Antonella Frisiello, A. Lotito, Giovanni Luca Spoto, V. Macchia, Thomas Bolognesi, Francesco Ruà
{"title":"A new urban technoscape component: the smart2poster","authors":"Antonella Frisiello, A. Lotito, Giovanni Luca Spoto, V. Macchia, Thomas Bolognesi, Francesco Ruà","doi":"10.1145/2494091.2497363","DOIUrl":"https://doi.org/10.1145/2494091.2497363","url":null,"abstract":"This paper presents the Smart2Poster concept, based on a traditional visual communication tool enhanced by the integration of a proximity technology such as the Near Field Communication (NFC). The concept has been designed and prototyped to study a situated interaction modality, bridging digital information and the surrounding physical world, by means of familiar objects (a poster, a smartphone and/or a TV screen). Two different usage scenarios have driven the design and the implementation of one prototype born to enable offline mediated interactions among public administrations and citizens.","PeriodicalId":220524,"journal":{"name":"Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122151073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smartphone-based monitoring system for activities of daily living for elderly people and their relatives etc.","authors":"Kazushige Ouchi, M. Doi","doi":"10.1145/2494091.2494120","DOIUrl":"https://doi.org/10.1145/2494091.2494120","url":null,"abstract":"We developed a smartphone-based monitoring system to allay the anxiety of elderly people and that of their relatives, friends and caregivers by unobtrusively monitoring an elderly person's activities of daily living. A smartphone of the elderly person continuously recognizes indoor-outdoor activities by using only built-in sensors and uploads the activity log to a web server. By accessing the server, relatives etc. at remote locations can browse the log to make sure the elderly person is safe and sound. We conducted an evaluation experiment and confirmed that the proposed system had practical recognition accuracy and satisfied the users' needs.","PeriodicalId":220524,"journal":{"name":"Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123251581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic metadata to support device interaction in smart environments","authors":"S. Mayer, Gianin Basler","doi":"10.1145/2494091.2497584","DOIUrl":"https://doi.org/10.1145/2494091.2497584","url":null,"abstract":"Facilitating the interaction of human users and machines with smart devices is important to drive the successful adoption of the Internet of Things in people's homes and at their workplaces. In this paper, we present a system that helps users control their smart environment, by embedding semantic metadata in the representations of smart things. The system enables users to specify a desirable state of their smart environment and produces a machine-readable description that details which steps are necessary to reach this state, where each step corresponds to a Web request to a smart device. A client application that, for instance, runs on the user's smartphone, then implements these steps to reconfigure the user's smart environment. We report on our experiences when integrating semantic technologies with smart devices and on two use cases from the home and office automation domains that we implemented in our office space.","PeriodicalId":220524,"journal":{"name":"Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131528945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yutaro Kyono, Takuro Yonezawa, Hiroki Nozaki, Masaki Ogawa, Tomotaka Ito, J. Nakazawa, K. Takashio, H. Tokuda
{"title":"EverCopter: continuous and adaptive over-the-air sensing with detachable wired flying objects","authors":"Yutaro Kyono, Takuro Yonezawa, Hiroki Nozaki, Masaki Ogawa, Tomotaka Ito, J. Nakazawa, K. Takashio, H. Tokuda","doi":"10.1145/2494091.2494183","DOIUrl":"https://doi.org/10.1145/2494091.2494183","url":null,"abstract":"The paper proposes EverCopter, which provides continuous and adaptive over-the-air sensing with detachable wired flying objects. While a major advantage of sensing systems with battery-operated MAVs is a wide sensing coverage, sensing time is limited due to its limited amount of energy. We propose dynamically rechargeable flying objects, called EverCopter. EverCopter achieves both long sensing time and wide sensing coverage by the following two characteristics. First, multiple EverCopters can be tied in a row by power supply cables. Since the root EverCopter in a row is connected to DC power supply on the ground, each EverCopter can fly without battery. This makes their sensing time forever, unless the power supply on the ground fails. Second, the leaf EverCopter can detach itself from the row in order to enjoy wider sensing coverage. An EverCopter, while it is detached, runs with its own battery-supplied energy. When the remaining energy becomes low, it flies back to the row to recharge the battery.","PeriodicalId":220524,"journal":{"name":"Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131265028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding and augmenting a paper arrangement-based method","authors":"G. Harboe","doi":"10.1145/2494091.2501087","DOIUrl":"https://doi.org/10.1145/2494091.2501087","url":null,"abstract":"I investigate the practices of affinity diagramming, a method for qualitative data analysis and idea generation, and the factors that lead HCI researchers and practitioners to usually perform it on paper rather than on digital devices. Based on my findings, I propose that Ubicomp technology can be used to create an implicit interaction system that allows users to preserve their preferred practices, while offering the benefits of a digital system. Initial prototypes have been built; a more complete prototype system and evaluation of the solution remain to be completed.","PeriodicalId":220524,"journal":{"name":"Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126302583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An evaluation of method for encouraging participation","authors":"Hitoshi Kawasaki, Atsushi Yamamoto, H. Kurasawa, Hiroshi Sato, Motonori Nakamura, Ryuma Kakinuma","doi":"10.1145/2494091.2497342","DOIUrl":"https://doi.org/10.1145/2494091.2497342","url":null,"abstract":"Much attention is being focused on participatory sensing, in which real-world data are collected using personal mobile devices as sensor nodes to sense various conditions of the world we live in. In participatory sensing, there is a problem in that the supply of data is insufficient if users are not motivated to participate in sensing services. We previously proposed Top of Worlds, a method for encouraging user participation by presenting rankings in multidimensional hierarchical sets. In this paper, we describe the development of a ranking system and a real-world evaluation to confirm that Top of Worlds can encourage user participation.","PeriodicalId":220524,"journal":{"name":"Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125593515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive security and privacy management for the internet of things (ASPI 2013)","authors":"S. Poslad, Mohamed Hamdi, H. Abie","doi":"10.1145/2494091.2499770","DOIUrl":"https://doi.org/10.1145/2494091.2499770","url":null,"abstract":"The Internet of Things (IoT) was initially proposed to connect specific things via the Internet using devices, such as RFID readers, to realise intelligent identification and management. This vision has since expanded to include a more diverse range of devices, services and networks to become an Internet of anything, anywhere, connected, anyhow. Security and privacy management for the IoT remains a core challenge. Many IoT devices maybe may have zero or minimal security by design because they are low resource, low power devices, designed to work as closed vertical services. Security threats and risks may be higher because devices are unattended, use local wireless communication that have no or weak encryption making them more susceptible to eavesdropping and because users find security too unusable to setup and operate and hence leave devices relatively unsecure. It may also be less problematic to reproduce and fake data sources, access nodes and data sinks that interact with IoT devices in order to attack devices or the services they access. Devices can be moved between or removed from private, communal, public and hostile physical spaces. There is a higher risk of a loss of privacy for human users and organisations because of an increased ability to eavesdrop, because of wireless networks with soft boundaries, and because embedded environment devices can sense smaller amounts of physical trails with a greater degree of sensitivity and accuracy. A specific focus is on the need for IoT security to adapt. The adaptation has multiple dimensions. We can adapt existing conventional security models to more effectively secure an IoT. We can adapt security pre-planned and unplanned context changes such as different moving around in different physical spaces. IoT systems can be designed to self-adapt. IoT systems need to adapt to the active (re) configuration and maintenance of IoT devices and systems of devices by users and by artificial agents. The proposed workshop intends to bring together researchers and practitioners from relevant fields to present and disseminate the latest on-going research focussing on adapting security, privacy & management for the Internet of Things. It aims to facilitate knowledge transfer and synergy, bridge gaps between different research communities and groups, to lay down foundation for common purposes, and to help identify opportunities and challenges for interested researchers and technology and system developers.","PeriodicalId":220524,"journal":{"name":"Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131723244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rossi, O. Amft, S. Feese, Christian Käslin, G. Tröster
{"title":"MyConverse in action: monitoring conversations using smartphones","authors":"M. Rossi, O. Amft, S. Feese, Christian Käslin, G. Tröster","doi":"10.1145/2494091.2499903","DOIUrl":"https://doi.org/10.1145/2494091.2499903","url":null,"abstract":"This demo presents MyConverse, a personal conversation recogniser and visualiser for Android smartphones. It uses the smartphone's microphone to continuously recognise the user's conversations during his daily life autonomously on the smartphones. MyConverse identifies known speakers in conversations. Unknown speakers are detected and trained for further identification.","PeriodicalId":220524,"journal":{"name":"Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125744246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. D. Hartog, P. Nooren, A. Delphinanto, E. Fledderus
{"title":"On managed services lanes and their use in home networks","authors":"F. D. Hartog, P. Nooren, A. Delphinanto, E. Fledderus","doi":"10.1145/2494091.2497317","DOIUrl":"https://doi.org/10.1145/2494091.2497317","url":null,"abstract":"Home networks show an increasing level of heterogeneity regarding the devices connected, network technologies used, and services supported. Heterogeneity inhibits quality assurance for new services, such as online gaming, energy management, and health care. This paper focuses on the role that the concept of Managed Services Lanes (MSLs) plays in Dutch smart-city initiatives to solve these issues. MSLs provide third-party service providers quality guarantees without infringing network neutrality. Our preliminary experiments with extending MSLs into the home network indicate that end users indeed have a better quality of experience for the supported Neighborhood TV service than without MSLs. We also show that extension of MSLs into the home network requires advanced home networking monitoring technologies including dynamic home network traffic models. Our research provides evidence that such models will be very different from the standard Internet models.","PeriodicalId":220524,"journal":{"name":"Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131229633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring design opportunities for social intimacy through everyday objects and practices","authors":"H. Wei, E. Giaccardi, M. Sonneveld","doi":"10.1145/2494091.2497365","DOIUrl":"https://doi.org/10.1145/2494091.2497365","url":null,"abstract":"This paper describes a design-driven exploration of how social media services can be made tangible through everyday objects and practices. The exploration was focused on the gaps and opportunities of how people experience intimacy in the social media context. We refer to it as social intimacy.","PeriodicalId":220524,"journal":{"name":"Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication","volume":"15 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133581532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}