Providing user context for mobile and social networking applications

被引:40
|
作者
Santos, Andre C. [1 ]
Cardoso, Joao M. P. [2 ]
Ferreira, Diogo R. [1 ]
Diniz, Pedro C. [1 ]
Chainho, Paulo [3 ]
机构
[1] Univ Tecn Lisboa, IST, P-2744016 Porto Salvo, Portugal
[2] Univ Porto, Fac Engn, P-4200465 Oporto, Portugal
[3] PT Inovacao SA, P-2780920 Porto Salvo, Portugal
关键词
Context-aware services; Context inference; Mobile applications; Wearable sensors; Decision trees; Social networking;
D O I
10.1016/j.pmcj.2010.01.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The processing capabilities of mobile devices coupled with portable and wearable sensors provide the basis for new context-aware services and applications tailored to the user environment and daily activities. In this article, we describe the approach developed within the UPCASE project, which makes use of sensors available in the mobile device as well as sensors externally connected via Bluetooth to provide user contexts. We describe the system architecture from sensor data acquisition to feature extraction, context inference and the publication of context information in web-centered servers that support well-known social networking services. In the current prototype, context inference is based on decision trees to learn and to identify contexts dynamically at run-time, but the middleware allows the integration of different inference engines if necessary. Experimental results in a real-world setting suggest that the proposed solution is a promising approach to provide user context to local mobile applications as well as to network-level applications such as social networking services.(C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:324 / 341
页数:18
相关论文
共 50 条
  • [1] Mobile Social Networking Applications
    Jabeur, Nafaa
    Zeadally, Sherali
    Sayed, Biju
    [J]. COMMUNICATIONS OF THE ACM, 2013, 56 (03) : 71 - 79
  • [2] Mobile Context Provider for Social Networking
    Santos, Andre C.
    Cardoso, Joao M. P.
    Ferreira, Diogo R.
    Diniz, Pedro C.
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009 WORKSHOPS, 2009, 5872 : 464 - +
  • [3] Mining context history for generating user models for proactive personalized mobile networking applications
    An, Wei
    Liu, Qihua
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 638 - +
  • [4] An Architecture for Mobile Social Networking Applications
    Rana, Juwel
    Kristiansson, Johan
    Hallberg, Josef
    Synnes, Kare
    [J]. 2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, : 241 - +
  • [5] Challenges for Mobile Social Networking Applications
    Rana, Juwel
    Kristiansson, Johan
    Hallberg, Josef
    Synnes, Kare
    [J]. COMMUNICATIONS INFRASTRUCTURE: SYSTEMS AND APPLICATIONS IN EUROPE, 2009, 16 : 275 - +
  • [6] User Time Spent between Persuasiveness and Usability of Social Networking Mobile Applications: Patterns of Influence
    Bedjaoui, Mohammed
    Elouali, Nadia
    Benslimane, Sidi Mohamed
    [J]. HUCAPP: PROCEEDINGS OF THE 15TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER VISION, IMAGING AND COMPUTER GRAPHICS THEORY AND APPLICATIONS, VOL 2: HUCAPP, 2020, : 35 - 44
  • [7] Harnessing the Cloud for Mobile Social Networking Applications
    Rana, Juwel
    Hallberg, Josef
    Synnes, Kare
    Kristiansson, Johan
    [J]. INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2010, 2 (02) : 1 - 11
  • [8] Diverse Social Networking Applications and Adaptive Mobile Networks
    Zhang, Shunliang
    Wu, Yi
    Qiu, Ping
    [J]. PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 1204 - 1208
  • [9] Forensic analysis of social networking applications on mobile devices
    Al Mutawa, Noora
    Baggili, Ibrahim
    Marrington, Andrew
    [J]. DIGITAL INVESTIGATION, 2012, 9 : S24 - S33
  • [10] Analyzing Privacy Designs of Mobile Social Networking Applications
    Chen, Guanling
    Rahman, Faruq
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 83 - 88