Topic
Context awareness
About: Context awareness is a research topic. Over the lifetime, 5790 publications have been published within this topic receiving 119944 citations.
Papers published on a yearly basis
Papers
More filters
11 Oct 2011
TL;DR: A generic architecture supporting delivery of contextualized information that can assist mobile users to take decisions during their activities and the competitive results have shown that the system can select adequately relevant information for end-users given their contexts and thus demonstrated the feasibility of the architecture.
Abstract: An increasing number of mobile users demand adaptive services tailored to their specific requirements in a particular situation. Typically, when carrying out the task at hand, police officers need to have up-to-date information contextualized to their current situation in order to support their decision making. In contrast to the traditional work environments in which workers are involved in standard office work, the situations in which mobile workers perform their tasks are characterized by various types of context. This feature requires the designers of a system serving those mobile users to understand which context dimensions might influence the users’ information needs; thus, developers must find solutions that enable applications to adapt their behaviour to the current context without consuming too much of users’ attentions. In this thesis we designed a generic architecture supporting delivery of contextualized information that can assist mobile users to take decisions during their activities. Within the MOSAIC project, aiming to enhance situation awareness of emergency responders, we developed a rule-based system which can assess the relevance of information items by taking into account the contextual situations police officers are involved in. Following our quantitative evaluation method, we evaluated the effectiveness and adaptability our system based on realistic scenarios in cooperation with end-users. The competitive results have shown that the system can select adequately relevant information for end-users given their contexts and thus demonstrated the feasibility of the architecture we designed.
66 citations
••
25 Apr 2006TL;DR: It is shown how location information can be rendered illegible in such a way that it is still possible to perform processing operations required by LBS.
Abstract: Protecting location information of mobile users in location based services (LBS) is a very important but quite difficult and still largely unsolved problem. Location information has to be protected against unauthorized access not only from users but also from service providers storing and processing the location data, without restricting the functionality of the system. This paper discusses why existing privacy enhancing techniques are insufficient to solve this problem and proposes a new approach basing on coordinate transformations. It shows how location information can be rendered illegible in such a way that it is still possible to perform processing operations required by LBS.
65 citations
••
TL;DR: MIDAS middleware exemplifies how to exploit context awareness based on user/device/service profile metadata and semantic-based matchmaking to allow flexible matching between requirements and capabilities in open and dynamic deployment scenarios.
Abstract: A mass market of users with differentiated preferences and heterogeneous wireless terminals will increasingly access services dynamically introduced by competitor providers. In next-generation mobile systems, novel solutions for user-centric service discovery are crucial to provide personalized views of only the services of potential interest. The service view personalization should be based on user context, for example, user preferences, access device capabilities, and environment conditions, and should exploit semantic technologies to allow flexible matching between requirements and capabilities in open and dynamic deployment scenarios. Our MIDAS middleware exemplifies how to exploit context awareness based on user/device/service profile metadata and semantic-based matchmaking
65 citations
••
TL;DR: The article proposes a flexible middleware for the development and deployment of location/context-aware services for heterogeneous data access in the Internet that adopts the mobile agent technology to effectively support autonomous, asynchronous, and local access to data resources, and is particularly suitable for temporarily disconnected clients.
Abstract: The widespread diffusion of mobile computing calls for novel services capable of providing results that depend on both the current physical position of users (location) and the logical set of accessible resources, subscribed services, preferences, and requirements (context). Leaving the burden of location/context management to applications complicates service design and development. In addition, traditional middleware solutions tend to hide location/context visibility to the application level and are not suitable for supporting novel adaptive services for mobile computing scenarios. The article proposes a flexible middleware for the development and deployment of location/context-aware services for heterogeneous data access in the Internet. A primary design choice is to exploit a high-level policy framework to simplify the specification of services that the middleware dynamically adapts to the client location/context. In addition, the middleware adopts the mobile agent technology to effectively support autonomous, asynchronous, and local access to data resources, and is particularly suitable for temporarily disconnected clients. The article also presents the case study of a museum guide assistant service that provides visitors with location/context-dependent artistic data. The case study points out the flexibility and usability of the proposed middleware that permits automatic service reconfiguration with no impact on the implementation of the application logic.
64 citations
••
26 Feb 2013TL;DR: In this article, the authors propose a privacy-aware framework called ipShield, which uses current user context together with a model of user behavior to quantify an adversary's knowledge regarding a sensitive inference, and obfuscate data accordingly before sharing.
Abstract: We study the competing goals of utility and privacy as they arise when a user shares personal sensor data with apps on a smartphone. On the one hand, there can be value to the user for sharing data in the form of various personalized services and recommendations; on the other hand, there is the risk of revealing behaviors to the app producers that the user would like to keep private. The current approaches to privacy, usually defined in multi-user settings, rely on anonymization to prevent such sensitive behaviors from being traced back to the user---a strategy which does not apply if user identity is already known, as is the case here.Instead of protecting identity, we focus on the more general problem of choosing what data to share, in such a way that certain kinds of inferences---i.e., those indicating the user's sensitive behavior---cannot be drawn. The use of inference functions allows us to establish a terminology to unify prior notions of privacy as special cases of this more general problem. We identify several information disclosure regimes, each corresponding to a specific privacy-utility tradeoff, as well as privacy mechanisms designed to realize these tradeoff points. Finally, we propose ipShield as a privacy-aware framework which uses current user context together with a model of user behavior to quantify an adversary's knowledge regarding a sensitive inference, and obfuscate data accordingly before sharing. We conclude by describing initial work towards realizing this framework.
64 citations