Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication最新文献

筛选
英文 中文
Lifelogging for 'observer' view memories: an infrastructure approach “观察者”视图记忆的生活日志:一种基础设施方法
S. Clinch, P. Metzger, N. Davies
{"title":"Lifelogging for 'observer' view memories: an infrastructure approach","authors":"S. Clinch, P. Metzger, N. Davies","doi":"10.1145/2638728.2641721","DOIUrl":"https://doi.org/10.1145/2638728.2641721","url":null,"abstract":"Lifelogging has much to offer human memory. Traditional lifelogging techniques use wearable cameras to capture a first-person or 'field' view. We propose an alternative or complementary approach in which fixed infrastructure cameras provide a third-person or 'observer' view of daily events. In this paper we identify key advantages and challenges for a fixed infrastructure approach to lifelogging.","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90239846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Motivational affordances and personality types in personal informatics 个人信息学中的动机启示与人格类型
Yamini Karanam, Hanan Alotaibi, Leslie Filko, Elham Makhsoom, Lindsay N. Kaser, Stephen Voida
{"title":"Motivational affordances and personality types in personal informatics","authors":"Yamini Karanam, Hanan Alotaibi, Leslie Filko, Elham Makhsoom, Lindsay N. Kaser, Stephen Voida","doi":"10.1145/2638728.2638800","DOIUrl":"https://doi.org/10.1145/2638728.2638800","url":null,"abstract":"Personal informatics applications have been gaining momentum with the introduction of implicit data collection and alert mechanisms on smart phones. A need for customized design of these applications is emerging and studies on tailoring UI design based on the personality traits of users are well established. This poster investigates how various affordances in gamified personal informatics applications affect motivation levels to track and achieve goals for users with different personality types. We conducted a study to examine how user personality traits relate to (1) motivational affordances in behavior tracking applications and (2) the specific behaviors users prefer to track.","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89953777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Physics education with Google Glass gPhysics experiment app 物理教育与谷歌眼镜g物理实验应用程序
Jens Weppner, P. Lukowicz, M. Hirth, J. Kuhn
{"title":"Physics education with Google Glass gPhysics experiment app","authors":"Jens Weppner, P. Lukowicz, M. Hirth, J. Kuhn","doi":"10.1145/2638728.2638742","DOIUrl":"https://doi.org/10.1145/2638728.2638742","url":null,"abstract":"We present a fully functional application prototype gPhysics App based on the Google Glass platform which is designed to perform an educational physical experiment in the area of acoustics. The initial applications aims towards students whose task is to find the relationship between the frequency of the sound generated by hitting a water glass and the amount of water.","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86587991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Graph-based data fusion of pedometer and WiFi measurements for mobile indoor positioning 基于图形的计步器与WiFi测量数据融合,实现移动室内定位
S. Hilsenbeck, D. Bobkov, Georg Schroth, Robert Huitl, E. Steinbach
{"title":"Graph-based data fusion of pedometer and WiFi measurements for mobile indoor positioning","authors":"S. Hilsenbeck, D. Bobkov, Georg Schroth, Robert Huitl, E. Steinbach","doi":"10.1145/2632048.2636079","DOIUrl":"https://doi.org/10.1145/2632048.2636079","url":null,"abstract":"We propose a graph-based, low-complexity sensor fusion approach for ubiquitous pedestrian indoor positioning using mobile devices. We employ our fusion technique to combine relative motion information based on step detection with WiFi signal strength measurements. The method is based on the well-known particle filter methodology. In contrast to previous work, we provide a probabilistic model for location estimation that is formulated directly on a fully discretized, graph-based representation of the indoor environment. We generate this graph by adaptive quantization of the indoor space, removing irrelevant degrees of freedom from the estimation problem. We evaluate the proposed method in two realistic indoor environments using real data collected from smartphones. In total, our dataset spans about 20 kilometers in distance walked and includes 13 users and four different mobile device types. Our results demonstrate that the filter requires an order of magnitude less particles than state-of-the-art approaches while maintaining an accuracy of a few meters. The proposed low-complexity solution not only enables indoor positioning on less powerful mobile devices, but also saves much-needed resources for location-based end-user applications which run on top of a localization service.","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86757612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 127
Revisiting signals and noise for ethical and legal research using online data 重新审视使用在线数据进行伦理和法律研究的信号和噪声
Erin E. Kenneally
{"title":"Revisiting signals and noise for ethical and legal research using online data","authors":"Erin E. Kenneally","doi":"10.1145/2638728.2641685","DOIUrl":"https://doi.org/10.1145/2638728.2641685","url":null,"abstract":"The stability of trust on the Internet has implications for political diplomacy, innovation, economic stability, social and civil relations, and individual self-determinism. The degree of online trust is a reflection of the gap between individual and collective Netizens' expectations formed by laws and ethics, and their capabilities enabled by technology. Law and ethics, just as with familiar offline society, act as ordering forces that inform the acceptability of our behaviors and relationships with other person and organizations. The migration of these analog activities online has exposed a rather sweeping gap between expectations and capabilities, where legal and ethical ordering forces are challenged to re-examine, -interpret, and --apply the tenets and principles upon which they moor. As this gap widens, so too does ambiguity between asserted rights, interests, and threats to same. This gap is manifest most prominently in the current industrial and geo-political struggle to define rules of engagement for cyber conflict and national security, as well as with online advertising and data brokering. A related context where ordering forces are challenged, lower on the public notoriety index but no less considerable, is information and communication technology (ICT) research. The controversy over the collection, use and disclosure of online data for research exposes gaps and deficiencies in the legal and ethical structures that directly and indirectly inform and reflect our expectations. Notably, \"consent\" has been a fundamental mechanism for protecting rights and interests in both law and ethics. As such, it serves as an institutionalized signal for persons' reasonable expectations. Yet, the ability to easily collect and combine massive amounts of existing, \"publicly-available\" information of a sensitive nature (personal or confidential) online exposes deficiencies in consent as an effective signal for expectations. More specifically, researchers increasingly encounter data online such as personal health, financial or behavioral records; usernames and passwords lists; corporate manuals and technical documents; email and voice communications databases; and, device vulnerabilities and machine-to-machine communications. It is located in various online locations ranging from normal websites and social networks to underground criminal forums, Internet relay chat rooms, and publicly-obscured/hidden sites. And, its availability is often a product of malicious, negligent, or ignorant collection or disclosure by a third party. In this context, consent as an expectation signal is strained along substantive and procedural dimensions. For example, some argue that the existence of other signals (i.e., the data was public and/or non-identifiable, the purpose of the research is to study a system or threat and not individual persons) pre-empts the need for consent. In addition, obtaining consent for what amounts to secondary use of online data may be impracticab","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86316857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disasters in personal informatics: the unpublished stories of failure and lessons learned 个人信息学中的灾难:未发表的失败故事和经验教训
Jon E. Froehlich, J. E. Larsen, Matthew Kay, Edison Thomaz
{"title":"Disasters in personal informatics: the unpublished stories of failure and lessons learned","authors":"Jon E. Froehlich, J. E. Larsen, Matthew Kay, Edison Thomaz","doi":"10.1145/2638728.2641315","DOIUrl":"https://doi.org/10.1145/2638728.2641315","url":null,"abstract":"Though never a desirable outcome, failure is an inevitable part of research. Too often, however, the tried but failed paths are lost in the translation of work to publication. With the pragmatics of publishing (e.g., page limits) and the academic emphasis on positive outcomes, failed processes, methodologies, study designs, and technologies are frequently not disclosed. This is a missed opportunity, particularly for nascent areas like Personal Informatics (PI) as well as other research areas, more generally, that share high costs in time, development, and recruitment for building and deploying testable systems. Thus, we propose a UbiComp2014 workshop focused on failures in PI research. Through short participant authored papers, breakout sessions, madness talks, and all-group discussions, our overarching workshop goals are to share \"disaster\" stories, reflect on lessons learned, and articulate promising paths forward.","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89157529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Kraken.me: multi-device user tracking suite 海怪。Me:多设备用户跟踪套件
Immanuel Schweizer, Benedikt Schmidt
{"title":"Kraken.me: multi-device user tracking suite","authors":"Immanuel Schweizer, Benedikt Schmidt","doi":"10.1145/2638728.2641307","DOIUrl":"https://doi.org/10.1145/2638728.2641307","url":null,"abstract":"An in-depths understanding of human activity is a relevant contribution to the design of interactive systems to support human activity. This is of explicit relevance for assistance systems building on prediction and recommendation. However, the understanding of human activity is limited. Albeit the omnispresence of smart phones and computers, the actual execution of complex activities with those devices in relation to context factors is not completely understood. One possible reason is the limited amount of activity related data to perform actual research. In this paper, we present the Kraken.me framework to address this lack of information. Kraken.me is the first tracking suite to offer integrated tools for mobile, social, and desktop tracking. It is also, to our knowledge, the first tool to emphasize the collection of data from both physical and soft sensors. In this paper, we will introduce the overall architecture, system components, and future research ideas for Kraken.me.","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78970210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An emerging tool kit for attaining informed consent in UbiComp 在UbiComp中获取知情同意的新兴工具包
Stuart Moran, E. Luger, T. Rodden
{"title":"An emerging tool kit for attaining informed consent in UbiComp","authors":"Stuart Moran, E. Luger, T. Rodden","doi":"10.1145/2638728.2641677","DOIUrl":"https://doi.org/10.1145/2638728.2641677","url":null,"abstract":"Existing approaches to attaining informed consent are outdated and inappropriate for use in ubiquitous computing systems. The pervasiveness of the technology and the nature of user interaction require a rethinking of consent mechanisms. In this paper we briefly introduce and discuss several new approaches to consent acquisition developed specifically for the new era of ubiquitous computing.","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86095020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modeling visit behaviour in smart homes using unsupervised learning 使用无监督学习对智能家居中的访问行为进行建模
A. N. Aicha, G. Englebienne, B. Kröse
{"title":"Modeling visit behaviour in smart homes using unsupervised learning","authors":"A. N. Aicha, G. Englebienne, B. Kröse","doi":"10.1145/2638728.2638809","DOIUrl":"https://doi.org/10.1145/2638728.2638809","url":null,"abstract":"Many algorithms on health monitoring from ambient sensor networks assume that only a single person is present in the home. We present an unsupervised method that models visit behaviour. A Markov modulated multidimensional non-homogeneous Poisson process (M3P2) is described that allows us to model weekly and daily variations and to combine multiple data streams, namely the front-door sensor transitions and the general sensor transitions. The results from nine months of sensor data collected in the apartment of an elderly person show that our model outperforms the standard Markov modulated Poisson process (MMPP).","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88217836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Creative collaboration with a social robot 与社交机器人的创造性合作
P. Kahn, T. Kanda, H. Ishiguro, Solace Shen, Heather E. Gary, Jolina H. Ruckert
{"title":"Creative collaboration with a social robot","authors":"P. Kahn, T. Kanda, H. Ishiguro, Solace Shen, Heather E. Gary, Jolina H. Ruckert","doi":"10.1145/2632048.2632058","DOIUrl":"https://doi.org/10.1145/2632048.2632058","url":null,"abstract":"This research builds on the UbiComp vision of systems that do not do things for people but engage people in their computational environment so that people can do things for themselves better. In this investigation, we sought to make good on a proof-of-concept where people interact with a social robot whereby the robot helps people to be more humanly creative. Twenty seven participants interacted with ATR's humanoid robot Robovie (through a WoZ interface) in a creativity task. Results supported our proof of concept insofar as 100% of the participants generated creative ideas, and 63% incorporated the robot's ideas into their own ideas for their creative output. Of the participants who had the highest creativity scores, 83% incorporated the robot's ideas into their own. Discussion focuses on next steps toward building the Natural Language Processing system, and integrating the system into a more extensive networked UbiComp environment.","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88429791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信