147 resultados para Context-aware computing and systems


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Current conceptualizations of organizational processes consider them as internally optimized yet static systems. Still, turbulences in the contextual environment of a firm often lead to adaptation requirements that these processes are unable to fulfil. Based on a multiple case study of the core processes of two large organizations, we offer an extended conceptualisation of business processes as complex adaptive systems. This conceptualization can enable firms to optimise business processes by analysing operations in different contexts and by examining the complex interaction between external, contextual elements and internal agent schemata. From this analysis, we discuss how information technology can play a vital goal in achieving this goal by providing discovery, analysis, and automation support. We detail implications for research and practice.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Road traffic accidents can be reduced by providing early warning to drivers through wireless ad hoc networks. When a vehicle detects an event that may lead to an imminent accident, the vehicle disseminates emergency messages to alert other vehicles that may be endangered by the accident. In many existing broadcast-based dissemination schemes, emergency messages may be sent to a large number of vehicles in the area and can be propagated to only one direction. This paper presents a more efficient context aware multicast protocol that disseminates messages only to endangered vehicles that may be affected by the emergency event. The endangered vehicles can be identified by calculating the interaction among vehicles based on their motion properties. To ensure fast delivery, the dissemination follows a routing path obtained by computing a minimum delay tree. The multicast protocol uses a generalized approach that can support any arbitrary road topology. The performance of the multicast protocol is compared with existing broadcast protocols by simulating chain collision accidents on a typical highway. Simulation results show that the multicast protocol outperforms the other protocols in terms of reliability, efficiency, and latency.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The smart phones we carry with us are becoming ubiquitous with everyday life and the sensing capabilities of these devices allow us to provide context-aware services. In this paper, we discuss the development of UniNav, a context-aware mobile application that delivers personalised campus maps for universities. The application utilises university students’ details to provide information and services that are relevant and important to them. It helps students to navigate within the campus and become familiar with their university environment quickly. A study was undertaken to evaluate the acceptability and usefulness of the campus map, as well as the impact on a users’ navigation efficiency by utilising the personal and environmental contexts. The result indicates the integration of personal and environmental contexts on digital maps can improve its usefulness and navigation efficiency.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Private data stored on smartphones is a precious target for malware attacks. A constantly changing environment, e.g. switching network connections, can cause unpredictable threats, and require an adaptive approach to access control. Context-based access control is using dynamic environmental information, including it into access decisions. We propose an "ecosystem-in-an-ecosystem" which acts as a secure container for trusted software aiming at enterprise scenarios where users are allowed to use private devices. We have implemented a proof-of-concept prototype for an access control framework that processes changes to low-level sensors and semantically enriches them, adapting access control policies to the current context. This allows the user or the administrator to maintain fine-grained control over resource usage by compliant applications. Hence, resources local to the trusted container remain under control of the enterprise policy. Our results show that context-based access control can be done on smartphones without major performance impact.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the aim of advancing professional practice through better understanding how to create workplace contexts that cultivate individual and collective learning through situated 'information in context' experiences, this paper presents insights gained from three North American collaborative design (co-design) implementations. In the current project at the Auraria Library in Denver, Colorado, USA, participants use collaborative information practices to redesign face-to-face and technology-enabled communication, decision making, and planning systems. Design processes are described and results-to-date described, within an appreciative framework which values information sharing and enables knowledge creation through shared leadership.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recent studies have started to explore context-awareness as a driver in the design of adaptable business processes. The emerging challenge of identifying and considering contextual drivers in the environment of a business process are well understood, however, typical methods and models for business process design do not yet consider this context. In this paper, we describe our work on the design of a method framework and appropriate models to enable a context-aware process design approach. We report on our ongoing work with an Australian insurance provider and describe the design science we employed to develop innovative and useful artifacts as part of a context-aware method framework. We discuss the utility of these artifacts in an application in the claims handling process at the case organization.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We identify relation completion (RC) as one recurring problem that is central to the success of novel big data applications such as Entity Reconstruction and Data Enrichment. Given a semantic relation, RC attempts at linking entity pairs between two entity lists under the relation. To accomplish the RC goals, we propose to formulate search queries for each query entity α based on some auxiliary information, so that to detect its target entity β from the set of retrieved documents. For instance, a pattern-based method (PaRE) uses extracted patterns as the auxiliary information in formulating search queries. However, high-quality patterns may decrease the probability of finding suitable target entities. As an alternative, we propose CoRE method that uses context terms learned surrounding the expression of a relation as the auxiliary information in formulating queries. The experimental results based on several real-world web data collections demonstrate that CoRE reaches a much higher accuracy than PaRE for the purpose of RC.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Modern mobile computing devices are versatile, but bring the burden of constant settings adjustment according to the current conditions of the environment. While until today, this task has to be accomplished by the human user, the variety of sensors usually deployed in such a handset provides enough data for autonomous self-configuration by a learning, adaptive system. However, this data is not fully available at certain points in time, or can contain false values. Handling potentially incomplete sensor data to detect context changes without a semantic layer represents a scientific challenge which we address with our approach. A novel machine learning technique is presented - the Missing-Values-SOM - which solves this problem by predicting setting adjustments based on context information. Our method is centered around a self-organizing map, extending it to provide a means of handling missing values. We demonstrate the performance of our approach on mobile context snapshots, as well as on classical machine learning datasets.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research explores gestures used in the context of activities in the workplace and in everyday life in order to understand requirements and devise concepts for the design of gestural information applicances. A collaborative method of video interaction analysis devised to suit design explorations, the Video Card Game, was used to capture and analyse how gesture is used in the context of six different domains: the dentist's office; PDA and mobile phone use; the experimental biologist's laboratory; a city ferry service; a video cassette player repair shop; and a factory flowmeter assembly station. Findings are presented in the form of gestural themes, derived from the tradition of qualitative analysis but bearing some similarity to Alexandrian patterns. Implications for the design of gestural devices are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The present study investigates the experiences of Sudanese refugees by exploring the themes that characterise participants’ experiences in Sudan, en route, and at their Australian destination. In particular, the research identifies several factors that may be seen as ‘helps’ or ‘hindrances’ to Sudanese refugees’ adaptation. Participants were 12 Sudanese refugees aged between 19 and 40 years who had been residing in Australia for five years or less. A qualitative phenomenological approach to data collection and analysis was employed. Examination of the interview transcripts revealed that all participants identified both ‘hindrances’ and ‘helps’ toward adaptation and indicated that positive adaptation is not only possible, but probable for Sudanese refugees in spite of their past experiences of trauma and present resettlement difficulties. Several practical implications were elicited from the research including a need for programs that actively promote refugees’ adaptation by encouraging the broadening of social networks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Reforms to the national research and research training system by the Commonwealth Government of Australia sought to effectively connect research conducted in universities to Australia's national innovation system. Research training has a key role in ensuring an adequate supply of highly skilled people for the national innovation system. During their studies, research students produce and disseminate a massive amount of new knowledge. Prior to this study, there was no research that examined the contribution of research training to Australia's national innovation system despite the existence of policy initiatives aiming to enhance this contribution. Given Australia's below average (but improving) innovation performance compared to other OECD countries, the inclusion of Finland and the United States provided further insights into the key research question. This study examined three obvious ways that research training contributes to the national innovation systems in the three countries: the international mobility and migration of research students and graduates, knowledge production and distribution by research students, and the impact of research training as advanced human capital formation on economic growth. Findings have informed the concept of a research training culture of innovation that aims to enhance the contribution of research training to Australia's national innovation system. Key features include internationally competitive research and research training environments; research training programs that equip students with economically-relevant knowledge and the capabilities required by employers operating in knowledge-based economies; attractive research careers in different sectors; a national commitment to R&D as indicated by high levels of gross and business R&D expenditure; high private and social rates of return from research training; and the horizontal coordination of key organisations that create policy for, and/or invest in research training.