Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2023
Swarm analytics: Designing information markers to characterise swarm systems in shepherding contexts
Adaptive Behavior - Animals, Animats, Software Agents, Robots, Adaptive Systems (SAGE-ADAP), Volume 31, Issue 4Pages 323–349https://doi.org/10.1177/10597123221137090Contemporary swarm indicators are often used in isolation, focussed on extracting information at the individual or collective levels. Consequently, these are seldom integrated to infer a top-level operating picture of the swarm, its members and its ...
- research-articleMay 2019
Research on application recognition technology based on user's touch screen behavior
ACM TURC '19: Proceedings of the ACM Turing Celebration Conference - ChinaArticle No.: 111, Pages 1–4https://doi.org/10.1145/3321408.3321415As time duration of people using smartphones increases, mobile manufacturers such as Apple have developed mobile usage statistic tools that help users understand time distribution on application usage. However, with the application evolves, users may ...
- posterOctober 2018
A context recognition method using temperature sensors in the nostrils
ISWC '18: Proceedings of the 2018 ACM International Symposium on Wearable ComputersPages 220–221https://doi.org/10.1145/3267242.3267261We can benefit from various services with context recognition using wearable sensors. In this study, we focus on the contexts acquired from sensor data in the nostrils. Nostrils can provide various contexts on breathing, nasal congestion, and higher ...
- research-articleOctober 2018
Automatic Recognition of Affective Laughter in Spontaneous Dyadic Interactions from Audiovisual Signals
ICMI '18: Proceedings of the 20th ACM International Conference on Multimodal InteractionPages 220–228https://doi.org/10.1145/3242969.3243012Laughter is a highly spontaneous behavior that frequently occurs during social interactions. It serves as an expressive-communicative social signal which conveys a large spectrum of affect display. Even though many studies have been performed on the ...
- extended-abstractSeptember 2017
Energy-efficient data collection for context recognition
UbiComp '17: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable ComputersPages 458–463https://doi.org/10.1145/3123024.3124430Detection of the user's context with mobile sensing systems is a common problem in ubiquitous computing. However, the typically small battery of such systems is often making continuous detection impractical. The strain on the battery can be reduced if ...
-
- demonstrationOctober 2016
Real-time Wearable Computer Vision System for Improved Museum Experience
MM '16: Proceedings of the 24th ACM international conference on MultimediaPages 703–704https://doi.org/10.1145/2964284.2973813The goal of this work is to implement a real-time computer vision system that can run on wearable devices to perform object classification and artwork recognition, to improve the experience of a museum visit through understanding the interests of users. ...
- research-articleSeptember 2016
Preliminary investigations about interruptibility of smartphone users at specific place types
UbiComp '16: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: AdjunctPages 1590–1595https://doi.org/10.1145/2968219.2968554Smartphones are our ubiquitous, personal, wearable companions. Though, apart from their smartness and usefulness in our everyday lives they can cause displeasure. They allow us to be connected to a load of people and with a vast amount of apps - all of ...
- research-articleNovember 2015
Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware
IEEE Transactions on Information Forensics and Security (TIFS), Volume 10, Issue 11Pages 2270–2283https://doi.org/10.1109/TIFS.2015.2436364Malware is a burgeoning threat for smartphones and continuing advancing. Traditional defenses to malware, however, are not suitable for smartphones due to their resource intensive nature. This necessitates the design of novel mechanisms that can consider ...
- research-articleSeptember 2015
One-button recognizer: exploiting button pressing behavior for user differentiation
UbiComp '15: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous ComputingPages 403–407https://doi.org/10.1145/2750858.2804270We present a novel way to recognize users by the way they press a button. Our approach allows low-effort and fast interaction without the need for augmenting the user or controlling the environment. It eschews privacy concerns of methods such as ...
- research-articleMay 2015
Device-Free Radio-based Low Overhead Identification of Subject Classes
WPA '15: Proceedings of the 2nd workshop on Workshop on Physical AnalyticsPages 1–6https://doi.org/10.1145/2753497.2753503An increasing corpus of research focuses on inferring contexts solely through analysis of changes in surrounding wireless signals without the subject carrying a device (device-free). This paper takes device-free recognition a step further: We present ...
- research-articleFebruary 2015
Sound Shredding: Privacy Preserved Audio Sensing
HotMobile '15: Proceedings of the 16th International Workshop on Mobile Computing Systems and ApplicationsPages 135–140https://doi.org/10.1145/2699343.2699366Sound provides valuable information about a mobile user's activity and environment. With the increasing large market penetration of smart phones, recording sound from mobile phones' microphones and processing the sound information either on mobile ...
- research-articleNovember 2014
Context recognition in a smart home: living experiment
AcademicMindTrek '14: Proceedings of the 18th International Academic MindTrek Conference: Media Business, Management, Content & ServicesPages 167–170https://doi.org/10.1145/2676467.2676479Smart environments have emerged as a thriving field of research. Understanding user's context is one of the core areas of smart home research. In this study we present a smart home living experiment in which a test subject lived two weeks in the EleHome ...
- research-articleNovember 2014
Human activity recognition from spatial data sources
MobiGIS '14: Proceedings of the Third ACM SIGSPATIAL International Workshop on Mobile Geographic Information SystemsPages 18–25https://doi.org/10.1145/2675316.2675321Recent availability of big data of digital traces of human activity boosted research on human behavior. However, in most of the datasets such as mobile phone data or GPS traces, an important layer of information is typically missing: providing an ...
- research-articleSeptember 2014
Event driven time synchronization of mobile devices
UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct PublicationPages 451–457https://doi.org/10.1145/2638728.2641671Mobile devices are increasingly used for context recognition. Recognition accuracies partly depend on the time synchronicity between the mobile devices used for data recording and labeling. Mobile device synchronization can be done via the Internet or ...
- ArticleDecember 2013
A Loosely Coupled and Distributed Bayesian Framework for Multi-context Recognition in Dynamic Ubiquitous Environments
UIC-ATC '13: Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence & Computing and 2013 IEEE 10th International Conference on Autonomic & Trusted ComputingPages 270–277https://doi.org/10.1109/UIC-ATC.2013.66Today's ubiquitous environments are characterized by smart applications with variable context requirements on the one hand and a dynamic availability of heterogeneous sensors on the other hand. Currently, many existing systems pursue a structured ad-hoc ...
- ArticleDecember 2013
Inferring Model Structures from Inertial Sensor Data in Distributed Activity Recognition
Activity-Event-Detectorä(AED) digraphs can describe relations between human activities, activity-representing pattern events from sensors, and distributed detector nodes. AED graphs have been successfully used to perform network adaptations, including ...
- short-paperOctober 2013
Combining crowd-generated media and personal data: semi-supervised learning for context recognition
PDM '13: Proceedings of the 1st ACM international workshop on Personal data meets distributed multimediaPages 35–38https://doi.org/10.1145/2509352.2509396The growing ubiquity of sensors in mobile phones has opened many opportunities for personal daily activity sensing. Most context recognition systems require a cumbersome preparation by collecting and manually annotating training examples. Recently, ...
- posterSeptember 2013
Giving context to sounds through mediation of physical objects
UbiComp '13 Adjunct: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publicationPages 91–94https://doi.org/10.1145/2494091.2494117We describe the concept of and approach for combining conceptual information produced by humans and data that convey situations of the real world without any modification or interpretation, which can be thought of as a method for bridging the Web and the ...
- demonstrationSeptember 2013
Efficient in-pocket detection with mobile phones
UbiComp '13 Adjunct: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publicationPages 31–34https://doi.org/10.1145/2494091.2494099In this demonstration paper, we show a novel approach to detect the common placements of a mobile phone, such as "in pocket", "in bag" or "out of pocket or bag", from embedded proximity (IR) and light sensors. We use sensor data fusion and pattern ...
- abstractJuly 2013
The role of current working context in professional search
SIGIR '13: Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrievalPage 1148https://doi.org/10.1145/2484028.2484231Today's working world of knowledge workers is changing rapidly. The available information that they need to process is ever growing. In addition, the characteristics of their work are changing as people can and do their work from home. This has resulted ...