In this paper, we present the VibrationCap system and its evaluation. Two main contributions are made. First, we provide recommendations for wearable-and technology-design of head-worn vibration displays. Second, we s...
详细信息
ISBN:
(纸本)9781450351881
In this paper, we present the VibrationCap system and its evaluation. Two main contributions are made. First, we provide recommendations for wearable-and technology-design of head-worn vibration displays. Second, we study how accurately individual vibrations can be localized on the head, depending on their position. The VibrationCap is an unobtrusive, inconspicuous, wireless head-worn vibration display completely integrated into a regular beanie. We use 19 vibration motors to apply vibrations of varying duration to predefined locations of the head. Using this prototype, we conducted a study with 20 participants on the ability to locate vibrations applied to small areas (ca. 1 cm(2)) of the head. We show that depending on the region, the ability to locate vibration can vary significantly. With this data we created a vibrotactile localization accuracy mapping of the human head.
In distributed simulation, the purpose of multi-resolution methods is to allow simulation integration getting consis- tent views of different resolutions. In these methods, chal- lenges in the treatment of aggregation...
详细信息
Presently, the majority of the software development organizations are adopting the phenomena of Global Software Development (GSD), mainly because of the significant return on investment it produces. However, GSD is a ...
详细信息
ISBN:
(纸本)9781450344869
Presently, the majority of the software development organizations are adopting the phenomena of Global Software Development (GSD), mainly because of the significant return on investment it produces. However, GSD is a complex phenomenon and there are many challenges associated with it, especially that related to Software Process Improvement (SPI). The aim of this work is to identify humans' related factors that can positively impact the SPI process in GSD organizations and proposed a hypothetical framework of the identified success factors in relation to SPI implementation. We have adopted the Systematic Literature Review (SLR) method in order to identify the success factors. Using the SLR approach, total ten success factors were identified. The paper also reported the Critical Success Factors (CSFs) for SPI implementation following the criteria of the factors having a frequency ≥ 50% as critical. Our results reveal that five out of ten factors are critical for SPI program. Based on the analysis of the identified success factors, we have presented a hypothetical framework that has highlighted an association between the identified success factors and the implementation of the SPI program in GSD environment. Copyright 2017 acm.
This paper makes experimental evaluations that involve the allocation of virtual machines in a cloud environment. Virtual machine allocation is an open research field in cloud, which can lead to the best performance f...
详细信息
Location-based social apps have been widely used by people to share their location information with friends. These apps provide rich spatial-temporal information for researchers to investigate user activity patterns. ...
详细信息
ISBN:
(纸本)9781450351904
Location-based social apps have been widely used by people to share their location information with friends. These apps provide rich spatial-temporal information for researchers to investigate user activity patterns. In this work, we collect check-in data from Swarm, and analyze the user behavior in a way of combining spatial and temporal features of check-ins. The results reveal users' different preferences for venue categories in different time of the day. Our work presents activity patterns of human behavior and the distinctions of life habits among three cities, Hong Kong, New York City, and San Francisco. Our findings can be further applied to Swarm's incentive mechanism and recommendation systems.
The growing use of social networks and photo sharing services produces a large volume of photos available on the Internet. This is also true for geo-tagged photos sharing services, in which users share trip photos wit...
详细信息
Smart metering is an essential feature of smart grids, allowing residential customers to monitor and reduce electricity costs. Devices called smart meters allows residential customers to monitor and reduce electricity...
详细信息
ISBN:
(纸本)9781450344869
Smart metering is an essential feature of smart grids, allowing residential customers to monitor and reduce electricity costs. Devices called smart meters allows residential customers to monitor and reduce electricity costs, promoting energy saving, demand management, and energy efficiency. However, monitoring a households' energy consumption through smart meters poses serious privacy threats, and have thus become a major privacy issue. Hence, a significant amount of research has appeared recently with the purpose of providing methods and mechanisms to reconcile smart metering technologies and privacy requirements. However, most current approaches fall short in meeting one of several of the requirements for privacy preserving smart metering systems. In this paper we show how Intel SGX technology can be used to provide a simple and general solution for the smart metering privacy problem that meets all these requirements in a satisfactory way. Moreover, we present also an implementation of the proposed architecture as well as a series of experiments that have been carried out in order to assess how the proposed solution performs in comparison to a second implementation of the architecture that completely disregards privacy issues.
The availability of powerful smartphones and the necessity of security in mobile devices have made researchers propose multiple security modes (e.g., home, office, outdoor, and financial) for such devices. In each mod...
详细信息
ISBN:
(纸本)9781450344869
The availability of powerful smartphones and the necessity of security in mobile devices have made researchers propose multiple security modes (e.g., home, office, outdoor, and financial) for such devices. In each mode, a user can install a different set of apps. However, in most of the cases, the user has to select the mode manually. If we can sense the smartphone's security context accurately, then it is possible to switch between different security modes automatically. Also, smartphone operating systems are becoming ubiquitous. As a result, mobile apps need to behave differently based on the security context (e.g., not sending the data if the network is insecure). There exist other research work that may detect the physical context of a smartphone. However, we focus on sensing different security parameters (e.g., location, is-network-encrypted) and calculating the security context from the parameters. In this paper, we propose Flamingo, a security context management framework that maintains a cache of security contexts and parameters to be used by the operating system and third-party applications. As detecting contexts requires the use of power-hungry smartphone sensors, a comprehensive framework for sharing security parameters among various applications can be beneficial in terms of energy and other resource expenses. The implementation of Flamingo as a part of the Android operating system shows that it is effective in managing security contexts and parameters. Copyright 2017 acm.
Smart spammers and telemarketers circumvent the standalone spam detection systems by making low rate spamming activity to a large number of recipients distributed across many telecommunication operators. The collabora...
详细信息
The concept of networks has been important in the study of complex systems. In networks, links connect pairs of nodes forming complex structures. Studies have shown that networks not only contain structure but may als...
详细信息
暂无评论