS, DESIGN PATTERNS. Dr Kami Vaniea HCI: CONTEXTUAL INQUIRY STORYBOARDS, DESIGN PATTERNS Dr Kami Vaniea 1 First, the news Privacy dark patterns http://darkpatterns.org/pr ivacy-zuckering/ Can you spot the dark pattern? 2 First, the news

More information

Practical measures to encourage the diffusion of green technologies: Licensing Fast tracking of green patents The GreenXchange Platform

Practical measures to encourage the diffusion of green technologies: Licensing Fast tracking of green patents The GreenXchange Platform Practical measures to encourage the diffusion of green technologies: Licensing Fast tracking of green patents The GreenXchange Platform Ahmed Abdel Latif Senior Programme Manager Innovation, Technology

More information

User Guide: PTT Application - Android. User Guide. PTT Application. Android. Release 8.3

User Guide: PTT Application - Android. User Guide. PTT Application. Android. Release 8.3 User Guide PTT Application Android Release 8.3 March 2018 1 1. Introduction and Key Features... 6 2. Application Installation & Getting Started... 7 Prerequisites... 7 Download... 8 First-time Activation...

More information

ELG 5121/CSI 7631 Fall Projects Overview. Projects List

ELG 5121/CSI 7631 Fall Projects Overview. Projects List ELG 5121/CSI 7631 Fall 2009 Projects Overview Projects List X-Reality Affective Computing Brain-Computer Interaction Ambient Intelligence Web 3.0 Biometrics: Identity Verification in a Networked World

More information

The GDPR and Upcoming mhealth Code of Conduct. Dr Etain Quigley Postdoctoral Research Fellow (ARCH, UCD)

The GDPR and Upcoming mhealth Code of Conduct. Dr Etain Quigley Postdoctoral Research Fellow (ARCH, UCD) The GDPR and Upcoming mhealth Code of Conduct Dr Etain Quigley Postdoctoral Research Fellow (ARCH, UCD) EU General Data Protection Regulation (May 2018) First major reform in 20 years 25 th May 2018 no

More information

Getting started with AutoCAD mobile app. Take the power of AutoCAD wherever you go

Getting started with AutoCAD mobile app. Take the power of AutoCAD wherever you go Getting started with AutoCAD mobile app Take the power of AutoCAD wherever you go Getting started with AutoCAD mobile app Take the power of AutoCAD wherever you go i How to navigate this book Swipe the

More information

CPE/CSC 580: Intelligent Agents

CPE/CSC 580: Intelligent Agents CPE/CSC 580: Intelligent Agents Franz J. Kurfess Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. 1 Course Overview Introduction Intelligent Agent, Multi-Agent

More information

The Impact of Smartphone Technology in Clinical Practice Session 46, March 6, 2018 Dr. Sean P Spina, BScPharm, ACPR, PharmD, FCSHP Clinical Pharmacy

The Impact of Smartphone Technology in Clinical Practice Session 46, March 6, 2018 Dr. Sean P Spina, BScPharm, ACPR, PharmD, FCSHP Clinical Pharmacy The Impact of Smartphone Technology in Clinical Practice Session 46, March 6, 2018 Dr. Sean P Spina, BScPharm, ACPR, PharmD, FCSHP Clinical Pharmacy Coordinator - Island Health Clinical Assistant Professor

More information

Designing the user experience of a multi-bot conversational system

Designing the user experience of a multi-bot conversational system Designing the user experience of a multi-bot conversational system Heloisa Candello IBM Research São Paulo Brazil hcandello@br.ibm.com Claudio Pinhanez IBM Research São Paulo, Brazil csantosp@br.ibm.com

More information

Technical Requirements of a Social Networking Platform for Senior Citizens

Technical Requirements of a Social Networking Platform for Senior Citizens Technical Requirements of a Social Networking Platform for Senior Citizens Hans Demski Helmholtz Zentrum München Institute for Biological and Medical Imaging WG MEDIS Medical Information Systems MIE2012

More information

Virtual Foundry Modeling and Its Applications

Virtual Foundry Modeling and Its Applications Virtual Foundry Modeling and Its Applications R.G. Chougule 1, M. M. Akarte 2, Dr. B. Ravi 3, 1 Research Scholar, Mechanical Engineering Department, Indian Institute of Technology, Bombay. 2 Department

More information

A Service-Oriented Platform for Pervasive Awareness Systems

A Service-Oriented Platform for Pervasive Awareness Systems 2009 International Conference on Advanced Information Networking and Applications Workshops A Service-Oriented Platform for Pervasive Awareness Systems C. Goumopoulos 1, A. Kameas 1,2, E. Berg 3, I. Calemis

More information