EXTENDED TABLE OF CONTENTS

Size: px
Start display at page:

Download "EXTENDED TABLE OF CONTENTS"

Transcription

1 EXTENDED TABLE OF CONTENTS Preface OUTLINE AND SUBJECT OF THIS BOOK DEFINING UC THE SIGNIFICANCE OF UC THE CHALLENGES OF UC THE FOCUS ON REAL TIME ENTERPRISES THE S.C.A.L.E. CLASSIFICATION USED IN THIS BOOK READER S DIGEST The chapter provides an introduction to and a definition of Ubiquitous Computing as a Computer Science field and relates it to the concept of Real Time Enterprises. The authors describe the main challenges in Ubiquitous Computing and introduce the S.C.A.L.E. classification employed to organize the contents of the book. Finally, recommendations about using the book as a reference and teaching resource are given. Chapter 1: Introduction to Ubiquitous Computing A BRIEF HISTORY OF UBIQUITOUS COMPUTING TERMS AND SELECTED STANDARDS REFERENCE ARCHITECTURES FOR UBIQUITOUS COMPUTING PROPOSED UC COMPONENT REFERENCE ARCHITECTURES UC LAYERED REFERENCE ARCHITECTURES The authors briefly describe the history of Ubiquitous Computing. Some terms and a few important standards are subsequently introduced. In the last part, two kinds of reference architectures for Ubiquitous Computing systems are discussed by way of example. Part I: Scalability Introduction to Part I: Two Aspects of Global Scale GENERAL TO SCALABILITY IMPORTANCE OF SCALABILITY FOR UBIQUITOUS COMPUTING SCALABILITY APPROACHES FOR UBIQUITOUS COMPUTING OVERVIEW OF FURTHER CHAPTERS The introduction is devoted to the notion of scalability and its categories, namely mathematical scalability and economical-technical scalability. After that the importance of scalability for ubiquitous computing systems is discussed as well as important approaches addressing this issue. This prepares the ground for the chapters in part I. Chapter 2: Bionics: Learning from "The Born" BIO-ANALOG COMPUTING ON THE ORGANISM LEVEL BIO-ANALOG COMPUTING ON THE CELL LEVEL SOMS BIO-ANALOG COMPUTING ON THE MOLECULAR LEVEL BIO-ANALOG DATA MANAGEMENT The chapter focuses on distributed approaches to address the scalability challenges in ubiquitous computing by means of bio-analog algorithms, which draw upon the realm of biology. The author describes the algorithms based on the phenomena found on the organism level of biological systems and examines the algorithms imitating procedures both on the cell and the molecular levels. Bio-analog approaches are finally extrapolated to data management as a novel field. Chapter 3: Ubiquitous Services and Business Processes SERVICE-ORIENTED ARCHITECTURE FUNDAMENTALS WEB SERVICES COMPOSITION SCALING SOA FOR UC APPLICATIONS

2 The author describes Service-Oriented Architecture (SOA) based on Web Services interfaces and messaging, and service composition through single-party process orchestration and multi-party choreography languages. For the latter, concrete patterns are used to describe the capabilities of prospective standards. Ways, in which SOA needs to be extended to allow wider and more flexible service trading, typified in current developments through service marketplaces, are then discussed. Such extensions converge with directions in Ubiquitous Computing through so-called ubiquitous service networks and service ecosystems. Chapter 4: Ontologies for Scalable Services-Based Ubiquitous Computing CHALLENGES IN SERVICE-ORIENTED SMART ITEMS MIDDLEWARE ONTOLOGIES AND SEMANTIC WEB SPECIFICATIONS RDF(S) OWL BENEFITS OF ONTOLOGIES LIMITATIONS OF ONTOLOGIES ONTOLOGIES FOR IMPROVING THE SMART ITEMS MIDDLEWARE CONCLUSIONS Ontologies are proposed to address the scalability problems in Ubiquitous Computing, such as: (i) identifying relevant services for deployment, (ii) verifying a composition by a logical rule framework, and (iii) enabling the mapping of required services to the best available device. The authors focus on the ontology languages emerging from the corresponding W3C Semantic Web Activity. The pros and cons of ontologies are contrasted at a general level and the benefits and challenges in concrete smart items middleware are demonstrated. Chapter 5: Service Discovery SERVICE ORIENTED ARCHITECTURES SERVICE DESCRIPTION & DISCOVERY SERVICE DISCOVERY SYSTEMS JINI UDDI API RESEARCH The chapter briefly discusses the attributes that define SOA and the roles of the participants in a service oriented environment. In essence, SOA permits clients in open systems to use services offered by a service provider in the context of a workflow or complex task. Services are offered with a description at well-known places (also called registries, repositories), where clients choose services according to their needs. The chapter discusses several approaches to describing services and to searching for them. Moreover, some well-known systems and current related research are discussed. Part II: Connectivity Introduction to Part II: Tapping into Humans and Items GENERAL TO CONNECTIVITY IMPORTANCE OF CONNECTIVITY FOR UBIQUITOUS COMPUTING CONNECTIVITY APPROACHES FOR UBIQUITOUS COMPUTING OVERVIEW OF FURTHER BOOK CHAPTERS FURTHER READING Connectivity issues in Ubiquitous Computing are described in a layered approach, from how to get the signals across to novel application paradigms. Well-known approaches for each layer are briefly mentioned, novel ones are linked to the respective chapters of book part II.

3 Chapter 6: Wireless and Mobile Communication AND FOUNDATIONS THE FIVE MAJOR MOST RELEVANT CLASSES OF WIRELESS NETWORKS The chapter focuses on different wireless and mobile communication systems that form the technological basis for Ubiquitous Computing applications. Depending on many parameters, such as transmission range, desired data rates, cost, mobility, power consumption, scalability in the number of users etc., different communication systems have been developed. They are surveyed and compared and future directions are highlighted. Chapter 7: Event-Based and Publish/Subscribe Communication PUBLISH/SUBSCRIBE DISTRIBUTED EVENT-BASED SYSTEMS ROUTER TOPOLOGIES ROUTING DEBS IN UBIQUITOUS COMPUTING EXAMPLES OF PUBLISH/SUBSCRIBE SYSTEMS The chapter introduces a taxonomy of communication models and emphasizes the event-based model and publish-subscribe paradigm that will supersede the client-server paradigm in the Ubiquitous Computing era. The relevant aspects of the publish-subscribe paradigm are introduced along with known approaches. The inner working of distributed event-based systems is thoroughly treated. Chapter 8: Peer-to-Peer Systems CURRENT SYSTEMS CLASSIFICATION OF EXISTING SYSTEMS RESOURCE LOCATION IN PEER-TO-PEER NETWORKS SUITABILITY OF PEER-TO-PEER SYSTEMS FUTURE OF PEER-TO-PEER SYSTEMS Wide-spread and novel application domains for peer-to-peer technology are described; challenges for appropriate support of the latter are pointed out. Unstructured peer-to-peer networks and their variants are contrasted with structured ones. The suitability and open issues in the context of Ubiquitous Computing are highlighted. Chapter 9: Opportunistic Networks AND MOTIVATION UNDERLYING IDEAS AND CONCEPTS DIFFERENCES TO MOBILE P2P AND MANETS OPPORTUNISTIC NETWORK APPLICATIONS ADDITIONAL HUMAN FACTORS RESEARCH OUTLOOK Opportunistic networks support an increasingly interesting class of Ubiquitous Computing applications, which deliberately limit connectivity to physical proximity of users. This application class and its variants are described and contrasted with wireless ad hoc networks and mobile Peer-2-Peer systems. Important human factors are treated, in particular privacy conservation and incentive schemes. Pertinent approaches are introduced by way of examples. Chapter 10: Smart Items in Real Time Enterprises WHAT ARE SMART ITEMS? HOW BUSINESS PROCESSES BENEFIT FROM SMART ITEMS? A SMART ITEM MIDDLEWARE DEVICE ABSTRACTION REQUEST PROCESSING SMART ITEMS SERVICE DEPLOYMENT

4 This chapter deals with the idea of how smart items i.e. electronically labeled and augmented physical entities can contribute to the overall vision of the Real Time Enterprise by utilizing different Ubiquitous Computing technologies. The main components of the Smart Items Middleware are described. Part III: Adaptability Introduction to Part III: What is (not) context? WHAT IS CONTEXT? WHY IS CONTEXT IMPORTANT? HOW TO CREATE ''CONTEXT AWARENESS''? STRUCTURE OF PART ADAPTABILITY The introduction outlines the notion of context and explains why it is of crucial importance in Ubiquitous Computing systems. Different types of context are listed as well as issues that have to be dealt with while modeling and using it. Several research projects focusing on context in ubiquitous computing are presented and the structure of part III is then described. Chapter 11: Context Models and Context Awareness WHAT IS CONTEXT? WHAT ARE CONTEXT-AWARE APPLICATIONS? HOW TO BUILD A CONTEXT-AWARE APPLICATION? MIDDLEWARE ARCHITECTURES DEALING WITH UNCERTAINTY This chapter gives an overview of how knowledge of the current context, i.e. information characterizing the situation, can be represented and how this knowledge can be used for enhancing applications. The definitions of context and context-aware applications are given. The authors present guidelines on how to build a context-aware application and some challenges in using context information are discussed. Chapter 12: A Focus on Location Context POSITIONING PRINCIPLES SIGNAL PROPAGATION SELECTED POSITIONING SYSTEMS LOCATION MODELS With respect to the important Ubiquitous Computing issue context awareness, location is presently considered the most important and best supported context. Accordingly, the chapter starts with an overview of relevant location determination technologies. A thorough treatment of the physical and mathematical foundations of location determination follows. Both indoor and outdoor position are treated in detail. The chapter also provides insight into a broad range of available positioning systems. Chapter 13: Adapting to the User ADAPTING TO THE USER MODELING THE USER INFERENCE TECHNIQUES FOR PERSONALIZATION CENTRALIZED, DISTRIBUTED AND ISOLATED PERSONALIZATION SERVICES Adaptation is needed to handle the increasing complexity in today s computing environments. The chapter focuses on the aspect of adaptation that puts the user into focus. It thus provides an important complement to the adaptation via context-awareness that is emphasized in the Ubiquitous Computing community and in the two preceding chapters. It introduces different adaptation types possible in Ubiquitous Computing, like interaction, content, and presentation. Basic requirements for appropriately modelling the users and approaches to personalize applications are presented.

5 Part IV: Liability Introduction to Part IV: From IT Security to Liability GENERAL TO SECURITY AND LIABILITY LIABILITY IN UBIQUITOUS COMPUTING OVERVIEW OF FURTHER CHAPTERS REFERENCES A general introduction to liability and security in Ubiquitous Computing is given along with the respective definitions. Then, an overview of chapters in part IV is provided and some background readings on the topic are recommended. Chapter 14: Accounting and Billing, Guarantees and Contracts TERMINOLOGY TECHNOLOGIES AND SERVICES CHARGING APPROACHES For IP-based communications, charging is used as a comprehensive term for metering or monitoring, accounting, pricing, charge calculation, and billing. These five actions are detailed in the chapter to provide a clear view on their interdependencies as well as their relations to distributed computing. The legal and contractual relationships between customers and providers as well as technological choices of protocols, mechanisms, and parameters define the area of interest here. With their background purpose of assuring and verifying exactly the flow of service provision and service remuneration intended, the concepts described represent an important ingredient of future liability concepts for Ubiquitous Computing Chapter 15: Security for Ubiquitous Computing FOUR UC SETTINGS A TAXONOMY OF UC SECURITY OVERVIEW OF CRYPTOGRAPHIC TOOLS SAMPLE SOLUTIONS RESEARCH OUTLOOK The chapter motivates the need for a dedicated treatment of security in the context of Ubiquitous Computing. It systematically discusses the particular security challenges and predominant security risks in the Ubiquitous Computing context. The major part of the chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms required and increasingly available. An overview of cryptographic tools is given. Chapter 16: Trust and Accountability TRUST ACCOUNTABILITY RESEARCH OUTLOOK The chapter focuses on the concepts of trust and accountability. The author first introduces the semantics of both concepts and then explains why trust is relevant for Ubiquitous Computing and what the main issues for dealing with trust in computer science are. Then, the chapter discusses how accountability can be achieved in distributed systems using reputation and micropayment mechanisms.

6 Part V: Ease-of-Use Introduction to Part V: Natural and Multimodal Interaction NATURAL AND MULTIMODAL INTERACTION WHAT IS MULTIMODAL INTERACTION? WHY IS MULTIMODAL INTERACTION IMPORTANT? HOW TO CREATE ''MULTIMODAL APPLICATIONS''? BEST PRACTICES TO CREATE NATURAL INTERFACES RESEARCH AND DEVELOPMENT PROJECTS STRUCTURE OF PART ''NATURAL AND MULTIMODAL INTERACTION'' SUGGESTED FURTHER READINGS The chapter discusses multimodality as an important property of ubiquitous computing systems which supports user interactions with the system involving multiple ways of interacting. It explains what the major components of a multimodal system are and presents some best practices on how to build multimodal applications. Some research projects dealing with multimodality are discussed and the structure of book part V is outlined. Chapter 17: Mobile Speech Recognition OVERVIEW SPEECH RECOGNITION ON EMBEDDED DEVICES SERVICE DEPENDENT SPEECH RECOGNITION DEVICE INHERENT SPEECH RECOGNITION This chapter is considered as a prerequisite for deeper understanding of the subsequent chapter. It gives an overview of the main architectures to enable speech recognition on embedded devices, including their characteristic features and properties. A description of the main challenges for the use of speech recognition on embedded devices and thus, in the Ubiquitous Computing context is given. The author provides a solid base for the selection of the most appropriate architecture for the business case of Real Time Enterprises. Chapter 18: Mouth and Ear Interaction MOTIVATION DIALOG STRATEGIES DOMAIN SPECIFIC DEVELOPMENT MOUTH AND EAR INTERACTION IN SMART ENVIRONMENTS FURTHER EXAMPLES CHALLENGES WITH AUDIO WAYS TO MASTER THESE CHALLENGES Ubiquitous Computing involves users on the move, suggesting hands-and-eyes-free operation, for which speech is an obvious choice. The chapter gives an overview of the challenges that have to be mastered in Ubiquitous Computing while working with audio, which is not easy to handle as a medium. To make things worse, mouth and ear interaction is often performed without focusing attention on the device. The author explains why audio based interfaces are challenging to handle and provides some pointers to the solutions. He shows how to master the challenges and to improve the quality of applications involving mouth and ear interaction. Chapter 19: Advanced Hands and Eyes Interaction AND BASIC PRINCIPLES MULTISCALE OUTPUT LARGE DISPLAYS AND SMALL DISPLAYS INPUT DEVICES AND CHARACTERISTICS INTEGRATION OF PHYSICAL AND VIRTUAL WORLD ATTENTION AFFECTION

7 While mouth-and-ears interaction is becoming more important for Ubiquitous Computing, hands-and-eyes interaction, especially in novel forms, remains essential. The chapter gives an overview of the broad range of pertinent interaction techniques. The chapter gives a short introduction to the fundamentals of human computer interaction and the traditional user interfaces. It then surveys multi-scale output devices, gives a general idea of hands and eyes input, specializes them by merging the virtual and real world, and introduces attention and affection for enhancing the interaction with computers and especially with disappearing computers. Chapter 20: Intelligent User Interfaces BUILDING GOOD USER INTERFACES EVALUATIONS, ALTERNATIVES AND PROTOTYPES SPECIFIC CHALLENGES OF USER-INTERFACES FOR UBIQUITOUS COMPUTING INTELLIGENT AND DUMB INTERFACES FOR UBIQUITOUS COMPUTING HOW MUCH INTELLIGENCE? CONCLUSIONS The chapter introduces a set of general approaches for designing user interfaces with a special focus on the specific needs for Ubiquitous Computing scenarios. The author learns from good interface design for other classical devices and applies many of those user interface design principles to Ubiquitous Computing as well. A central aspect is the design process that helps to find the right sequence of steps in building a good user interface. Chapter 21: Multimodal and Federated Interaction THE BASICS OF MULTIMODALITY MULTIMODALITY ON THE DESKTOP MULTIMODALITY FOR MOBILE DEVICES DEVICE FEDERATION SOCIAL IMPACT OF VOICE TECHNOLOGIES The authors first introduce some of the various modalities available for human computer interaction. Then, they discuss how multimodality can be used both in desktop and mobile computing environments. The goal of the chapter is to familiarize scholars and researchers with the range of topics covered under the heading multimodality and suggest new areas of research around the combination of modalities, as well as the combination of mobile and stationary computing devices to improve usability. Chapter 22: Multimodal Software Engineering WEB-CENTRIC APPROACHES ABSTRACT USER INTERFACES MODEL BASED USER INTERFACES Ubiquitous Computing makes it necessary to supplant the desktop metaphor of graphical user interfaces by other kinds of user interfaces for a multitude of devices and interaction modalities. The chapter presents three different software engineering approaches that address this challenge: extensions to Web based approaches, abstract user interface definitions that add a level of abstraction to the user interface definition, and model based approaches that extend model based application development to integrate user interface issues as well. Chapter 23: Ambient Learning UBIQUITOUS COMPUTING AND LEARNING LEARNING THEORIES SUPPORTING AMBIENT LEARNING IT STARTS WITH THE PRIMITIVES ENABLING AMBIENT INTELLIGENCE AND LEARNING SMART PRODUCTS THE DEVICE LAYER BUILDING AMBIENT INTELLIGENCE

8 Ambient Learning is a new area in Ubiquitous Computing, dealing with the different learning processes that occur between people and smart technology environments. The chapter provides a definition of what ambient learning is and discusses its relevance to Ubiquitous Computing. It presents the learning concepts behind ambient learning and a detailed example of training a user. The technological building blocks behind the smart products supporting their ability to learn from each other and assemble or compose their functionality are examined in detail. Part VI: Pilots and Trends at SAP-Research Chapter 24: CoBIs: Collaborative Business Items BACKGROUND APPLICATION SCENARIO ARCHITECTURE/DESIGN IMPLEMENTATION EVALUATION CONCLUSION The chapter describes an example of Ubiquitous Computing technology in a corporate environment. The goal of the pilot was reduction of the risk in handling hazardous substances by detecting potentially dangerous storage situations and raising alarms if certain rules are violated. The lesson learnt: if employed in a shop floor, warehouse, or retail environment, UC technology can improve real-world business processes, making them safer and more efficient. Chapter 25: PROMISE: Product Lifecycle Management and Information Tracking using Smart Embedded Systems PROJECT GOALS INNOVATIONS IN PLM BUSINESS PROCESSES TECHNICAL SOLUTION OVERVIEW IMPLEMENTATION BENEFITS AND LIMITATIONS The goals and application scenarios of the PROMISE project are presented. The PROMISE project aims to close the information loop in Product Lifecycle Management by employing product embedded information devices (PEIDs) in products. Special attention is given to the middleware design and implementation well as the role of Universal Plug and Play (UPnP) as device-level protocol. Chapter 26: Real-time Location Tracking Mashup for the Enterprise AUTOMATIC VEHICLE LOCATION (AVL) NEW TECHNOLOGIES SYSTEM ARCHITECTURE APPLICATION FLOW APPLICATION FEATURES AND SCREENSHOTS LESSONS LEARNED CONCLUSION The chapter describes a new Automatic Vehicle Location (AVL) system designed to take advantage of technologies that are currently gaining popularity in the enterprise, namely, online maps, real-time GPS location tracking, and service-oriented architectures. The system uses a service-oriented architecture and Ajax-style user interface technology. The authors show that for Ajax technology to be widely adopted in the applications involving real-time data updates, a server-side push mechanism is needed. Chapter 27: Towards Adaptive Security for UC Systems: MOSQUITO and Serenity MOBILE WORKERS SECURE BUSINESS APPLICATIONS IN UBIQUITOUS ENVIRONMENTS THE MOSQUITO PROJECT BACKGROUND MOSQUITO ARCHITECTURE MOSQUITO SCENARIO

9 PERVASIVE WORKFLOW EVALUATION SYSTEMS ENGINEERING FOR SECURITY AND DEPENDABILITY THE SERENITY PROJECT BACKGROUND THE SERENITY APPROACH PATTERNS AND INTEGRATION SCHEMES EVALUATION CONCLUSIONS The authors introduce two example projects that contribute to meeting the challenges in adaptive security. The first project focuses on an architecture that allows for adaptive security in mobile environments based on security services whose adaptation is guided by context information derived from sensor networks. The second project addresses engineering aspects of secure Ubiquitous Computing systems through making security solutions accessible and deployable on demand and following emerging application-level requirements. Chapter 28: Multimodal Warehouse Project THE PICKING PROCESS PROBLEM DESCRIPTION THE MULTIMODAL WAREHOUSE APPLICATION THE WAREHOUSE PILOT PROJECT CONCLUSION The Multimodal Warehouse Project is presented which aims at applying multimodal interaction to a warehouse picking process. The authors provide an overview of the warehouse picking procedure as well as the overall architecture of the multimodal picking application and technologies applied to design the application. Then, they describe the execution of user tests of the picking application at a warehouse and present the results of these tests. Chapter 29: Business Grids Grid Computing for Business Applications BUSINESS GRIDS: MOTIVATION AND OBJECTIVES A VISION FOR BUSINESS GRIDS STATE OF THE ART The second short contribution about emerging trends proposes business grids as a means to provide enterprise computing infrastructures "as a utility" so that software and hardware resources (such as applications, components, systems, and servers) can be easily operated under frequently changing business conditions (such as changing strategies, models, processes, workload etc.). The chapter details the vision of Business Grids from various solution perspectives, describes the state of the art in Grid Computing and compares Business Grids and escience Grids.

AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS

AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS Vicent J. Botti Navarro Grupo de Tecnología Informática- Inteligencia Artificial Departamento de Sistemas Informáticos y Computación

More information

Methodology for Agent-Oriented Software

Methodology for Agent-Oriented Software ب.ظ 03:55 1 of 7 2006/10/27 Next: About this document... Methodology for Agent-Oriented Software Design Principal Investigator dr. Frank S. de Boer (frankb@cs.uu.nl) Summary The main research goal of this

More information

PERSONA: ambient intelligent distributed platform for the delivery of AAL Services. Juan-Pablo Lázaro ITACA-TSB (Spain)

PERSONA: ambient intelligent distributed platform for the delivery of AAL Services. Juan-Pablo Lázaro ITACA-TSB (Spain) PERSONA: ambient intelligent distributed platform for the delivery of AAL Services Juan-Pablo Lázaro jplazaro@tsbtecnologias.es ITACA-TSB (Spain) AAL Forum Track F Odense, 16 th September 2010 OUTLINE

More information

Challenges In Context

Challenges In Context Challenges In Context Stewart Fallis 2, Ian Millard 1, David De Roure 1 Kevin Page 1 1 Intelligence, Agents, Multimedia Group University of Southampton http://www.iam.ecs.soton.ac.uk/ 2 Mobility Centre

More information

preface Motivation Figure 1. Reality-virtuality continuum (Milgram & Kishino, 1994) Mixed.Reality Augmented. Virtuality Real...

preface Motivation Figure 1. Reality-virtuality continuum (Milgram & Kishino, 1994) Mixed.Reality Augmented. Virtuality Real... v preface Motivation Augmented reality (AR) research aims to develop technologies that allow the real-time fusion of computer-generated digital content with the real world. Unlike virtual reality (VR)

More information

Charting Past, Present, and Future Research in Ubiquitous Computing

Charting Past, Present, and Future Research in Ubiquitous Computing Charting Past, Present, and Future Research in Ubiquitous Computing Gregory D. Abowd and Elizabeth D. Mynatt Sajid Sadi MAS.961 Introduction Mark Wieser outlined the basic tenets of ubicomp in 1991 The

More information

Computer Challenges to emerge from e-science

Computer Challenges to emerge from e-science Computer Challenges to emerge from e-science Malcolm Atkinson (NeSC), Jon Crowcroft (Cambridge), Carole Goble (Manchester), John Gurd (Manchester), Tom Rodden (Nottingham),Nigel Shadbolt (Southampton),

More information

The Key to the Internet-of-Things: Conquering Complexity One Step at a Time

The Key to the Internet-of-Things: Conquering Complexity One Step at a Time The Key to the Internet-of-Things: Conquering Complexity One Step at a Time at IEEE QRS2017 Prague, CZ June 19, 2017 Adam T. Drobot Wayne, PA 19087 Outline What is IoT? Where is IoT in its evolution? A

More information

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS BY SERAFIN BENTO MASTER OF SCIENCE in INFORMATION SYSTEMS Edmonton, Alberta September, 2015 ABSTRACT The popularity of software agents demands for more comprehensive HAI design processes. The outcome of

More information

Multi-sensory Tracking of Elders in Outdoor Environments on Ambient Assisted Living

Multi-sensory Tracking of Elders in Outdoor Environments on Ambient Assisted Living Multi-sensory Tracking of Elders in Outdoor Environments on Ambient Assisted Living Javier Jiménez Alemán Fluminense Federal University, Niterói, Brazil jjimenezaleman@ic.uff.br Abstract. Ambient Assisted

More information

HELPING THE DESIGN OF MIXED SYSTEMS

HELPING THE DESIGN OF MIXED SYSTEMS HELPING THE DESIGN OF MIXED SYSTEMS Céline Coutrix Grenoble Informatics Laboratory (LIG) University of Grenoble 1, France Abstract Several interaction paradigms are considered in pervasive computing environments.

More information

Middleware and Software Engineering for the Internet of Things. Sophie Chabridon Télécom SudParis

Middleware and Software Engineering for the Internet of Things. Sophie Chabridon Télécom SudParis Middleware and Software Engineering for the Internet of Things Sophie Chabridon Télécom SudParis SAMOVAR UMR Lab ACMES team http://samovar.telecom-sudparis.eu/ Computer Science Dpt MARGE group https://www-inf.telecom-sudparis.eu/marge/

More information

The Ubiquitous Lab Or enhancing the molecular biology research experience

The Ubiquitous Lab Or enhancing the molecular biology research experience The Ubiquitous Lab Or enhancing the molecular biology research experience Juan David Hincapié Ramos IT University of Copenhagen Denmark jdhr@itu.dk www.itu.dk/people/jdhr Abstract. This PhD research aims

More information

Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd

Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd Malamati Louta Konstantina Banti University of Western Macedonia OUTLINE Internet of Things Mobile Crowd Sensing

More information

CPE/CSC 580: Intelligent Agents

CPE/CSC 580: Intelligent Agents CPE/CSC 580: Intelligent Agents Franz J. Kurfess Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. 1 Course Overview Introduction Intelligent Agent, Multi-Agent

More information

INTERACTION AND SOCIAL ISSUES IN A HUMAN-CENTERED REACTIVE ENVIRONMENT

INTERACTION AND SOCIAL ISSUES IN A HUMAN-CENTERED REACTIVE ENVIRONMENT INTERACTION AND SOCIAL ISSUES IN A HUMAN-CENTERED REACTIVE ENVIRONMENT TAYSHENG JENG, CHIA-HSUN LEE, CHI CHEN, YU-PIN MA Department of Architecture, National Cheng Kung University No. 1, University Road,

More information

BIG DATA EUROPE TRANSPORT PILOT: INTRODUCING THESSALONIKI. Josep Maria Salanova Grau CERTH-HIT

BIG DATA EUROPE TRANSPORT PILOT: INTRODUCING THESSALONIKI. Josep Maria Salanova Grau CERTH-HIT BIG DATA EUROPE TRANSPORT PILOT: INTRODUCING THESSALONIKI Josep Maria Salanova Grau CERTH-HIT Thessaloniki on the map ~ 1.400.000 inhabitants & ~ 1.300.000 daily trips ~450.000 private cars & ~ 20.000

More information

ENGINEERING SERVICE-ORIENTED ROBOTIC SYSTEMS

ENGINEERING SERVICE-ORIENTED ROBOTIC SYSTEMS ENGINEERING SERVICE-ORIENTED ROBOTIC SYSTEMS Prof. Dr. Lucas Bueno R. de Oliveira Prof. Dr. José Carlos Maldonado SSC5964 2016/01 AGENDA Robotic Systems Service-Oriented Architecture Service-Oriented Robotic

More information

openaal 1 - the open source middleware for ambient-assisted living (AAL)

openaal 1 - the open source middleware for ambient-assisted living (AAL) AALIANCE conference - Malaga, Spain - 11 and 12 March 2010 1 openaal 1 - the open source middleware for ambient-assisted living (AAL) Peter Wolf 1, *, Andreas Schmidt 1, *, Javier Parada Otte 1, Michael

More information

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network K.T. Sze, K.M. Ho, and K.T. Lo Abstract in this paper, we study the performance of a video-on-demand (VoD) system in wireless

More information

Framework Programme 7

Framework Programme 7 Framework Programme 7 1 Joining the EU programmes as a Belarusian 1. Introduction to the Framework Programme 7 2. Focus on evaluation issues + exercise 3. Strategies for Belarusian organisations + exercise

More information

Pervasive Services Engineering for SOAs

Pervasive Services Engineering for SOAs Pervasive Services Engineering for SOAs Dhaminda Abeywickrama (supervised by Sita Ramakrishnan) Clayton School of Information Technology, Monash University, Australia dhaminda.abeywickrama@infotech.monash.edu.au

More information

How do you teach AI the value of trust?

How do you teach AI the value of trust? How do you teach AI the value of trust? AI is different from traditional IT systems and brings with it a new set of opportunities and risks. To build trust in AI organizations will need to go beyond monitoring

More information

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain This fiche is part of the wider roadmap for cross-cutting KETs activities Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain Cross-cutting

More information

Definitions of Ambient Intelligence

Definitions of Ambient Intelligence Definitions of Ambient Intelligence 01QZP Ambient intelligence Fulvio Corno Politecnico di Torino, 2017/2018 http://praxis.cs.usyd.edu.au/~peterris Summary Technology trends Definition(s) Requested features

More information

A CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS DESIGN

A CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS DESIGN Proceedings of the Annual Symposium of the Institute of Solid Mechanics and Session of the Commission of Acoustics, SISOM 2015 Bucharest 21-22 May A CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS

More information

The Key to the Internet-of-Things: Conquering Complexity One Step at a Time

The Key to the Internet-of-Things: Conquering Complexity One Step at a Time The Key to the Internet-of-Things: Conquering Complexity One Step at a Time at IEEE PHM2017 Adam T. Drobot Wayne, PA 19087 Outline What is IoT? Where is IoT in its evolution? A life Cycle View Key ingredients

More information

The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems

The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems AMADEOS Architecture for Multi-criticality Agile Dependable Evolutionary Open System-of-Systems FP7-ICT-2013.3.4 - Grant Agreement n 610535 The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

TRB Workshop on the Future of Road Vehicle Automation

TRB Workshop on the Future of Road Vehicle Automation TRB Workshop on the Future of Road Vehicle Automation Steven E. Shladover University of California PATH Program ITFVHA Meeting, Vienna October 21, 2012 1 Outline TRB background Workshop organization Automation

More information

Computer-Augmented Environments: Back to the Real World

Computer-Augmented Environments: Back to the Real World Computer-Augmented Environments: Back to the Real World Hans-W. Gellersen Lancaster University Department of Computing Ubiquitous Computing Research HWG 1 What I thought this talk would be about Back to

More information

Enabling Trust in e-business: Research in Enterprise Privacy Technologies

Enabling Trust in e-business: Research in Enterprise Privacy Technologies Enabling Trust in e-business: Research in Enterprise Privacy Technologies Dr. Michael Waidner IBM Zurich Research Lab http://www.zurich.ibm.com / wmi@zurich.ibm.com Outline Motivation Privacy-enhancing

More information

DESIGN AND CAPABILITIES OF AN ENHANCED NAVAL MINE WARFARE SIMULATION FRAMEWORK. Timothy E. Floore George H. Gilman

DESIGN AND CAPABILITIES OF AN ENHANCED NAVAL MINE WARFARE SIMULATION FRAMEWORK. Timothy E. Floore George H. Gilman Proceedings of the 2011 Winter Simulation Conference S. Jain, R.R. Creasey, J. Himmelspach, K.P. White, and M. Fu, eds. DESIGN AND CAPABILITIES OF AN ENHANCED NAVAL MINE WARFARE SIMULATION FRAMEWORK Timothy

More information

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards CSTA K- 12 Computer Science s: Mapped to STEM, Common Core, and Partnership for the 21 st Century s STEM Cluster Topics Common Core State s CT.L2-01 CT: Computational Use the basic steps in algorithmic

More information

ISO JTC 1 SC 24 WG9 G E R A R D J. K I M K O R E A U N I V E R S I T Y

ISO JTC 1 SC 24 WG9 G E R A R D J. K I M K O R E A U N I V E R S I T Y New Work Item Proposal: A Standard Reference Model for Generic MAR Systems ISO JTC 1 SC 24 WG9 G E R A R D J. K I M K O R E A U N I V E R S I T Y What is a Reference Model? A reference model (for a given

More information

Designing for an Internet of Humans

Designing for an Internet of Humans Designing for an Internet of Humans The Route to Adoption of IoT Paul Grace pjg@it-innovation.soton.ac.uk 24 March 2017 IT Innovation Centre The IT Innovation Centre is an applied research centre advancing

More information

OBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK

OBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK xv Preface Advancement in technology leads to wide spread use of mounting cameras to capture video imagery. Such surveillance cameras are predominant in commercial institutions through recording the cameras

More information

Course Outline. Textbook: G. Michael Schneider and Judith L. Gersting, "Invitation to Computer Science C++ Version," 3rd Edition, Thomson, 2004.

Course Outline. Textbook: G. Michael Schneider and Judith L. Gersting, Invitation to Computer Science C++ Version, 3rd Edition, Thomson, 2004. 2005/Sep/12 1 Course Outline Textbook: G. Michael Schneider and Judith L. Gersting, "Invitation to Computer Science C++ Version," 3rd Edition, Thomson, 2004. Outline 1. The Algorithm Foundations of Computer

More information

POLICY SIMULATION AND E-GOVERNANCE

POLICY SIMULATION AND E-GOVERNANCE POLICY SIMULATION AND E-GOVERNANCE Peter SONNTAGBAUER cellent AG Lassallestraße 7b, A-1020 Vienna, Austria Artis AIZSTRAUTS, Egils GINTERS, Dace AIZSTRAUTA Vidzeme University of Applied Sciences Cesu street

More information

Intelligent Power Economy System (Ipes)

Intelligent Power Economy System (Ipes) American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-02, Issue-08, pp-108-114 www.ajer.org Research Paper Open Access Intelligent Power Economy System (Ipes) Salman

More information

Web of Things for Connected Vehicles. Soumya Kanti Datta Communication Systems Department

Web of Things for Connected Vehicles. Soumya Kanti Datta Communication Systems Department Web of Things for Connected Vehicles Soumya Kanti Datta Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Web of Things (WoT) Architecture & Components Prototyping

More information

Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture

Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture Western University Scholarship@Western Electronic Thesis and Dissertation Repository August 2011 Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture Diego Zuquim

More information

- Basics of informatics - Computer network - Software engineering - Intelligent media processing - Human interface. Professor. Professor.

- Basics of informatics - Computer network - Software engineering - Intelligent media processing - Human interface. Professor. Professor. - Basics of informatics - Computer network - Software engineering - Intelligent media processing - Human interface Computer-Aided Engineering Research of power/signal integrity analysis and EMC design

More information

Indiana K-12 Computer Science Standards

Indiana K-12 Computer Science Standards Indiana K-12 Computer Science Standards What is Computer Science? Computer science is the study of computers and algorithmic processes, including their principles, their hardware and software designs,

More information

Software-Intensive Systems Producibility

Software-Intensive Systems Producibility Pittsburgh, PA 15213-3890 Software-Intensive Systems Producibility Grady Campbell Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon University SSTC 2006. - page 1 Producibility

More information

Strategic Considerations when Introducing Model Based Systems Engineering

Strategic Considerations when Introducing Model Based Systems Engineering Copyright 2015 by Christoph Bräuchle, Manfred Broy, Dominik Rüchardt. Permission granted to INCOSE to publish and use Strategic Considerations when Introducing Model Based Systems Engineering Christoph

More information

By Mark Hindsbo Vice President and General Manager, ANSYS

By Mark Hindsbo Vice President and General Manager, ANSYS By Mark Hindsbo Vice President and General Manager, ANSYS For the products of tomorrow to become a reality, engineering simulation must change. It will evolve to be the tool for every engineer, for every

More information

BSc in Music, Media & Performance Technology

BSc in Music, Media & Performance Technology BSc in Music, Media & Performance Technology Email: jurgen.simpson@ul.ie The BSc in Music, Media & Performance Technology will develop the technical and creative skills required to be successful media

More information

GALILEO Research and Development Activities. Second Call. Area 3. Statement of Work

GALILEO Research and Development Activities. Second Call. Area 3. Statement of Work GALILEO Research and Development Activities Second Call Area 3 Innovation by Small and Medium Enterprises Statement of Work Rue du Luxembourg, 3 B 1000 Brussels Tel +32 2 507 80 00 Fax +32 2 507 80 01

More information

USE-ME.GOV USability-drivEn open platform for MobilE GOVernment. 2. Contributions of the Project to Research under e-government

USE-ME.GOV USability-drivEn open platform for MobilE GOVernment. 2. Contributions of the Project to Research under e-government USability-drivEn open platform for MobilE GOVernment USE-ME.GOV consortium (www.usemegov.org) Project Summary This workshop contribution provides an overview of the USE-ME.GOV project, its objectives and

More information

The Study on the Architecture of Public knowledge Service Platform Based on Collaborative Innovation

The Study on the Architecture of Public knowledge Service Platform Based on Collaborative Innovation The Study on the Architecture of Public knowledge Service Platform Based on Chang ping Hu, Min Zhang, Fei Xiang Center for the Studies of Information Resources of Wuhan University, Wuhan,430072,China,

More information

An Approach to Integrating Modeling & Simulation Interoperability

An Approach to Integrating Modeling & Simulation Interoperability An Approach to Integrating Modeling & Simulation Interoperability Brian Spaulding Jorge Morales MÄK Technologies 68 Moulton Street Cambridge, MA 02138 bspaulding@mak.com, jmorales@mak.com ABSTRACT: Distributed

More information

FUTURE NETWORKS POSITION PAPER. Author:

FUTURE NETWORKS POSITION PAPER. Author: POSITION PAPER FUTURE NETWORKS Author: Piet Demeester Internet Based Communication Networks and Services (IBCN) Future Internet Department IBBT Ghent University piet.demeester@intec.ugent.be GSM: +32 476

More information

A Profile-based Trust Management Scheme for Ubiquitous Healthcare Environment

A Profile-based Trust Management Scheme for Ubiquitous Healthcare Environment A -based Management Scheme for Ubiquitous Healthcare Environment Georgia Athanasiou, Georgios Mantas, Member, IEEE, Maria-Anna Fengou, Dimitrios Lymberopoulos, Member, IEEE Abstract Ubiquitous Healthcare

More information

SOFTWARE ARCHITECTURE

SOFTWARE ARCHITECTURE SOFTWARE ARCHITECTURE Foundations, Theory, and Practice Richard N. Taylor University of California, Irvine Nenad Medvidovic University of Southern California Eric M. Dashofy The Aerospace Corporation WILEY

More information

Panel Discussion. Dr. Dr. Norbert A. Streitz. The infinity Initiative Sophia Antipolis, 29. November Darmstadt, Germany

Panel Discussion. Dr. Dr. Norbert A. Streitz. The infinity Initiative Sophia Antipolis, 29. November Darmstadt, Germany The infinity Initiative Sophia Antipolis, 29. November 2007 Panel Discussion Dr. Dr. Norbert A. Streitz Darmstadt, Germany www.ipsi.fraunhofer.de/~streitz streitz@ipsi.fraunhofer.de Panel Discussion Topics

More information

Scientific Data e-infrastructures in the European Capacities Programme

Scientific Data e-infrastructures in the European Capacities Programme Scientific Data e-infrastructures in the European Capacities Programme PV 2009 1 December 2009, Madrid Krystyna Marek European Commission "The views expressed in this presentation are those of the author

More information

Senior Design Projects: Sample Ethical Analyses

Senior Design Projects: Sample Ethical Analyses Senior Design Projects: Sample Ethical Analyses EE 441/442 Spring 2005 Introduction What follows are three sample ethical analyses to help you in the preparation of your senior design project report. Please

More information

Socio-cognitive Engineering

Socio-cognitive Engineering Socio-cognitive Engineering Mike Sharples Educational Technology Research Group University of Birmingham m.sharples@bham.ac.uk ABSTRACT Socio-cognitive engineering is a framework for the human-centred

More information

Advances and Perspectives in Health Information Standards

Advances and Perspectives in Health Information Standards Advances and Perspectives in Health Information Standards HL7 Brazil June 14, 2018 W. Ed Hammond. Ph.D., FACMI, FAIMBE, FIMIA, FHL7, FIAHSI Director, Duke Center for Health Informatics Director, Applied

More information

SDN Architecture 1.0 Overview. November, 2014

SDN Architecture 1.0 Overview. November, 2014 SDN Architecture 1.0 Overview November, 2014 ONF Document Type: TR ONF Document Name: TR_SDN ARCH Overview 1.1 11112014 Disclaimer THIS DOCUMENT IS PROVIDED AS IS WITH NO WARRANTIES WHATSOEVER, INCLUDING

More information

Design and Technology Subject Outline Stage 1 and Stage 2

Design and Technology Subject Outline Stage 1 and Stage 2 Design and Technology 2019 Subject Outline Stage 1 and Stage 2 Published by the SACE Board of South Australia, 60 Greenhill Road, Wayville, South Australia 5034 Copyright SACE Board of South Australia

More information

Context-Aware Interaction in a Mobile Environment

Context-Aware Interaction in a Mobile Environment Context-Aware Interaction in a Mobile Environment Daniela Fogli 1, Fabio Pittarello 2, Augusto Celentano 2, and Piero Mussio 1 1 Università degli Studi di Brescia, Dipartimento di Elettronica per l'automazione

More information

CPS Engineering Labs Mini-Courses Smart Cities by Indra Design Centre Spain

CPS Engineering Labs Mini-Courses Smart Cities by Indra Design Centre Spain CPS Engineering Labs Mini-Courses Smart Cities by Indra Design Centre Spain Presenter: Agustin Yagüe Date: 05/16/2017 Place: München, Germany Transitioning to Smart By 2050 70% Consuming 75% Producing

More information

Research and implementation of key technologies for smart park construction based on the internet of things and cloud computing 1

Research and implementation of key technologies for smart park construction based on the internet of things and cloud computing 1 Acta Technica 62 No. 3B/2017, 117 126 c 2017 Institute of Thermomechanics CAS, v.v.i. Research and implementation of key technologies for smart park construction based on the internet of things and cloud

More information

ARTEMIS The Embedded Systems European Technology Platform

ARTEMIS The Embedded Systems European Technology Platform ARTEMIS The Embedded Systems European Technology Platform Technology Platforms : the concept Conditions A recipe for success Industry in the Lead Flexibility Transparency and clear rules of participation

More information

PYBOSSA Technology. What is PYBOSSA?

PYBOSSA Technology. What is PYBOSSA? PYBOSSA Technology What is PYBOSSA? PYBOSSA is our technology, used for the development of platforms and data collection within collaborative environments, analysis and data enrichment scifabric.com 1

More information

Simoco Xd Professional Digital Mobile Radio System. The complete end-to-end DMR solution supporting both Tier II conventional and Tier III trunked

Simoco Xd Professional Digital Mobile Radio System. The complete end-to-end DMR solution supporting both Tier II conventional and Tier III trunked Simoco Professional Digital Mobile Radio System The complete end-to-end DMR solution supporting both Tier II conventional and Tier III trunked Simoco Simoco combines extensive experience of delivering

More information

Driving Force for. How cyber physical systems will change the way of future production

Driving Force for. How cyber physical systems will change the way of future production Driving Force for How cyber physical systems will change the way of future production IMS Institute of Mechatronic Systems Applied Science in Mechatronics The first international event on Fourth Industrial

More information

Mobile Edge Computing

Mobile Edge Computing Mobile Edge Computing The story so far 1 Nurit Sprecher (Chair of ETSI MEC ISG) MEC Congress 2016, Munich, Germany Mobile Edge Computing An Environment for Innovation and Value Creation Offers applications

More information

Networks of any size and topology. System infrastructure monitoring and control. Bridging for different radio networks

Networks of any size and topology. System infrastructure monitoring and control. Bridging for different radio networks INTEGRATED SOLUTION FOR MOTOTRBO TM Networks of any size and topology System infrastructure monitoring and control Bridging for different radio networks Integrated Solution for MOTOTRBO TM Networks of

More information

Can Linguistics Lead a Digital Revolution in the Humanities?

Can Linguistics Lead a Digital Revolution in the Humanities? Can Linguistics Lead a Digital Revolution in the Humanities? Martin Wynne Martin.wynne@it.ox.ac.uk Digital Humanities Seminar Oxford e-research Centre & IT Services (formerly OUCS) & Nottingham Wednesday

More information

Why do we need standards?

Why do we need standards? Why do we need standards? Strategic Standards in Advanced Manufacturing: Theme Target - Team Marek Samotyj Electric Power Research Institute (EPRI) June 4, 2013 Why Use Standards? Avoid re-inventing the

More information

CHAPTER 1: INTRODUCTION. Multiagent Systems mjw/pubs/imas/

CHAPTER 1: INTRODUCTION. Multiagent Systems   mjw/pubs/imas/ CHAPTER 1: INTRODUCTION Multiagent Systems http://www.csc.liv.ac.uk/ mjw/pubs/imas/ Five Trends in the History of Computing ubiquity; interconnection; intelligence; delegation; and human-orientation. http://www.csc.liv.ac.uk/

More information

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Research Supervisor: Minoru Etoh (Professor, Open and Transdisciplinary Research Initiatives, Osaka University)

More information

Course Syllabus. P age 1 5

Course Syllabus. P age 1 5 Course Syllabus Course Code Course Title ECTS Credits COMP-263 Human Computer Interaction 6 Prerequisites Department Semester COMP-201 Computer Science Spring Type of Course Field Language of Instruction

More information

Issue Article Vol.30 No.2, April 1998 Article Issue

Issue Article Vol.30 No.2, April 1998 Article Issue Issue Article Vol.30 No.2, April 1998 Article Issue Tailorable Groupware Issues, Methods, and Architectures Report of a Workshop held at GROUP'97, Phoenix, AZ, 16th November 1997 Anders Mørch, Oliver Stiemerlieng,

More information

By the end of this chapter, you should: Understand what is meant by engineering design. Understand the phases of the engineering design process.

By the end of this chapter, you should: Understand what is meant by engineering design. Understand the phases of the engineering design process. By the end of this chapter, you should: Understand what is meant by engineering design. Understand the phases of the engineering design process. Be familiar with the attributes of successful engineers.

More information

ICT Enhanced Buildings Potentials

ICT Enhanced Buildings Potentials ICT Enhanced Buildings Potentials 24 th CIB W78 Conference "Bringing ICT knowledge to work". June 26-29 2007, Maribor, Slovenia. Per Christiansson Aalborg University 27.6.2007 CONTENT Intelligent Building

More information

Mission Space. Value-based use of augmented reality in support of critical contextual environments

Mission Space. Value-based use of augmented reality in support of critical contextual environments Mission Space Value-based use of augmented reality in support of critical contextual environments Vicki A. Barbur Ph.D. Senior Vice President and Chief Technical Officer Concurrent Technologies Corporation

More information

Information Technology Fluency for Undergraduates

Information Technology Fluency for Undergraduates Response to Tidal Wave II Phase II: New Programs Information Technology Fluency for Undergraduates Marti Hearst, Assistant Professor David Messerschmitt, Acting Dean School of Information Management and

More information

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime CITI Wireless Sensor Networks in a Nutshell Séminaire Internet du Futur, ASPROM Paris, 24 octobre 2012 Prof. Fabrice Valois, Université de Lyon, INSA-Lyon, INRIA fabrice.valois@insa-lyon.fr 1 Agenda A

More information

On the Economics of Synthetic Biology: Is Openness Feasible?

On the Economics of Synthetic Biology: Is Openness Feasible? On the Economics of Synthetic Biology: Is Openness Feasible? Joachim Henkel, Steve Maurer Technische Universität München, UC Berkeley SB 3.0, Zürich June 25, 2007 Sharing vs. Patenting what characterizes

More information

Chapter 2 Understanding and Conceptualizing Interaction. Anna Loparev Intro HCI University of Rochester 01/29/2013. Problem space

Chapter 2 Understanding and Conceptualizing Interaction. Anna Loparev Intro HCI University of Rochester 01/29/2013. Problem space Chapter 2 Understanding and Conceptualizing Interaction Anna Loparev Intro HCI University of Rochester 01/29/2013 1 Problem space Concepts and facts relevant to the problem Users Current UX Technology

More information

First steps towards a mereo-operandi theory for a system feature-based architecting of cyber-physical systems

First steps towards a mereo-operandi theory for a system feature-based architecting of cyber-physical systems First steps towards a mereo-operandi theory for a system feature-based architecting of cyber-physical systems Shahab Pourtalebi, Imre Horváth, Eliab Z. Opiyo Faculty of Industrial Design Engineering Delft

More information

Wi-Fi Fingerprinting through Active Learning using Smartphones

Wi-Fi Fingerprinting through Active Learning using Smartphones Wi-Fi Fingerprinting through Active Learning using Smartphones Le T. Nguyen Carnegie Mellon University Moffet Field, CA, USA le.nguyen@sv.cmu.edu Joy Zhang Carnegie Mellon University Moffet Field, CA,

More information

DOCTORAL THESIS (Summary)

DOCTORAL THESIS (Summary) LUCIAN BLAGA UNIVERSITY OF SIBIU Syed Usama Khalid Bukhari DOCTORAL THESIS (Summary) COMPUTER VISION APPLICATIONS IN INDUSTRIAL ENGINEERING PhD. Advisor: Rector Prof. Dr. Ing. Ioan BONDREA 1 Abstract Europe

More information

Industry 4.0: the new challenge for the Italian textile machinery industry

Industry 4.0: the new challenge for the Italian textile machinery industry Industry 4.0: the new challenge for the Italian textile machinery industry Executive Summary June 2017 by Contacts: Economics & Press Office Ph: +39 02 4693611 email: economics-press@acimit.it ACIMIT has

More information

Life Sciences & The Dutch Grid: An Analysis from a Grid Supporter's perspective

Life Sciences & The Dutch Grid: An Analysis from a Grid Supporter's perspective IWPLS '09 Life Sciences & The Dutch Grid: An Analysis from a Grid Supporter's perspective Lammerts, E. 1, 1 e-science Support Group, SARA Computing and Networking Services, Science Park 121, 1098 XG Amsterdam,

More information

CTS-D Job Task Analysis

CTS-D Job Task Analysis A Conducting a Needs Assessment 1 Identify decision-makers and stakeholders Contractual relationships Ability to ask probing questions RACi Chart Client organizational structure Ability to differentiate

More information

Smart Waste Management: An IOT and Blockchains based approach

Smart Waste Management: An IOT and Blockchains based approach Smart Waste Management: An IOT and Blockchains based approach Author 1 Manish Lamichhane Master's Thesis student Erasmus Mundus PERCCOM Author 2 Oleg Sadov Supervisor, Senior Engineer, ITMO University,

More information

Designing Architectures

Designing Architectures Designing Architectures Lecture 4 Copyright Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. How Do You Design? Where do architectures come from? Creativity 1) Fun! 2) Fraught

More information

PROJECT FINAL REPORT

PROJECT FINAL REPORT Ref. Ares(2015)334123-28/01/2015 PROJECT FINAL REPORT Grant Agreement number: 288385 Project acronym: Internet of Things Environment for Service Creation and Testing Project title: IoT.est Funding Scheme:

More information

A Cognitive Framework for Realizing and Exploiting the Internet of Things Concept

A Cognitive Framework for Realizing and Exploiting the Internet of Things Concept A Cognitive Framework for Realizing and Exploiting the Internet of Things Concept Gianmarco Baldini 1, Rao Venkatesha Prasad 2, Abdur Rahim Biswas 3, Klaus Moessner 4, Matti Etelapera 5, Juha Pekka Soininen

More information

2.6.1: Program Outcomes

2.6.1: Program Outcomes 2.6.1: Program Outcomes Program: M.Sc. Informatics Program Specific Outcomes (PSO) PSO1 This program provides studies in the field of informatics, which is essentially a blend of three domains: networking,

More information

National Law Enforcement and Corrections Technology Center Communications Technologies Center of Excellence

National Law Enforcement and Corrections Technology Center Communications Technologies Center of Excellence National Law Enforcement and Corrections Technology Center Communications Technologies Precision Indoor Personnel Location and Tracking for Emergency Responders Technology Workshop, August 4-6, 2008 Worcester

More information

CSE 435: Software Engineering

CSE 435: Software Engineering CSE 435: Software Engineering Dr. James Daly 3501 Engineering Building Office: 3501 EB, by appointment dalyjame at msu dot edu TAs: Vincent Ragusa and Mohammad Roohitavaf Helproom Tuesday: 2-4 pm, Wednesday

More information

TTÜ infotehnoloogiateaduskond Informaatikainstituut. Enn Õunapuu Vanemteadur

TTÜ infotehnoloogiateaduskond Informaatikainstituut. Enn Õunapuu Vanemteadur TTÜ infotehnoloogiateaduskond Informaatikainstituut Enn Õunapuu enn.ounapuu@ttu.ee Vanemteadur Towards a connected world TEDxBNMIT We are moving towards a more connected, instrumented and data driven world

More information

Engineering, & Mathematics

Engineering, & Mathematics 8O260 Applied Mathematics for Technical Professionals (R) 1 credit Gr: 10-12 Prerequisite: Recommended prerequisites: Algebra I and Geometry Description: (SGHS only) Applied Mathematics for Technical Professionals

More information

The secret behind mechatronics

The secret behind mechatronics The secret behind mechatronics Why companies will want to be part of the revolution In the 18th century, steam and mechanization powered the first Industrial Revolution. At the turn of the 20th century,

More information