52 resultados para user context

em Helda - Digital Repository of University of Helsinki


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Portable music players have made it possible to listen to a personal collection of music in almost every situation, and they are often used during some activity to provide a stimulating audio environment. Studies have demonstrated the effects of music on the human body and mind, indicating that selecting music according to situation can, besides making the situation more enjoyable, also make humans perform better. For example, music can boost performance during physical exercises, alleviate stress and positively affect learning. We believe that people intuitively select different types of music for different situations. Based on this hypothesis, we propose a portable music player, AndroMedia, designed to provide personalised music recommendations using the user’s current context and listening habits together with other user’s situational listening patterns. We have developed a prototype that consists of a central server and a PDA client. The client uses Bluetooth sensors to acquire context information and logs user interaction to infer implicit user feedback. The user interface also allows the user to give explicit feedback. Large user interface elements facilitate touch-based usage in busy environments. The prototype provides the necessary framework for using the collected information together with other user’s listening history in a context- enhanced collaborative filtering algorithm to generate context-sensitive recommendations. The current implementation is limited to using traditional collaborative filtering algorithms. We outline the techniques required to create context-aware recommendations and present a survey on mobile context-aware music recommenders found in literature. As opposed to the explored systems, AndroMedia utilises other users’ listening habits when suggesting tunes, and does not require any laborious set up processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This doctoral dissertation examines the description of the North as it appears in the Old English Orosius (OE Or.) in the form of the travel accounts by Ohthere and Wulfstan and a catalogue of peoples of Germania. The description is discussed in the context of ancient and early medieval textual and cartographic descriptions of the North, with a special emphasis on Anglo-Saxon sources and the intellectual context of the reign of King Alfred (871-899). This is the first time that these sources, a multidisciplinary approach and secondary literature, also from Scandinavia and Finland, have been brought together. The discussion is source-based, and archaeological theories and geographical ideas are used to support the primary evidence. This study belongs to the disciplines of early medieval literature and (cultural) history, Anglo-Saxon studies, English philology, and historical geography. The OE Or. was probably part of Alfred s educational campaign, which conveyed royal ideology to the contemporary elite. The accounts and catalogue are original interpolations which represent a unique historical source for the Viking Age. They contain unparalleled information about peoples and places in Fennoscandia and the southern Baltic and sailing voyages to the White Sea, the Danish lands, and the Lower Vistula. The historical-philological analysis reveals an emphasis on wealth and property, rank, luxury goods, settlement patterns, and territorial divisions. Trade is strongly implied by the mentions of central places and northern products, such as walrus ivory. The references to such peoples as the Finnas, the Cwenas, and the Beormas appear in connection with information about geography and subsistence in the far North. Many of the topics in the accounts relate to Anglo-Saxon aristocratic culture and interests. The accounts focus on the areas associated with the Northmen, the Danes and the Este. These areas resonated in the Anglo-Saxon geographical imagination: they were curious about the northern margin of the world, their own continental ancestry and the geography of their homeland of Angeln, and they had an interest in the Goths and their connection with the southern Baltic in mythogeography. The non-judgemental representation of the North as generally peaceful and relatively normal place is related to Alfredian and Orosian ideas about the unity and spreading of Christendom, and to desires for unity among the Germani and for peace with the Vikings, who were settling in England. These intellectual contexts reflect the innovative and organizational forces of Alfred s reign. The description of the North in the OE Or. can be located in the context of the Anglo-Saxon worldview and geographical mindset. It mirrors the geographical curiosity expressed in other Anglo-Saxon sources, such as the poem Widsith and the Anglo-Saxon mappa mundi. The northern section of this early eleventh-century world map is analyzed in detail here for the first time. It is suggested that the section depicts the North Atlantic and the Scandinavian Peninsula. The survey of ancient and early medieval sources provides a comparative context for the OE Or. In this material, produced by such authors as Strabo, Pliny, Tacitus, Jordanes, and Rimbert, the significance of the North was related to the search for and definition of the northern edge of the world, universal accounts of the world, the northern homeland in the origin stories of the gentes, and Carolingian expansion and missionary activity. These frameworks were transmitted to Anglo-Saxon literary culture, where the North occurs in the context of the definition of Britain s place in the world.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bertrand Russell (1872 1970) introduced the English-speaking philosophical world to modern, mathematical logic and foundational study of mathematics. The present study concerns the conception of logic that underlies his early logicist philosophy of mathematics, formulated in The Principles of Mathematics (1903). In 1967, Jean van Heijenoort published a paper, Logic as Language and Logic as Calculus, in which he argued that the early development of modern logic (roughly the period 1879 1930) can be understood, when considered in the light of a distinction between two essentially different perspectives on logic. According to the view of logic as language, logic constitutes the general framework for all rational discourse, or meaningful use of language, whereas the conception of logic as calculus regards logic more as a symbolism which is subject to reinterpretation. The calculus-view paves the way for systematic metatheory, where logic itself becomes a subject of mathematical study (model-theory). Several scholars have interpreted Russell s views on logic with the help of the interpretative tool introduced by van Heijenoort,. They have commonly argued that Russell s is a clear-cut case of the view of logic as language. In the present study a detailed reconstruction of the view and its implications is provided, and it is argued that the interpretation is seriously misleading as to what he really thought about logic. I argue that Russell s conception is best understood by setting it in its proper philosophical context. This is constituted by Immanuel Kant s theory of mathematics. Kant had argued that purely conceptual thought basically, the logical forms recognised in Aristotelian logic cannot capture the content of mathematical judgments and reasonings. Mathematical cognition is not grounded in logic but in space and time as the pure forms of intuition. As against this view, Russell argued that once logic is developed into a proper tool which can be applied to mathematical theories, Kant s views turn out to be completely wrong. In the present work the view is defended that Russell s logicist philosophy of mathematics, or the view that mathematics is really only logic, is based on what I term the Bolzanian account of logic . According to this conception, (i) the distinction between form and content is not explanatory in logic; (ii) the propositions of logic have genuine content; (iii) this content is conferred upon them by special entities, logical constants . The Bolzanian account, it is argued, is both historically important and throws genuine light on Russell s conception of logic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For decades psychoanalysis was the discipline studying the unconscious, and other branches of study lacked competence to take a stand on the issues concerning the unconscious. From 1980s onwards intense study of the unconscious has been taken place in the scope of cognitive orientation. Thus, nowadays it is talked about both pyschoanalytic and cognitive unconscious. The aim of this thesis is to integrate psychoanalytic and cognitive views. When the "Freudian" conception of the unconscious is considered, there are four entangled issues: 1) what is the unconscious like, 2) how does the unconsciuos give rise to psychic disorders 3) why and how certain contents are missing from consciousness (repression of contents), 4) the emergence of those contents (becoming conscious of the repressed). The conventional psychoanalytic answer to the first question - and "the cornerstone of psychoanalysis" - is "the unconscious is mental". The issues 2)-4) depend radically on the answer given to the 1): "psychoanalytic" conceptualizations on them rest on the "cornerstone". That ground was challended in study I: it was argued that it has never been clear what does it mean that the unconscious is mental. Thus, it was stated that in the current state of art psychoanalysis should drop out the ephitet "mental" before the term unconscious. That claim creates a pressure to reappraise the convential "psychoanalytic" answers to the other questions, and that reappraisal was the aim of studies II and III. In study II the question 2) is approached in terms of implicit knowledge. Study III focuses on mechanisms, which determine which contents appear in the scope of consciousness, and also cause missing of contents from there (the questions 3) and 4)). In the core of study III there are distinctions concerning the processess occuring in the levels of the brain, consciousness, self-consciousness, and narrative self-consciousness. Studies I-III set "psychoanalytic" topics in the frames of cognitive view. The picture emerging from those studies is not especially useful for a clinican (psychotherapist). Studies IV and V focused that issue. Study IV is a rather serious critique toward neuropsychoanalysis. In it it was claimed that repressive functions of conscious states are in the core of clinical psychoanalysis, and functions in general cannot be reduced to neurophysiological terminology. Thus, the limits of neuropsychoanalysis are more strict than it has been realized: crucial clinical issues remain outside its scope. In study V it was focused on the confusing state of things that although unconscious fantasies do not exist, the idea on them has been an important conceptual tool for clinicans. When put in a larger context, the aim of study V is similar to that of study IV: to determine the relation between psychotherapists' and neuroscientists' terminologies. Studies III, IV and V apply the philosopher Daniel Dennett's model on different levels of explanation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the future the number of the disabled drivers requiring a special evaluation of their driving ability will increase due to the ageing population, as well as the progress of adaptive technology. This places pressure on the development of the driving evaluation system. Despite quite intensive research there is still no consensus concerning what is the factual situation in a driver evaluation (methodology), which measures should be included in an evaluation (methods), and how an evaluation has to be carried out (practise). In order to find answers to these questions we carried out empirical studies, and simultaneously elaborated upon a conceptual model for driving and a driving evaluation. The findings of empirical studies can be condensed into the following points: 1) A driving ability defined by the on-road driving test is associated with different laboratory measures depending on the study groups. Faults in the laboratory tests predicted faults in the on-road driving test in the novice group, whereas slowness in the laboratory predicted driving faults in the experienced drivers group. 2) The Parkinson study clearly showed that even an experienced clinician cannot reliably accomplish an evaluation of a disabled person’s driving ability without collaboration with other specialists. 3) The main finding of the stroke study was that the use of a multidisciplinary team as a source of information harmonises the specialists’ evaluations. 4) The patient studies demonstrated that the disabled persons themselves, as well as their spouses, are as a rule not reliable evaluators. 5) From the safety point of view, perceptible operations with the control devices are not crucial, but correct mental actions which the driver carries out with the help of the control devices are of greatest importance. 6) Personality factors including higher-order needs and motives, attitudes and a degree of self-awareness, particularly a sense of illness, are decisive when evaluating a disabled person’s driving ability. Personality is also the main source of resources concerning compensations for lower-order physical deficiencies and restrictions. From work with the conceptual model we drew the following methodological conclusions: First, the driver has to be considered as a holistic subject of the activity, as a multilevel hierarchically organised system of an organism, a temperament, an individuality, and a personality where the personality is the leading subsystem from the standpoint of safety. Second, driving as a human form of a sociopractical activity, is also a hierarchically organised dynamic system. Third, in an evaluation of driving ability it is a question of matching these two hierarchically organised structures: a subject of an activity and a proper activity. Fourth, an evaluation has to be person centred but not disease-, function- or method centred. On the basis of our study a multidisciplinary team (practitioner, driving school teacher, psychologist, occupational therapist) is recommended for use in demanding driver evaluations. Primary in a driver’s evaluations is a coherent conceptual model while concrete methods of evaluations may vary. However, the on-road test must always be performed if possible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research has its background on Knowledge Practices Laboratory (KP-Lab) research project. One of the aims of KP-Lab is to create virtual and technological tools to support the interventionist who use the Change Laboratory method as a developmental tool. In this research I studied the interventionists' mirror material practices which are context and theory bound and for that reason they pose challenges on the development of new tools. I focused on the gathering and working on the mirror material. The purpose of this study was to find out what kind of user knowledge does the research on narratives of mirror material practices in Change Laboratory provide to the developers of virtual tools? I answered this question by three sub questions: 1. What kind of mirror material the interventionists gather and analyze in different phases of developmental cycle of Change Laboratory project? 2. What kind of knowledge the different mirror materials contain and how is the knowledge transformed when the mirror material is analyzed and worked on? 3. What kind of tools the interventionists use and create when gathering and working on the mirror material? What wishes do the interventionists have on tools? I interviewed five interventionists in four different projects. I created narratives from the document supported interviews. Then I analyzed the narratives in three steps: first I placed the mirror materials in the developmental cycle. Secondly, I analyzed the mirror materials by placing them in a table by the form of the knowledge. Thirdly, I examined the tools the interventionists had used and created and what wishes they had on virtual tools. This research showed that different user groups of Change Laboratory method have different needs. All interventionists transform knowledge from one form to another so they seem to need especially tools by which they can analyze and transform knowledge. It seems that standardized model of gathering and analysing mirror material is not meaningful because mirror material is constructed in accordance with the object developed. This research also shows that the mirror material has a social function. This finding should be also noted when developing virtual tools together with actual users.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Reuse of existing carefully designed and tested software improves the quality of new software systems and reduces their development costs. Object-oriented frameworks provide an established means for software reuse on the levels of both architectural design and concrete implementation. Unfortunately, due to frame-works complexity that typically results from their flexibility and overall abstract nature, there are severe problems in using frameworks. Patterns are generally accepted as a convenient way of documenting frameworks and their reuse interfaces. In this thesis it is argued, however, that mere static documentation is not enough to solve the problems related to framework usage. Instead, proper interactive assistance tools are needed in order to enable system-atic framework-based software production. This thesis shows how patterns that document a framework s reuse interface can be represented as dependency graphs, and how dynamic lists of programming tasks can be generated from those graphs to assist the process of using a framework to build an application. This approach to framework specialization combines the ideas of framework cookbooks and task-oriented user interfaces. Tasks provide assistance in (1) cre-ating new code that complies with the framework reuse interface specification, (2) assuring the consistency between existing code and the specification, and (3) adjusting existing code to meet the terms of the specification. Besides illustrating how task-orientation can be applied in the context of using frameworks, this thesis describes a systematic methodology for modeling any framework reuse interface in terms of software patterns based on dependency graphs. The methodology shows how framework-specific reuse interface specifi-cations can be derived from a library of existing reusable pattern hierarchies. Since the methodology focuses on reusing patterns, it also alleviates the recog-nized problem of framework reuse interface specification becoming complicated and unmanageable for frameworks of realistic size. The ideas and methods proposed in this thesis have been tested through imple-menting a framework specialization tool called JavaFrames. JavaFrames uses role-based patterns that specify a reuse interface of a framework to guide frame-work specialization in a task-oriented manner. This thesis reports the results of cases studies in which JavaFrames and the hierarchical framework reuse inter-face modeling methodology were applied to the Struts web application frame-work and the JHotDraw drawing editor framework.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sensor networks represent an attractive tool to observe the physical world. Networks of tiny sensors can be used to detect a fire in a forest, to monitor the level of pollution in a river, or to check on the structural integrity of a bridge. Application-specific deployments of static-sensor networks have been widely investigated. Commonly, these networks involve a centralized data-collection point and no sharing of data outside the organization that owns it. Although this approach can accommodate many application scenarios, it significantly deviates from the pervasive computing vision of ubiquitous sensing where user applications seamlessly access anytime, anywhere data produced by sensors embedded in the surroundings. With the ubiquity and ever-increasing capabilities of mobile devices, urban environments can help give substance to the ubiquitous sensing vision through Urbanets, spontaneously created urban networks. Urbanets consist of mobile multi-sensor devices, such as smart phones and vehicular systems, public sensor networks deployed by municipalities, and individual sensors incorporated in buildings, roads, or daily artifacts. My thesis is that "multi-sensor mobile devices can be successfully programmed to become the underpinning elements of an open, infrastructure-less, distributed sensing platform that can bring sensor data out of their traditional close-loop networks into everyday urban applications". Urbanets can support a variety of services ranging from emergency and surveillance to tourist guidance and entertainment. For instance, cars can be used to provide traffic information services to alert drivers to upcoming traffic jams, and phones to provide shopping recommender services to inform users of special offers at the mall. Urbanets cannot be programmed using traditional distributed computing models, which assume underlying networks with functionally homogeneous nodes, stable configurations, and known delays. Conversely, Urbanets have functionally heterogeneous nodes, volatile configurations, and unknown delays. Instead, solutions developed for sensor networks and mobile ad hoc networks can be leveraged to provide novel architectures that address Urbanet-specific requirements, while providing useful abstractions that hide the network complexity from the programmer. This dissertation presents two middleware architectures that can support mobile sensing applications in Urbanets. Contory offers a declarative programming model that views Urbanets as a distributed sensor database and exposes an SQL-like interface to developers. Context-aware Migratory Services provides a client-server paradigm, where services are capable of migrating to different nodes in the network in order to maintain a continuous and semantically correct interaction with clients. Compared to previous approaches to supporting mobile sensing urban applications, our architectures are entirely distributed and do not assume constant availability of Internet connectivity. In addition, they allow on-demand collection of sensor data with the accuracy and at the frequency required by every application. These architectures have been implemented in Java and tested on smart phones. They have proved successful in supporting several prototype applications and experimental results obtained in ad hoc networks of phones have demonstrated their feasibility with reasonable performance in terms of latency, memory, and energy consumption.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis we study a series of multi-user resource-sharing problems for the Internet, which involve distribution of a common resource among participants of multi-user systems (servers or networks). We study concurrently accessible resources, which for end-users may be exclusively accessible or non-exclusively. For all kinds we suggest a separate algorithm or a modification of common reputation scheme. Every algorithm or method is studied from different perspectives: optimality of protocols, selfishness of end users, fairness of the protocol for end users. On the one hand the multifaceted analysis allows us to select the most suited protocols among a set of various available ones based on trade-offs of optima criteria. On the other hand, the future Internet predictions dictate new rules for the optimality we should take into account and new properties of the networks that cannot be neglected anymore. In this thesis we have studied new protocols for such resource-sharing problems as the backoff protocol, defense mechanisms against Denial-of-Service, fairness and confidentiality for users in overlay networks. For backoff protocol we present analysis of a general backoff scheme, where an optimization is applied to a general-view backoff function. It leads to an optimality condition for backoff protocols in both slot times and continuous time models. Additionally we present an extension for the backoff scheme in order to achieve fairness for the participants in an unfair environment, such as wireless signal strengths. Finally, for the backoff algorithm we suggest a reputation scheme that deals with misbehaving nodes. For the next problem -- denial-of-service attacks, we suggest two schemes that deal with the malicious behavior for two conditions: forged identities and unspoofed identities. For the first one we suggest a novel most-knocked-first-served algorithm, while for the latter we apply a reputation mechanism in order to restrict resource access for misbehaving nodes. Finally, we study the reputation scheme for the overlays and peer-to-peer networks, where resource is not placed on a common station, but spread across the network. The theoretical analysis suggests what behavior will be selected by the end station under such a reputation mechanism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ubiquitous computing is about making computers and computerized artefacts a pervasive part of our everyday lifes, bringing more and more activities into the realm of information. The computationalization, informationalization of everyday activities increases not only our reach, efficiency and capabilities but also the amount and kinds of data gathered about us and our activities. In this thesis, I explore how information systems can be constructed so that they handle this personal data in a reasonable manner. The thesis provides two kinds of results: on one hand, tools and methods for both the construction as well as the evaluation of ubiquitous and mobile systems---on the other hand an evaluation of the privacy aspects of a ubiquitous social awareness system. The work emphasises real-world experiments as the most important way to study privacy. Additionally, the state of current information systems as regards data protection is studied. The tools and methods in this thesis consist of three distinct contributions. An algorithm for locationing in cellular networks is proposed that does not require the location information to be revealed beyond the user's terminal. A prototyping platform for the creation of context-aware ubiquitous applications called ContextPhone is described and released as open source. Finally, a set of methodological findings for the use of smartphones in social scientific field research is reported. A central contribution of this thesis are the pragmatic tools that allow other researchers to carry out experiments. The evaluation of the ubiquitous social awareness application ContextContacts covers both the usage of the system in general as well as an analysis of privacy implications. The usage of the system is analyzed in the light of how users make inferences of others based on real-time contextual cues mediated by the system, based on several long-term field studies. The analysis of privacy implications draws together the social psychological theory of self-presentation and research in privacy for ubiquitous computing, deriving a set of design guidelines for such systems. The main findings from these studies can be summarized as follows: The fact that ubiquitous computing systems gather more data about users can be used to not only study the use of such systems in an effort to create better systems but in general to study phenomena previously unstudied, such as the dynamic change of social networks. Systems that let people create new ways of presenting themselves to others can be fun for the users---but the self-presentation requires several thoughtful design decisions that allow the manipulation of the image mediated by the system. Finally, the growing amount of computational resources available to the users can be used to allow them to use the data themselves, rather than just being passive subjects of data gathering.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current smartphones have a storage capacity of several gigabytes. More and more information is stored on mobile devices. To meet the challenge of information organization, we turn to desktop search. Users often possess multiple devices, and synchronize (subsets of) information between them. This makes file synchronization more important. This thesis presents Dessy, a desktop search and synchronization framework for mobile devices. Dessy uses desktop search techniques, such as indexing, query and index term stemming, and search relevance ranking. Dessy finds files by their content, metadata, and context information. For example, PDF files may be found by their author, subject, title, or text. EXIF data of JPEG files may be used in finding them. User–defined tags can be added to files to organize and retrieve them later. Retrieved files are ranked according to their relevance to the search query. The Dessy prototype uses the BM25 ranking function, used widely in information retrieval. Dessy provides an interface for locating files for both users and applications. Dessy is closely integrated with the Syxaw file synchronizer, which provides efficient file and metadata synchronization, optimizing network usage. Dessy supports synchronization of search results, individual files, and directory trees. It allows finding and synchronizing files that reside on remote computers, or the Internet. Dessy is designed to solve the problem of efficient mobile desktop search and synchronization, also supporting remote and Internet search. Remote searches may be carried out offline using a downloaded index, or while connected to the remote machine on a weak network. To secure user data, transmissions between the Dessy client and server are encrypted using symmetric encryption. Symmetric encryption keys are exchanged with RSA key exchange. Dessy emphasizes extensibility. Also the cryptography can be extended. Users may tag their files with context tags and control custom file metadata. Adding new indexed file types, metadata fields, ranking methods, and index types is easy. Finding files is done with virtual directories, which are views into the user’s files, browseable by regular file managers. On mobile devices, the Dessy GUI provides easy access to the search and synchronization system. This thesis includes results of Dessy synchronization and search experiments, including power usage measurements. Finally, Dessy has been designed with mobility and device constraints in mind. It requires only MIDP 2.0 Mobile Java with FileConnection support, and Java 1.5 on desktop machines.