- 1 -. - 2 - Mobile applications Mobile applications have been a domain for recommendation –small display sizes and space limitations –naturally require.

Slides:



Advertisements
Similar presentations
Digital inclusion – a CS perspective Alex Poulovassilis ESRC TLRP-TEL Inclusion and Impact conference, June 2010.
Advertisements

Web Services In M-Commerce
Mobile and ubiquitous computing Chapter 16 Distributed systems, concepts and design, 4th edition, 2005, Coulouris et al Ylva-Li Lindh Gabriella Hammarin.
Context and Context- Aware Computing Omar Khan CS260, Fall 2006.
Context-Aware Security Gleneesha Johnson
Making Evidence-Based Education Policy Ontario Research Chairs in Public Policy Symposium Carol Campbell Ontario Institute for Studies in Education, University.
Sharing Content and Experience in Smart Environments Johan Plomp, Juhani Heinila, Veikko Ikonen, Eija Kaasinen, Pasi Valkkynen 1.
1 The Ubiquitous Web Eunchae Yoon. School of Engineering, Eunchae Yoon 2 Contents What is Ubiquitous computing? What is Ubiquitous Web? Ubiquitous computing.
Beyond Prototypes: Challenges in Deploying Ubiquitous Systems N. Davies and H. Gellersen IEEE pervasive computing, 2002 Presenter: Min Zhang
Context-Aware User Interfaces. Gent, 21 maart 2005 Context-Aware User Interfaces Context-Aware User Interfaces is a requirement for all defined scenarios.
Pervasive Computing 通訊所 鄭筱親. Outline  Introduction  Context Awareness  Recent Research  Future and Conclusion.
ELG 5121: Multimedia Communications Course Instructor: Prof. Dr. A. El Saddik Project Presentation: Fall 2010 Md. Mahmud Hasan (Group No. 12)
A Context Framework for Ambient Intelligence. Context servers Motivation interoperable Machine processable Security & privacy.
Ubiquitous Computing The death of PC?. Ubiquitous Computing ubiquitous = Being or seeming to be everywhere at the same time; omnipresent. Mark Weiser,
P2P as a Discovery Instrument for Multi-Agent Ubiquitous Middleware P2P as a Discovery Instrument for Multi-Agent Ubiquitous Middleware A work-package.
Wednesday, 24 June rd UKIBNET Workshop1 Distributing Cognition in the design of ubiquitous computers Chris Baber Pervasive Computing Group The University.
Real-Time Systems and the Aware Home Anind K. Dey Ubiquitous Computing Future Computing Environments.
CSE5610 Intelligent Software Systems Semester 1 Enabling Intelligent Systems in Pervasive Computing.
AMBIENT INTELLIGENT José Manuel Molina López Catedrático de Ciencia de la Computación e Inteligencia Artificial.
International Services and Tools for Content, Metadata and IPR Management Wen Gao Department of Computer Science 10/24/2013.
From Enterprise Architecture to E- government Adoption: The Critical Success Factors for Swaziland Comfort Mhlanga.
At Home with Ubiquitous Computing: Seven Challenges W. Keith Edwards and Rebecca Grinter UbiComp 2001.
Policy-Based Context-Aware Applications for Mobile Computing José Viterbo Filho Laboratory for Advanced Collaboration.
France Telecom Group Brussels 19 January 2010 Smart and Ubiquitous Audio-visual and Multimedia Services Framework Program 7 for period Consultation.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
Implementation of a personalized information system on mobile phones Pablo López Escobés Advanced Services Enabling Telematic Applications MSc ICT Research.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
A Recommendation Mechanism for Contextualized mobile advertising S.-T. Yuan et al., Expert Systems with Applications, vol. 24, no. 4, pp , 2003.
CS 580 chapter 4 paradigms.
Mobile data. Introduction Wireless (cellular) communications has experienced a tremendous growth in this decade. Most of the wireless users also access.
Chapter 8 Architecture Analysis. 8 – Architecture Analysis 8.1 Analysis Techniques 8.2 Quantitative Analysis  Performance Views  Performance.
Patterns for Location and Context-based access control
Using Common Sense Reasoning to Create Intelligent Mobile Applications Software Agents Group MIT Media Lab.
CHI 2006 Workshop Investigating new user experience challenges in iTV: mobility & sociability Dr. David Geerts Dr. Anxo Cereijo Roibàs Dr. Licia Calvi.
Extending the control of remote laboratories using domotic devices Ricardo Costa
Cross Programme Themes in the IST programme - Cross Programme Actions - Cross Programme Clusters.
Secure Systems Research Group - FAU Contexts and Context-based Access Control Model PhD Dissertation Progress Report Candidate: Alvaro E. Escobar Advisors:
How Smart Homes Learn The Evolution of the Networked Home and Household Marshini Chetty, Ja-Young Sung, and Rebecca E. Grinter Ubicomp 2007 Presenter:Brian.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
CS2003 Usability Engineering Human-Centred Design Dr Steve Love.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
INTERNET. Objectives Explain the origin of the Internet and describe how the Internet works. Explain the difference between the World Wide Web and the.
Problem Paramount to the success of your effort stated precisely address an important question advance knowledge.
Application of Operating System Concepts to Coordination in Pervasive Sensing and Computing Systems Benjamin J. Ewy, Larry M. Sanders Ambient Computing,
Welcome to CPS 210 Graduate Level Operating Systems –readings, discussions, and programming projects Systems Quals course –midterm and final exams Gateway.
MUC course – Final examination Stephane Dupin, February 2 nd 2010.
Privacy and Security: Thinking About and Analyzing Privacy privacy and security 1 Research Topics in Ubiquitous Computing Ben Elgart thinking about and.
R&D  BBC MMX BBC Second Screens Study Maxine Glancy (BBC) & Connor Graham (freelance researcher)
An Intelligent Expert System for Proactive Services Deploying Ubiquitous Computing Technologies IEEE 2005 Proceedings of the 38th Hawaii International.
Hippie A Nomadic Information System Oppermann, et al. International Symposium on Handheld and Ubiquitous Computing (HUC 99)
ICADI Preparatory Workshop Purpose Andrew Sixsmith, U. Liverpool Sumi Helal, U. of Florida.
Gaia Ubiquitous Computing Directions Roy Campbell University of Illinois at Urbana-Champaign.
Seminar On 3D Internet Submitted To: Submitted By:
NTC 249 edu Experience Tradition/ntc249edudotcom FOR MORE CLASSES VISIT
Internet of Things – Getting Started
Chapter 6 Views on Technology. 1. Instrumentalist view - Technologies are neutral; a value neutral tool that can assist in achieving a certain purpose.
NTC 249 EDU Education Expert/ntc249edu.com
What is the role of TripAdvisor APP and its use of GPS technology for digital economy? Yue Wang.
MetaOS Concept MetaOS developed by Ambient Computing to coordinate the function of smart, networked devices Smart networked devices include processing.
Preface to the special issue on context-aware recommender systems
ITU-T Study Group 17 Security
Mobile Commerce and the Internet of Things
Ambient Intelligence -by Internal Guide: M.Preethi(10C91A0563)
Learning with Technology In, About, Through, and Despite Context
Personalization in E-commerce Applications
Mobile Commerce and Ubiquitous Computing
Smart Learning concepts to enhance SMART Universities in Africa
Recommendations in ubiquitous environments
Presentation transcript:

- 1 -

- 2 - Mobile applications Mobile applications have been a domain for recommendation –small display sizes and space limitations –naturally require personalized information Since the end of the 1990s, research into mobile applications has focused heavily on adaptivity Nowadays, limitative circumstances are now starting to disappear –more powerful CPUs –better displays –modern wireless broadband

- 3 - RS research questions in ubiquitous domains What are the specific goals of recommender systems in a mobile context? –do users expect serendipitous recommendations, or is it more important to be pointed to things that are close to one's current position? What are the implications of contextual parameters such as localization for the design of recommendation algorithms? –is location just another preference, a requirement that is always strictly enforced, or something in between? What role does the modality of interaction play when addressing users "on the go"? –pushing information can be useful to draw recipients' attention, but the users' permission is surely needed. how should permission protocols for "push" recommendations function?

- 4 - Context-aware recommendation Ranganathan and Campbell (2003) see context as –"any information about the circumstances, objects or conditions surrounding a user that is considered relevant to the interaction between the user and the ubiquitous computing environment" Shilit et al. (1994) name the most important aspects of context as –where you are –who you are with –what resources are nearby Context awareness is a requirement for recommender systems –particularly relevant in ubiquitous domains –context as situation parameters that can be known by the system and may have an impact on the selection and ranking of recommendation results.

- 5 - Application domains M-Commerce –m-commerce refers to monetary transactions that are conducted via wireless networks. Tourism and visitor guides –travelers have specific information needs, makes this domain a natural choice for mobile information systems. Cultural heritage and museum guides –mobile guides for archeological sites or museums providing multimedia services. Home computing and entertainment –users are able to personally configure and adapt smart devices in their environment based on their preferences and on specific situations.

- 6 - Summary Rapid technical advancements toward ever more powerful mobile devices Ubiquitous applications constitute a promising domain for different types of personalization and recommendation Tourism application domain is by far the most active field bottleneck: technical interoperability between ubiquitous devices themselves and the privacy concerns of users

- 7 - Literature [Ranganathan and Campbell 2003] An infrastructure for context-awareness based on first order logic, Personal Ubiquitous Computing 7 (2003), no. 6, 353–364. [Shilit et al. 1994] Context-aware computing applications, Proceedings of the 1994 First Workshop on Mobile Computing Systems and Applications (WMCSA '94) (Santa Cruz, CA) (Maria Sigala et al., ed.), IEEE Computer Society, 1994, pp. 85–90.