By Topic

Advances in Human-Oriented and Personalized Mechanisms, Technologies and Services (CENTRIC), 2010 Third International Conference on

Date 22-27 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 32
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (847 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (11 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (58 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - vii
    Save to Project icon | Request Permissions | PDF file iconPDF (167 KB)  
    Freely Available from IEEE
  • Preface

    Page(s): viii - ix
    Save to Project icon | Request Permissions | PDF file iconPDF (81 KB)  
    Freely Available from IEEE
  • Committee

    Page(s): x - xii
    Save to Project icon | Request Permissions | PDF file iconPDF (95 KB)  
    Freely Available from IEEE
  • Reviewers

    Page(s): xiii - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (93 KB)  
    Freely Available from IEEE
  • A User Perspective on Cloud Computing

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (249 KB) |  | HTML iconHTML  

    Current service cloud models can be easily seen as application-centered: they provide an access point to services and artifacts but, including them as separate resources, they do not offer a unified and cross-application perspective on users' activities. As an answer to this issue, we present a user-centered cloud model which, by enabling services to synchronize on a unified context, enhances users' interaction with Web 2.0 applications within the service cloud. The underlying infrastructure of our model can handle shared data and activities involving multiple services, providing a unified, cross-application workspace awareness support. This shared context supports the management of flexible and extensible collaboration environments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting Voice over IP Communication Using Electronic Identity Cards

    Page(s): 5 - 10
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (400 KB) |  | HTML iconHTML  

    Using communication services like voice services, chat services and web 2.0 technologies (wikis, blogs, etc) are a common part of everyday life in a personal or business context. These communication services typically authenticate participants. Identities identify the communication peer to users of the service or to the service itself. Calling line identification used in the Session Initiation Protocol (SIP) used for Voice over IP (VoIP) is just one example. Also, further mechanisms rely on identities, e.g., white lists defining allowed communication peers. Trusted identities prevent identity spoofing. They are a basic building block for the protection of VoIP communication. However, providing trusted identities in a practical way is still a difficult problem. Identity cards have been introduced by many countries supporting electronic authentication and identification of citizens, e.g., the German “Elektronischer Personalausweis” (ePA). As many German citizens will possess an ePA soon, it can be used as security token to provide trusted identities. Authentication and identification are important building blocks in the protection of VoIP communication, keying material established during authentication can be used for further protection of the communication. This paper describes how identity cards can be integrated within SIP-based voice over IP telephony to reliably identify users and authenticate participants using as example the German ePA. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimations and Remedies for Quality of Experience in Multimedia Streaming

    Page(s): 11 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (530 KB) |  | HTML iconHTML  

    Managing multimedia network services in a User-centric manner provides for more delivered quality to the users, whilst maintaining a limited footprint on the network resources. For efficient User-centric management it is imperative to have a precise metric for perceived quality. Quality of Experience (QoE) is such a metric, which captures many different aspects that compose the perception of quality. The drawback of using QoE is that due to its subjectiveness, accurate measurement necessitates execution of cumbersome subjective studies. In this work we propose a method that uses Machine Learning techniques to build QoE prediction models based on limited subjective data. Using those models we have developed an algorithm that generates the remedies for improving the QoE of observed multimedia stream. Selecting the optimal remedy is done by comparing the costs in resources associated to each of them. Coupling the QoE estimation and calculation of remedies produces a tool for effective implementation of a User-centric management loop for multimedia streaming services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GlobaliD - Privacy Concerns on a Federated Identity Provider Associated with the Users' National Citizen's Card

    Page(s): 16 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (482 KB) |  | HTML iconHTML  

    Personal information sharing is one of the most common online activities. Most of the times we feel forced to give up about some privacy in order to share a piece of information with others. This paper reflects on the anonymity, integrity, privacy of users' personal information and it's scattering across the Web by taking an approach to digital identity management concept. Consequently it also reflects on the users' information certification and accountability. In this paper we purpose a Federated Identity Management solution for the Web to decrease the privacy issues and avoid the lost of anonymity that may occur when users exchange their particular information within web contexts. We will use a collection of publicly available strong identification mechanisms, such as the users (Portuguese) National Electronic Citizen Identity Card, and a Federated Identity initiative to create the GlobaliD, a Federated Identity Provider to address the previously mentioned reflections. Our aim with the development of GlobaliD is to take a step further in the digital identity management and therefore in the privacy and anonymity safety of the users identity Online by making it more versatile, responsible, trustworthy, integrity and privacy safe, anonym and thus secure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Activity Circle: Building a Bridge between Workflow Technology and Social Software

    Page(s): 22 - 27
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (258 KB) |  | HTML iconHTML  

    The paper proposes the Activity circle, a Social Visualization mechanism based on the concept of Social proxy. A Social proxy is a minimalist graphical representation that portrays socially salient aspects of users' interactions. The Activity circle aims to facilitate users in socializing how they perceive the accomplishment of their work activities when these are regulated by workflow management technologies. In particular, the social information visualized by the Activity circle should primarily facilitate people in sharing their attitudes toward used workflow technologies, secondly, this information should aim to create and maintain a common identity among co-workers. Third, it should facilitate the implementation of informal modes of control, i.e., attempts that workers locally make to informally regulate their behavior in order to reach the organization's goals. Finally, this information could also be used by management to understand how much the regulation of work, as imposed by technology, is accepted. The Activity circle will be integrated into novel forms of Workflow Management Systems, i.e., Workflow Management Social Systems, these systems are designed to enhance current workflow management technologies by taking into account socio psychological findings regarding the way people usually interact, in particular focusing on the nature of interactions when Social Visualization approaches are used. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gesture-Based Interaction: Concept Map and Application Scenarios

    Page(s): 28 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (926 KB) |  | HTML iconHTML  

    Nowadays new interaction forms are not limited by Graphical User Interfaces (GUIs) making Human Computer Interaction (HCI) more natural. This paper presents: a novel interaction approach within the scope of gesture-based interfaces, and some practical consequences of adopting this approach. Thus, we redefine the concept of gesture based on the sum of three interrelated concepts (the Para-language, the Body language and the Sound language). The relationships among these concepts are expressed in a conceptual map through parameterized links. Finally, the article shows how the combination of the link parameters yields to the definition of a specific application scenario. Thus, the result of the identification of these scenarios opens new horizons towards the identification of new ways of gesture-based interaction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Web Script-Based Method to Evaluate User Satisfaction of Mobile Services in the Field

    Page(s): 34 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1227 KB) |  | HTML iconHTML  

    Providing mobile services that ensure user satisfaction is one of the most crucial issues for telecommunication carriers and service providers. Traditionally, user satisfaction with the service, i.e., the Quality of Experience (QoE), has been assessed in a laboratory. However, a reliable QoE for a target mobile service in the context of actual use cannot be obtained by laboratory experiment. This paper proposes a novel Web script-based method that evaluates user satisfaction for waiting time of mobile services in the field. The proposed method has the following practical advantages. Since experimental conditions, especially communication conditions, can be simulated with a Web script, such as FlashLite, a subjective assessment can be conducted anywhere using the mobile terminal of the participant. Thus, QoE for a target mobile service in the field can easily be obtained. The main contribution of this paper is that we clarified that a subjective assessment system that implements the proposed Web script-based method is suitable for evaluating user satisfaction regarding waiting time where this time ranges from a few hundred milliseconds to a few seconds. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modulating Membership Grades to Gain Consensus for Fuzzy Set Uncertainty Values in a Clinical Decision Support System

    Page(s): 40 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (596 KB) |  | HTML iconHTML  

    This paper deals with a very important issue in any knowledge engineering discipline: the accurate representation and modelling of real life data and its processing by human experts. The work is applied to the GRiST Mental Health Risk Screening Tool for assessing risks associated with mental-health problems. The complexity of risk data and the wide variations in clinicians' expert opinions make it difficult to elicit representations of uncertainty that are an accurate and meaningful consensus. It requires integrating each expert's estimation of a continuous distribution of uncertainty across a range of values. This paper describes an algorithm that generates a consensual distribution at the same time as measuring the consistency of inputs. Hence it provides a measure of the confidence in the particular data item's risk contribution at the input stage and can help give an indication of the quality of subsequent risk predictions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring a Hybrid Approach for Modeling Context Awareness Using Analytic Hierarchy Process and Simulation

    Page(s): 46 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (391 KB) |  | HTML iconHTML  

    Existing research on context and context awareness has broadly focused on the technical aspects of context acquisition and interpretation of users' surroundings, also called physical or sensor-based context. Such an approach is lack of reconciling the user's perception of real-world context and a context-aware system's interpretation of that context. Using Analytic Hierarchy Process (AHP), we propose a hybrid approach that accounts for both user and physical context in defining an overall context awareness value. The model is validated using a simulation approach, which is valuable in that it examines and helps reduce the uncertainty in AHP to some extent. The results suggest several preliminary guidelines to determine representative measures of user and physical context in the design and evaluation of context-aware systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User-Centered Interface Reconfiguration for Error Reduction in Human-Computer Interaction

    Page(s): 52 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (386 KB) |  | HTML iconHTML  

    Human-computer interaction (HCI) is greatly influenced by findings in psychological research concerning interaction with complex technical processes. Psychological concepts like perception and comprehension of information, as well as projection of future system states can be summarized as situation awareness. Poor situation awareness can increase the probability of human error during interaction, caused by erroneous recall and interpretation of percept information through an interface that does not match the user's understanding and mental capabilities. Therefore, a new approach to human-centric reconfiguration of user interfaces will be presented to support situation awareness and, in this way, reduce human errors that occur during interaction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of Automated Dose-Dispensing System on Medication Management Process

    Page(s): 56 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (692 KB) |  | HTML iconHTML  

    Medication management process in a hospital includes all the work that is done concerning to a certain patient's medical treatment. According to international studies, the process is very prone to errors, which can cause adverse drug events and endanger the patient safety. In this paper, we will show how medication management process can be improved by a user-centric and computer-based automated dose-dispensing system. We will focus on the changes in medication management process, when the automated dose-dispensing system is implemented into practice. As a result of this implementation, we get a model for decision-making in medication management process and several benefits, like hygienic medication doses, smaller medication warehouses at wards and in the pharmacy. Additionally with the automated dose-dispensing system, pharmacists have to review patients' medication regimen before dispensing medications in order to identify possible interactions. However, during medication dispensing in the hospital pharmacy, error rate was discovered to be 0.36%. In wards the error rate was 0.013%. Regardless of these, the use reliability of the ADDS was noticed to be 100%. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secured Image Transmission Using Wavelets for Spread Spectrum Communication in a Remote Surveillance System

    Page(s): 61 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (634 KB) |  | HTML iconHTML  

    The paper deals with security implementation in remote unattended sites which employ sensor systems using versatile communication methods. The principles of security management are outlined. Then, the paper discusses some improvements in the methods for transmission of collected data and images in such areas to the remote monitoring site through wireless communication. Herein, data transmission without errors is important so as to avoid mistakes in understanding insecurity levels. While spread spectrum communication is a choice, additional encoding of the data for secrecy is a requirement. A method based on wavelets is useful for this purpose. Encoded data could be transmitted through frequency hopped spread spectrum communication. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method of Inferring the Preferences and Mood of Mobile Phone Users by Analyzing Pictograms and Emoticons Used in their Emails

    Page(s): 67 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (502 KB) |  | HTML iconHTML  

    As the ubiquitous communication environment advances, there is a demand for services that deliver the type of content appropriate for the preferences of the user. Services are already available that identify the user's preferences by analyzing his/her log information, and recommend items of content suitable for him/her. Methods of inferring the user's mood by partially analyzing pictograms frequently used in his/her emails have been proposed. In this paper, we extend such methods in order to enhance the accuracy of mood inference. Specifically, we propose a method of inferring the user's mood from emoticons, a set letters to form a face that graphically expresses the user's emotion, used in his/her multiple emails, and a method of identifying the user's preferences by analyzing pictograms that are used in his/her single email. We extract mood elements and preference elements and their intensities from pictograms and emoticons, and register them in respective databases. We developed a prototype system for evaluation. The study of the sample emails collected using this system confirmed the effectiveness of the proposed methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weight-Shifting Mobiles: Motion and Tilt in One-Dimensional Gravitational Displays

    Page(s): 73 - 76
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (387 KB) |  | HTML iconHTML  

    In this paper, we propose motion and tilt as an input technique for Weight-Shifting Mobiles, a recently proposed mobile interactive system that employs a moving center of gravity as an output channel. We present a prototype that combines weight actuation with accelerometer input. We discuss how motion- and tilt-based applications in current mobile devices can be enhanced through weight actuation, and, on the other hand, how weight-based output can be augmented through motion and tilt input. Furthermore, we point to new application spaces that arise from the proposed combination. We present a study in which we compared a button-based input technique and the proposed accelerometer-based input style for a weight-actuated system. We present three application scenarios: A supportive technique for graphical user interfaces, a gesture support scenario, and a balance actuation system. While the conducted user study did not reveal any quantitative differences in button- and accelerometer-based input, user comments indicate that motion and tilt are suitable, and in some cases even preferable, as an intuitive input for weight-based mobile interactions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Watermarking of MP3 File Using Psychoacoustic Auditory Model and FH SS/MFSK

    Page(s): 77 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (545 KB) |  | HTML iconHTML  

    A new technique for digital watermarking MP3 file is presented. A Psychoacoustic auditory model is applied to shape and insert the watermark waveform into the MP3 file. The strength of frequency hopping spread spectrum and multiple frequency-shift keying modulation is used to generate a robust digital watermark. Watermark recovery is performed in the absence of the original file. According to experimental tests, the proposed method not only shows a good resistance to different kinds of attacks either intentional or unintentional but also retains the perceptual quality of MP3 file. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Telecardiology for e-Diagnosis and e-Learning in Rural Area of Sabah, Malaysia: A Novel Approach for Cardiac Services in Rural Medicine

    Page(s): 83 - 88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (532 KB) |  | HTML iconHTML  

    Telecardiology is a newer alternative modality for providing effective cardiac care from a variable distances by utilizing information and information and communication technology. The cardiovascular diseases in rural population of Malaysia including Sabah are a leading cause of death. The scarcity of specialists, leads to delayed treatment, irregular follow up and ineffective monitoring. We aim to improve the cardiac care by telecardiology services. These services will be based on hybrid approach consisting of frequent tele consultations along with infrequent real regular follow up visits by physicians to evaluate clinical as well as diagnostic parameters. It will not only help us for early diagnosis, constant monitoring and quick remedial support, but will also prove to be cost effective alternative. These objectives were targeted. First, is to reduce the healthcare cost, followed by effective evaluation of tele cardiac tools (tele stethoscope and ECG) at variable distances and database for medical education. This novel approach will not only bridge the gap between rural and main hospitals, but will also provide the sense of security and emotional support amongst the patients. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prospects for Context Prediction Despite the Principle of Informational Self-Determination

    Page(s): 89 - 92
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (235 KB) |  | HTML iconHTML  

    Until now informational self-determination has not been examined in relation to context prediction. The right of users to decide whether or not and how they want their personal data to be used is not ensured. This paper analyses the problem by introducing the state of the art and application fields of context prediction with focus on the users' personal data. Subsequently, informational self-determination and the problems that arise if techniques of context prediction compete with informational self determination will be presented. Finally, possible solutions for overcoming these problems will be outlined. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.