52 results on '"Florian Michahelles"'
Search Results
2. Explainable Federated Learning: A Lifecycle Dashboard for Industrial Settings
- Author
-
Michael Ungersböck, Thomas Hiessl, Daniel Schall, and Florian Michahelles
- Subjects
Computational Theory and Mathematics ,Software ,Computer Science Applications - Abstract
As the adoption of Federated Learning (FL) in the manufacturing industry grows and systems get increasingly complex, a need to inspect their behavior arises. Stakeholders of the FL process want a more transparent system to understand the current state and analyze how its performance changed over time. However, current representation approaches are often not designed for industrial applications and do not cover the entire FL model lifecycle. We propose the Lifecycle Dashboard, which considers the different requirements and perspectives of industrial stakeholders by visualizing information from the FL server. In addition, our representation approach is generic enough to be applied to different use cases and industries. We evaluate the Lifecycle Dashboard in a semi-structured expert interview, show improvements in the understandability of FL systems, and discuss possible use cases in the industry.
- Published
- 2022
3. IoT-Enhanced Human Experience
- Author
-
Amit P. Sheth, Biplav Srivastava, and Florian Michahelles
- Subjects
Sustainable development ,Computer Networks and Communications ,Computer science ,business.industry ,Context (language use) ,02 engineering and technology ,010501 environmental sciences ,USable ,01 natural sciences ,World Wide Web ,0202 electrical engineering, electronic engineering, information engineering ,Special section ,020201 artificial intelligence & image processing ,The Internet ,business ,Internet of Things ,0105 earth and related environmental sciences ,Building automation - Abstract
The two articles in this special section represent ongoing Internet of Things applications in the context of Europe trying to make solutions usable to people in daily times.
- Published
- 2018
4. Pervasive Fabrication: Making Anything, Anywhere
- Author
-
Simon Mayer, Nadya Peek, and Florian Michahelles
- Subjects
Ubiquitous computing ,Fabrication ,Computational Theory and Mathematics ,Multimedia ,Computer science ,Special section ,Physical design ,User needs ,computer.software_genre ,computer ,Software ,Computer Science Applications - Abstract
The articles in this special section illustrates the wide range of ways in which pervasive fabrication technologies can contribute to producing physical artifacts that fulfill user needs in a more tailored and customized way than today’s mass production does. At the same time, they provide a glimpse of the future, where technology-informed and technology enabled making can address physical needs individually.
- Published
- 2021
5. Programming the World
- Author
-
Michael Beigl, Steve Hodges, Florian Michahelles, and H. Tokuda
- Subjects
Context-aware pervasive systems ,Ubiquitous computing ,General Computer Science ,Computer science ,business.industry ,Software development ,computer.software_genre ,Autonomic computing ,Utility computing ,Grid computing ,Human–computer interaction ,End-user computing ,business ,Software engineering ,Unconventional computing ,computer - Abstract
Computing evolution has brought about multiple paradigm shifts in how we use technologies. In the living laboratory that is modern life, our ability to design and control the computers and computing power of the future will require an ability to program systems and applications in situ and in vivo.
- Published
- 2017
6. Turn-by-Wire: Computationally Mediated Physical Fabrication
- Author
-
Florian Michahelles, Rundong Tian, Vedant Saran, Mareike Kritzler, and Eric Paulos
- Subjects
Fabrication ,Computer science ,Process (engineering) ,05 social sciences ,020207 software engineering ,02 engineering and technology ,Human control ,Workflow ,Computer control ,Embodied cognition ,Human–computer interaction ,0202 electrical engineering, electronic engineering, information engineering ,0501 psychology and cognitive sciences ,050107 human factors ,Haptic technology - Abstract
Advances in digital fabrication have simultaneously created new capabilities while reinforcing outdated workflows that constrain how, and by whom, these fabrication tools are used. In this paper, we investigate how a new class of hybrid-controlled machines can collaborate with novice and expert users alike to yield a more lucid making experience. We demonstrate these ideas through our system, Turn-by-Wire. By combining the capabilities of a traditional lathe with haptic input controllers that modulate both position and force, we detail a series of novel interaction metaphors that invite a more fluid making process spanning digital, model-centric, computer control, and embodied, adaptive, human control. We evaluate our system through a user study and discuss how these concepts generalize to other fabrication tools.
- Published
- 2019
7. Toward a web of systems
- Author
-
Florian Michahelles and Simon Mayer
- Subjects
Web standards ,medicine.medical_specialty ,Web development ,business.industry ,Computer science ,computer science ,Web application security ,Social Semantic Web ,World Wide Web ,Web Accessibility Initiative ,medicine ,General Earth and Planetary Sciences ,Semantic technology ,business ,Web intelligence ,Web modeling ,General Environmental Science - Abstract
Web and semantic technologies will form the foundation for ecosystems of machines that interact with each other and with people as never before.
- Published
- 2015
8. HoloInteractions
- Author
-
Simon Mayer and Florian Michahelles
- Subjects
0209 industrial biotechnology ,Computer science ,05 social sciences ,computer science ,Cognition ,02 engineering and technology ,Moment (mathematics) ,Web of Things ,020901 industrial engineering & automation ,Human–computer interaction ,Production (economics) ,0501 psychology and cognitive sciences ,Augmented reality ,Smart environment ,050107 human factors - Abstract
Production processes in factories increasingly involve dynamic interactions between individual manufacturing devices that allow processes to evolve and enable rapid reconfigurations for the mass-customization of products. When participating machines start to be aware of their own functionality, processes can even be dynamically reconfigured at run time. We propose a system that supports operators within such environments by enabling them to directly observe which devices interact with each other and what data is transmitted between them at any given moment, using computer-mediated reality technology. We demonstrate the application of this system in a goal-driven manufacturing use case and discuss its applicability to the monitoring of smart environments in users’ homes.
- Published
- 2017
9. An Open Semantic Framework for the Industrial Internet of Things
- Author
-
Florian Michahelles, Simon Mayer, Dan Yu, Mareike Kritzler, and Jack Hodges
- Subjects
0209 industrial biotechnology ,Computer Networks and Communications ,business.industry ,Computer science ,computer science ,02 engineering and technology ,Knowledge acquisition ,Social Semantic Web ,World Wide Web ,020901 industrial engineering & automation ,Semantic grid ,Artificial Intelligence ,Semantic computing ,0202 electrical engineering, electronic engineering, information engineering ,Semantic analytics ,Semantic technology ,020201 artificial intelligence & image processing ,Semantic Web Stack ,business ,Semantic Web - Abstract
This article introduces the Open Semantic Framework (OSF), a one-stop shop for creating and deploying semantic applications as well as their lifecycle management. The authors discuss how the OSF supports knowledge acquisition into semantic knowledge models via novel interface technologies, manages these models internally within core ontologies and pluggable knowledge packs, and provides moderated access to them via a REST API and prefabricated SPARQL queries. As an example of OSF's usage in a practical scenario, the authors show how it can increase worker safety in industrial settings by mitigating workplace safety hazards through the automatic insertion of safety-relevant actions directly in the workflow, based on a model of applicable workplace safety law and regulation. By facilitating the creation, integration, and provisioning of knowledge, the OSF represents an important step on the way to integrating knowledge models worldwide, enabling semantic applications globally to "stand on the shoulders of giants."
- Published
- 2017
10. Evaluation framework for social media brand presence
- Author
-
Florian Michahelles, Irena Pletikosa Cvijikj, and Erica Dubach Spiegler
- Subjects
Return on marketing investment ,Media management ,Knowledge management ,Digital marketing ,business.industry ,Communication ,Social media analytics ,Computer Science Applications ,Human-Computer Interaction ,Marketing management ,Social media optimization ,Media Technology ,Social media ,Business ,Marketing ,Marketing research ,Information Systems - Abstract
Social media have transformed the traditional marketing communication, resulting in companies evolving their customer approach and integrating social media into their marketing strategies. Although numerous examples of using social media platforms for marketing purposes exist, and despite the various efforts from the companies and the general popularity of the medium, measuring the effectiveness is elusive. An approach towards overcoming these challenges is examination of the activities undertaken by the companies and the consumers’ responses to them in the form of measurements and use of analysis tools. To contribute in this direction, we propose an evaluation framework that allows companies to perform social media analytics through continuous monitoring of the content and activities on their social media marketing channels, and to measure the effectiveness of social media utilization for marketing purposes. We describe the specific methods and illustrate the application of the proposed approach using a Facebook brand page case study. Finally, we discuss the benefits it brings to the companies.
- Published
- 2013
11. Research in the Large
- Author
-
Matthias Kranz, Lukas Murmann, and Florian Michahelles
- Subjects
Human-Computer Interaction ,World Wide Web ,Computer science ,Scale (social sciences) ,media_common.quotation_subject ,Context (language use) ,Payment ,App store ,media_common - Abstract
The adoption of NFC technology has taken longer than expected after its inception in 2004. Several projects on ticketing and payment are gaining momentum. However, the actual state of adoption of NFC is still unclear. As an alternative to consultants’ prediction (which mostly prove wrong), this paper describes a gamification-based approach to motivate users themselves to report on NFC tags they spotted in their environment. As part of a trading card context, users get rewarded with gadgets and points for documenting the existence of NFC technology in their environment. This paper describes the development of this game and the experiences of two release cycles. The paper concludes with lessons learned and provides an outlook on next steps.
- Published
- 2013
12. my2cents: enabling research on consumer-product interaction
- Author
-
Elgar Fleisch, Stephan Karpischek, and Florian Michahelles
- Subjects
Consumers ,Products ,Retail ,Shopping ,Barcode scanning ,Business model ,Service (business) ,Computer science ,Mobile computing ,Mobile apps ,Products, Retail ,Management Science and Operations Research ,Computer Science Applications ,World Wide Web ,Hardware and Architecture ,Product (category theory) ,other research area - Abstract
Personal and Ubiquitous Computing, 16 (6), ISSN:1617-4909, ISSN:1617-4917, ISSN:0949-2054
- Published
- 2011
13. Technology, Standards, and Real-World Deployments of the EPC Network
- Author
-
Mark E. Harrison, Christof Roduner, Christian Floerkemeier, Florian Michahelles, and Frédéric Thiesse
- Subjects
Supply chain management ,Computer Networks and Communications ,business.industry ,Computer science ,Supply chain ,Computer security ,computer.software_genre ,Electronic Product Code ,EPCglobal Network ,Enterprise system ,Data exchange ,Radio-frequency identification ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,business ,computer ,Electronic data interchange - Abstract
The EPC Network is a global RFID data sharing infrastructure based on standards that are built around the Electronic Product Code (EPC), an unambiguous numbering scheme for the designation of physical goods. The authors present the fundamental concepts and applications of the EPC Network, its integration with enterprise systems, and its functionality for data exchange between organizations in the supply chain.
- Published
- 2009
14. Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis
- Author
-
Florian Michahelles, Thomas Andersen, and Alexander Ilic
- Subjects
Database ,Exploit ,Computer Networks and Communications ,Computer science ,business.industry ,Interface (computing) ,Supply chain ,Visibility (geometry) ,Rule-based system ,computer.software_genre ,Data visualization ,Radio-frequency identification ,User interface ,business ,computer - Abstract
RFID technology tracks the flow of physical items and goods in supply chains to help users detect inefficiencies, such as shipment delays, theft, or inventory problems. An inevitable consequence, however, is that it generates huge numbers of events. To exploit these large amounts of data, the Supply Chain Visualizer increases supply-chain visibility by analyzing RFID data, using a mix of automated analysis techniques and human effort. The tool's core concepts include rule-based analysis techniques and a map-based representation interface. With these features, it lets users visualize the supply-chain structure, together with performance metrics, and detect problematic hot spots.
- Published
- 2009
15. Trust and Security in RFID-Based Product Authentication Systems
- Author
-
Mikko Lehtonen, Elgar Fleisch, and Florian Michahelles
- Subjects
Challenge-Handshake Authentication Protocol ,Engineering ,Computer Networks and Communications ,business.industry ,Access control ,Multi-factor authentication ,Computer security ,computer.software_genre ,Chip Authentication Program ,Computer Science Applications ,Control and Systems Engineering ,Authentication protocol ,Network Access Control ,Lightweight Extensible Authentication Protocol ,Electrical and Electronic Engineering ,Challenge–response authentication ,business ,computer ,Information Systems - Abstract
Product authentication is needed to detect counterfeit products and to prevent them from entering the distribution channels of genuine products. Security is a critical property of product authentication systems. In this paper, we study trust and security in RFID-based product authentication systems. We first present a formal definition for product authentication process and then derive the general chain of trust as well as functional and nonfunctional security requirements for product authentication. Most of the scientific literature that covers the topic focuses on cryptographic tag authentication only. This paper, however, provides a broader view including also other known approaches, most notably location-based authentication. To derive the functional security requirements, we employ the concept of misuse cases that extends the use case paradigm well known in the field of requirements engineering. We argue that the level of security of any RFID-based product authentication application is determined by how it fulfills the derived set of functional and nonfunctional requirements. The security of different RFID-based product authentication approaches is analyzed. To study how RFID supports secure product authentication in practice, we investigate how the current EPC standards conform to the functional security requirements of product authentication and show how the unaddressed requirements could be fulfilled. The benefits of implementing a service that detects the cloned tags in the level of the network's core services are identified.
- Published
- 2007
16. A connective fabric for bridging Internet of Things silos
- Author
-
Florian Michahelles, Erik Wilde, and Simon Mayer
- Subjects
World Wide Web ,Web of Things ,Bridging (networking) ,Information silo ,computer.internet_protocol ,business.industry ,Computer science ,Applications architecture ,computer science ,Service-oriented architecture ,Internet of Things ,business ,computer - Abstract
Social and socially-enabled applications have established themselves as a large and important set of scenarios that make sense in personal as well as in enterprise settings. However, it is still not clear how to best promote an open and extensible ecosystem of social applications. This makes it hard to design and implement applications that are good SOA citizens and can participate in an open and growing set of social interactions. Our work presents an architecture and implementation based on Activity Streams, which uses and slightly extends the format to work as a foundation for a SOA that allows applications to bridge vertical silos in the Internet of Things. In this paper, we discuss the application of our architecture in several different domains and our findings from mashing up applications across silos using Activity Streams. In addition to demonstrating the feasibility of this approach, we believe that our work can serve as illustration and guidance in the ongoing effort to standardize the next version of Activity Streams.
- Published
- 2015
17. Communicating and Interpreting Wearable Sensor Data with Health Coaches
- Author
-
Mareike Kritzler, Kimiko Ryokai, Suhaib Syed, and Florian Michahelles
- Subjects
Medical services ,Data visualization ,Multimedia ,business.industry ,Computer science ,Interface (computing) ,Wearable computer ,Context (language use) ,computer.software_genre ,business ,Interface design ,computer - Abstract
We present a pilot study, which investigates the role of activity data visualization in the context of interaction and communication with health coaches. The data is obtained from commercially available wearable wellness sensors such as Basis Watch, or Lumo Back. We studied how interface design's ability to synthesize and flexibly display data from wearable sensors help participants to understand their daily wellness related physical condition and activities. We also investigated how the interface enhances the communication between users and their health coaches. We discuss the implications for the design.
- Published
- 2015
18. Empirical Research through Ubiquitous Data Collection
- Author
-
A. S. Shrazi, Niels Henze, Florian Michahelles, Albrecht Schmidt, and Martin Pielot
- Subjects
Context-aware pervasive systems ,Ubiquitous robot ,Ubiquitous computing ,General Computer Science ,business.industry ,Computer science ,Mobile computing ,Mobile Web ,Human-centered computing ,Autonomic computing ,World Wide Web ,Context awareness ,Mobile search ,Mobile technology ,Smart environment ,Mobile telephony ,business ,Ubiquitous commerce - Abstract
Ubiquitous computing technologies enable new in situ data-collection opportunities that can reveal insights into mobile users' behaviors and preferences.
- Published
- 2013
19. Applying wearable sensors to avalanche rescue
- Author
-
Bernt Schiele, Florian Michahelles, Peter Matter, and Albrecht Schmidt
- Subjects
Situation awareness ,Wearable sensing ,Computer science ,General Engineering ,Wearable computer ,Computer security ,computer.software_genre ,Computer Graphics and Computer-Aided Design ,Field (computer science) ,Visualization ,Human-Computer Interaction ,Participatory evaluation ,Human–computer interaction ,Component (UML) ,Current technology ,computer - Abstract
We present a novel approach to enhance avalanche companion rescue using wearable sensing technologies. The time to find and extricate victims is most crucial: once buried by an avalanche, survival chances drop dramatically after the first 15 min. Current technology offers only information on the location of a single victim. Statistics show that in many cases there are multiple victims. In our research we address this issue and also investigate how the use of wearable sensors can further enhance such devices. We report on experiments using sensors to measure vital signs and environmental conditions and their suitability for avalanche rescue. Visualization for this type of application is addressed and two design sketches, both visualizing multiple victims and urgency, are presented. The architecture of current devices is extended by component to integrate these additional functions. We have developed a prototypical implementation of an avalanche beacon supporting multiple victims and visualisation of vital signs. This prototype was used for further experiments and offered a basis for participatory evaluation with practitioners in the field. A short overview thereof is presented.
- Published
- 2003
20. Detecting incorrect product names in online sources for product master data
- Author
-
Elgar Fleisch, Stephan Karpischek, and Florian Michahelles
- Subjects
Economics and Econometrics ,Computer science ,Supply chain ,media_common.quotation_subject ,Master data ,computer.software_genre ,Barcode ,Product master data ,law.invention ,law ,Management of Technology and Innovation ,Quality (business) ,Product (category theory) ,Business and International Management ,media_common ,Marketing ,Database ,Product names ,Supervised learning ,Data quality ,GTIN ,Computer Science Applications ,Correctness ,Quality assessment ,computer ,Data integration - Abstract
The global trade item number (GTIN) is traditionally used to identify trade items and look up corresponding information within industrial supply chains. Recently, consumers have also started using GTINs to access additional product information with mobile barcode scanning applications. Providers of these applications use different sources to provide product names for scanned GTINs. In this paper we analyze data from eight publicly available sources for a set of GTINs scanned by users of a mobile barcode scanning application. Our aim is to measure the correctness of product names in online sources and to quantify the problem of product data quality. We use a combination of string matching and supervised learning to estimate the number of incorrect product names. Our results show that approximately 2 % of all product names are incorrect. The applied method is useful for brand owners to monitor the data quality for their products and enables efficient data integration for application providers., Electronic Markets, 24 (2), ISSN:1019-6781, ISSN:1422-8890
- Published
- 2014
21. Switching the Role of NFC Tag and Reader for the Implementation of Smart Posters
- Author
-
Dirk Volland, Onur Kayikci, Lukas Ackermann, Kay Noyen, and Florian Michahelles
- Subjects
Information management ,Engineering ,Multimedia ,business.industry ,information management ,computer.software_genre ,Computer security ,Handset ,law.invention ,Near field communication ,law ,Smart Posters, NFC, Smartphone, Implementation, Voting Demo ,business ,computer ,Market penetration - Abstract
Benefits and opportunities of NFC technology have been discussed for many years. Continuous promises of handset manufacturers to embed this technology into their series of devices anytime soon have been fulfilled only partly so far. Contrasting with that, research and practice have outlined a number of applications that yield great attention among users. Among these applications are Smart Posters. However, the prevailing low market penetration of NFC-equipped smart phones poses a barrier for the implementation of many Smart Poster scenarios. Accordingly, for certain scenarios this paper proposes to switch the role between fixed tags and mobile phones by affixing mobile phones to posters and hand out the much cheaper tags to the users instead. The paper describes the approach and shows its feasibility by reporting lessons learned of a case study.
- Published
- 2012
22. Increasing Brand Attractiveness and Sales through Social Media Comments on Public Displays – Evidence from a Field Experiment in the Retail Industry
- Author
-
Florian Michahelles, Christian Hildebrand, and Erica Dubach Spiegler
- Subjects
Information management ,Attractiveness ,Product (business) ,business.product_category ,Social network ,business.industry ,Brand awareness ,information management ,Social media ,Advertising ,Interactive kiosk ,Digital signage ,business - Abstract
Retailers and brands are just starting to utilize online social media to support their businesses. Simultaneously, public displays are becoming ubiquitous in public places, raising the question about how these two technologies could be used together to attract new and existing customers as well as strengthen the relationship toward a focal brand. Accordingly, in a field experiment we displayed brand- and product-related comments from the social network Facebook as pervasive advertising in small-space retail stores, known as kiosks. From interviews conducted with real customers during the experiment and the corresponding analysis of sales data we could conclude three findings. Showing social media comments resulted in (1) customers perceiving brands as more innovative and attractive, (2) a measurable, positive effect on sales on both the brand and the product in question and (3) customers wanting to see the comments of others, but not their own, creating a give-and-take paradox for using public displays to show social media comments.
- Published
- 2012
23. GPS trajectory feature extraction for driver risk profiling
- Author
-
Johannes Paefgen, Thorsten Staake, and Florian Michahelles
- Subjects
Risk profiling ,External validity ,business studies ,Computer science ,Feature extraction ,Data mining ,computer.software_genre ,computer ,Gps trajectory - Abstract
In this paper we develop a method and relevant feature constructs for the measurement of accident risk exposure from a large sample of real-world GPS data that includes accident and accident-free drivers. For trip frequency and accumulated driven distance features, an evaluation of their discriminatory power is given based on computational results. In our conclusion, we briefly discuss suitable classification approaches and limitations arising from external validity considerations.
- Published
- 2011
24. Inferring Usage Characteristics of Electric Bicycles from Position Information
- Author
-
Florian Michahelles and Johannes Paefgen
- Subjects
Location technology ,Engineering ,business.industry ,media_common.quotation_subject ,Real-time computing ,High resolution ,Electric bicycle ,business studies ,Position (vector) ,Gps data ,Quality (business) ,business ,Simulation ,media_common - Abstract
This paper describes an experimental setup for the analysis of e-bike usage characteristics based on GPS data. Usage characteristics include parameters such as average and maximum velocity, trip lengths and distribution over daytime. Based on high resolution position measurement these parameters are extracted and compared to other studies on both e-bikes and conventional bicycles. We show that applying location technology to concurrent monitoring of a fleet of e-bikes yields higher quality in terms of resolution and accuracy (1), and is less intrusive (2) than obtaining these data by conventional user surveys. The findings form a proof-of-concept for the adoption of location technology to transportation and behavioral sciences and suggest further interdisciplinary collaboration in these fields.
- Published
- 2010
25. What can the internet of things do for the citizen? Workshop at pervasive 2010
- Author
-
Stephan Karpischek, Albrecht Schmidt, and Florian Michahelles
- Subjects
Ubiquitous computing ,business.industry ,Computer science ,Service provision ,Internet privacy ,Tipping point (climatology) ,Computer Science Applications ,World Wide Web ,Informatik ,Computational Theory and Mathematics ,Internet of Things ,business ,User innovation ,Software - Abstract
Approximately 25 researchers from Europe, Asia, and the US discussed applications and new challenges of linking networked objects reporting about their state, location, and conditions to mobile phones, networked appliances, and devices. Reports of several research projects yielded a consensus that simply building platforms and tools is not enough for doing successful research. Instead, research should target larger user bases and aim for larger-scale evaluations. Accordingly, discussions emerged about how to drive user adoption of research prototypes, when development transits from research to service provision, and a new notion of privacy where users who share their own data are be granted access to services that build on this data. The overall conclusion was that users no longer communicate only with people but also are empowered to interact with objects. The IoT was seen to reach a tipping point of not only embracing corporate users but also approaching the everyday user.
- Published
- 2010
26. An evaluation of product review modalities for mobile phones
- Author
-
Albrecht Schmidt, Felix von Reischach, Florian Michahelles, and Erica Dubach
- Subjects
Modalities ,Modality (human–computer interaction) ,Multimedia ,Computer science ,business.industry ,Mobile Web ,computer.software_genre ,World Wide Web ,Informatik ,Mobile phone ,Mobile search ,The Internet ,Product (category theory) ,business ,Mobile interaction ,computer - Abstract
Research has shown that product reviews on the Internet not only support consumers when shopping, but also lead to increased sales for retailers. Recent approaches successfully use smart phones to directly relate products (e.g. via barcode or RFID) to corresponding reviews, making these available to consumers on the go. However, it is unknown what modality (star ratings/text/video) users consider useful for creating reviews and using reviews on their mobile phone, and how the preferred modalities are different from those on the Web. To shed light on this we conduct two experiments, one of them in a quasi-realistic shopping environment. The results indicate that, in contrast to the known approaches, stars and pre-structured text blocks should be implemented on mobile phones rather than long texts and videos. Users prefer less and rather well-aggregated product information while on the go. This accounts both for entering and, surprisingly, also for using product reviews.
- Published
- 2010
27. Mobile claims assistance
- Author
-
Elgar Fleisch, Florian Michahelles, Tobias Ippisch, Sascha Roth, and Oliver Baecker
- Subjects
Information management ,Computer science ,business.industry ,Perspective (graphical) ,Internet privacy ,Mobile computing ,information management ,Mobile Web ,Computer security ,computer.software_genre ,Focus group ,Mobile Computing, Mobile Web Services, Prototype, Assistive Technologies, Emergency Response, Claims Management ,Enterprise system ,Asynchronous communication ,Order (business) ,business ,computer - Abstract
When it comes to vehicle accidents, people are stressed out and overstrained, even if it is just a car body damage and no one is hurt. They often lack adequate and immediate assistance and may worry about the lengthy and paper-based loss report to their insurance carrier. At the same time, it is crucial for insurance companies to receive early and detailed case circumstances in order to decrease costs and assist customers with value-added services. Against this background, we propose the usage of mobile phones in order to assist people in the aftermath of an accident. We present a concept for mobile claims assistance along with a proto-typical implementation that features an asynchronous communication between mobile phones and claims management enterprise systems based on mobile Web Services. Finally, we discuss the user perspective on mobile insurance applications and present data we collected using a combination of focus groups and user surveys.
- Published
- 2009
28. Evaluating mobile phones as risk information providers
- Author
-
Florian Michahelles and Stephan von Watzdorf
- Subjects
Service (systems architecture) ,Information providers ,Willingness to pay ,business.industry ,Computer science ,Order (business) ,Mobile phone ,Interface (computing) ,Internet privacy ,business - Abstract
Information about health, disease or environmental conditions is increasingly becoming available. We investigate the suitability of using mobile phones as an interface to provide information about risk-related events or conditions to the user. We approach the problem by conducting an online survey in order to match the requirements on a risk information service with the capabilities of the mobile phone and to evaluate different notification mechanisms, the usage frequency, and the influence of costs. Based on the results of the survey we confirm the suitability of the mobile phone to provide risk-related information as well as the user's willingness to pay for the service.
- Published
- 2009
29. Serialized TID numbers - A headache or a blessing for RFID crackers?
- Author
-
Antti Ruhanen, Mikko Lehtonen, Elgar Fleisch, and Florian Michahelles
- Subjects
Read-only memory ,Engineering ,Cloning (programming) ,business.industry ,Radio-frequency identification ,Clone (computing) ,Cryptography ,Cryptographic protocol ,business ,Computer security ,computer.software_genre ,computer ,Transponder - Abstract
Though transponder ID (TID) numbers of RFID tags were originally introduced to identify the chip model, serialized TID numbers are currently advertised as security features of UHF chips. Serialized TID numbers do not provide any cryptographic protection, but they do introduce a practical hurdle against adversaries who want to clone RFID tags today. Furthermore, serialized TID numbers are important for end-users who want to protect their current UHF tags from cloning since cryptographic tags are not yet commercially available in that frequency range. In this overview paper, we analyze the suitability of serialized TID numbers for security applications by evaluating the effort to bypass the TID check based on known vulnerabilities and we compare this effort to the needed level of protection in an example of anti-counterfeiting in the tobacco industry. The analysis illustrates that the practical hurdle of TID checks is not high enough for industrial-scale security applications and that it can completely diminish due to commodification of the RFID technology. However, end-users of security applications can still benefit from the increased tag cloning resistance that serialized TID numbers provide before migrating to more secure solutions.
- Published
- 2009
30. An Evaluation of Product Identification Techniques for Mobile Phones
- Author
-
Elgar Fleisch, Dominique Guinard, Robert Adelmann, Felix von Reischach, Albrecht Schmidt, and Florian Michahelles
- Subjects
Mobile identification number ,Multimedia ,business.industry ,Computer science ,Mobile computing ,Usability ,Mobile Web ,Wirtschaftswissenschaften ,computer.software_genre ,Camera phone ,Informatik ,Mobile phone ,Mobile search ,The Internet ,Mobile technology ,GSM services ,business ,computer - Abstract
Among others, consumer products can be purchased in the Internet and in traditional stores. Each of the two has dedicated advantages. An online survey conducted within the frames of this work investigates these advantages. It motivates the transition of the advantages of online shopping, such as access to recommendations of other consumers, to the sales floor. Recent trends in mobile phone technology, for example the emergence of the mobile Internet, enable exactly this transition, potentially enriching the shopping experience in the real world. A key challenge though is a fast and convenient identification of products. This work compares five product identification modalities for mobile phones in a comparative study. The dependent variables evaluated are ‘task completion time’ and ‘perceived ease of use’. Our study is the first that quantifies the advantage of automatic identification. The results indicate that automatically identifying a product scanning a tag can be up to eight times faster than entering a product name in a text field. Surprisingly, barcode recognition using a camera phone can be conducted almost as fast and convenient as scanning an RFID tag. Our work provides a benchmark for developers having to choose appropriate identification technology for their mobile application.
- Published
- 2009
31. Supporting a mobile lost and found community
- Author
-
Florian Michahelles, Oliver Baecker, and Dominique Guinard
- Subjects
Property (philosophy) ,business.industry ,Computer science ,Mobile computing ,Mobile Web ,Computer security ,computer.software_genre ,Electronic Product Code ,Business studies ,Software ,business studies ,Human–computer interaction ,Mobile search ,Mobile technology ,business ,computer - Abstract
In the era of ubiquitous devices and mobility, we increasingly carry objects of great value (in terms of data, money or emotions). Because of our increased mobility, we are also more inclined to lose these objects. When it comes to finding them again, current lost property offices seem rather inflexible and not fully adapted to our nomad lives. They lack dynamic information, introduce too many intermediates and induce high costs. We support the growth of a community of users able to solve the problem on their own using their mobile phones. We describe our concept and implementation of the idea based on prototypes of mobile phones enhanced with a novel type of RFID (Radio Frequency IDentifiaction) reader, the use of the EPC (Electronic Product Code) standards and the creation of both mobile and server-side software. We finally discuss how it can help making the current system more dynamic and efficient.
- Published
- 2008
32. Pervasive RFID and near field communication technology
- Author
-
John R. Williams, Frédéric Thiesse, Albrecht Schmidt, Florian Michahelles, and Publica
- Subjects
Information management ,Ubiquitous computing ,Computer science ,business.industry ,Computer security ,computer.software_genre ,Computer Science Applications ,Near field communication ,Identification (information) ,Informatik ,Pervasive technology ,Computational Theory and Mathematics ,Radio-frequency identification ,Near field communication technology ,Telecommunications ,business ,computer ,Software - Abstract
RFID was the most discussed topic at the Pervasive RFID/Near Field Communication Technology and Applications (PERTEC) workshop, held on March 19, 2007. Other topics discussed included management of data ownership in supply chains generated through RFID, integration of RFID and sensors, security and privacy, NFC applications, RFID-based location sensing, and emerging research challenges. RFID offers a huge variety of security approaches, starting from simple ID coding to lightweight cryptography and provide cost-effective solutions based on the value of products. RFID is a cheap, effective method to track many objects simultaneously, as well as it is unobtrusive and maintenance free. Other discussions at the conference centered on the value proposition of Near Field Communications (NFC) for end users and end-user innovation to build tools and infrastructure to allow users to use ubiquitous RFID tags.
- Published
- 2007
33. Editorial for MobiQuitous 2011 Special Issue
- Author
-
Florian Michahelles and Tao Gu
- Subjects
Multimedia ,Computer Networks and Communications ,Hardware and Architecture ,Computer science ,computer.software_genre ,Computer communication networks ,computer ,Software ,Information Systems - Published
- 2013
34. Mobile Ad Hoc Communication Issues in Ubiquitous Computing – The Smart-Its Experimentation Platforms
- Author
-
Stavros Antifakos, Frank Siegemund, Albrecht Schmidt, Florian Michahelles, Michael Beigl, and Hans-Werner Gellersen
- Subjects
Vehicular ad hoc network ,Ubiquitous computing ,Multimedia ,Adaptive quality of service multi-hop routing ,Computer science ,business.industry ,IMT Advanced ,Mobile broadband ,Mobile computing ,Mobile Web ,computer.software_genre ,Public land mobile network ,Mobile station ,Mobile search ,Mobile technology ,Telecommunications ,business ,computer - Abstract
As we become familiar with the idea of connecting PDAs, notebook PCs and wall-sized screens, as put forward in [1], ubiquitous computing in everyday environments creates yet new challenges for mobile ad-hoc networking. When looking at less powerful mobile and stationary devices that act as sensors or actors, new requirements for communication evolve.
- Published
- 2003
35. A Comprehensive Survey on Collaborative Data-access Enablers in the IIoT.
- Author
-
DANFENG SUN, JUNJIE HU, HUIFENG WU, JIA WU, JIAN YANG, SHENG, QUAN Z., and SCHAHRAM DUSTDAR
- Subjects
DEEP learning ,ONTOLOGIES (Information retrieval) ,ARTIFICIAL intelligence ,SCIENCE conferences ,COMPUTER science conferences ,TECHNICAL specifications ,SUPERVISORY control & data acquisition systems - Published
- 2024
- Full Text
- View/download PDF
36. Patterns in Motion: How Visual Patterns in Ads Affect Product Evaluations.
- Author
-
Farace, Stefania, Roggeveen, Anne, Villarroel Ordenes, Francisco, De Ruyter, Ko, Wetzels, Martin, and Grewal, Dhruv
- Subjects
ADVERTISING effectiveness ,CONSUMER goods ,MOTION ,ADVERTISING ,MANUFACTURED products - Abstract
This article contributes to research on advertising effectiveness by investigating the combined influence of ad headlines and visual patterns in the ad on consumer product evaluations. Headlines can convey motion (e.g., "move," "quick"); when the associated ad features a regular visual pattern, it evokes stronger product evaluations than if it depicts an irregular visual pattern. Thus, the way the advertised products are aligned visually represents critical decisions for ad designers. As Study 1 reveals, if the regular visual pattern of an advertisement combines with verbal information conveying motion, stronger product evaluations result compared with the use of an irregular visual pattern. Study 2 extends these findings by demonstrating that a regular pattern creates mental simulation, such that consumers imagine themselves experiencing the product, which mediates the relationship between visual patterns and product evaluations. Study 3 uses text mining and image annotation analyses to provide ecological validity for the findings, corroborating them in the context of brand messages on Twitter. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
37. Content Strategies for Digital Consumer Engagement in Social Networks: Why Advertising Is an Antecedent of Engagement.
- Author
-
Gavilanes, José Manuel, Flatten, Tessa Christina, and Brettel, Malte
- Subjects
ADVERTISERS ,ADVERTISING ,SOCIAL networks ,CUSTOMER relationship management ,STRATEGIC planning ,CONTENT analysis - Abstract
Advertisers need to optimize their efforts on social networks to engage consumers effectively. Existing literature on this topic has not yet explained how social network advertising (SNA) can be categorized into different content types and how to conceptualize and operationalize digital consumer engagement (DCE) in social networks. Thus, we derive seven content categories for social network advertising and a four-level model for DCE based on consumers' intermediate mind-set responses. We propose the impact of different SNA categories as an antecedent of DCE. Our results confirm a significant but unequal impact of at least four content categories on various engagement metrics. We therefore distill the successful content strategies and content attributes for specific types of engagement and confirm intermediate responses to advertising in a real market situation. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
38. Using text analytics to measure an effect of topics and sentiments on social-media engagement: Focusing on Facebook fan page of Toyota.
- Author
-
Chun, Heuiju, Leem, Byung-Hak, and Suh, Hyesun
- Subjects
SENTIMENT analysis ,TEXT messages ,SOCIAL media ,REGRESSION analysis ,GOAL (Psychology) ,DATA analysis - Abstract
In this study we investigate whether Facebook fan-page posting types and topics have a significant effect on engagement. More specifically, the media type and content theme of posting on Facebook are examined to see whether or not there was a difference between content topics. In order to achieve this goal, we set hypotheses as follows: (1) the media types of posting have a significant effect on engagement; (2) the topics and sentiment polarity of posting have a significant effect on engagement. We tested these hypotheses using research procedures as follows: (1) collection and preprocessing of social-media data, including posting types, comments, and reactions on Facebook fan pages, (2) topic modeling of fan-page postings using R and SAS, (3) testing hypotheses using a negative binomial regression model, and (4) implications and insights for social-media marketing. Topic modeling applying to textual data and sentiment analysis were conducted. After that, in order to find the factors to affect the number of Facebook fan-page engagements, the negative binomial regression model including post type, topic, sentiment, reactions of "love," "haha," and their interaction as exploratory variables was considered. Finally, the results show that post type is the most influential factor to affect social-media engagement, and content topics, sentiments of posts and comments also have significant effects on it. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
39. Incremental Hierarchical Clustering driven Automatic Annotations for Unifying IoT Streaming Data.
- Author
-
Balakrishna, Sivadi, Thirumaran, M., Solanki, Vijender Kumar, and Núñez-Valdez, Edward Rolando
- Subjects
ANNOTATIONS ,HIERARCHICAL clustering (Cluster analysis) ,CYBER physical systems ,DATA integration ,INTERNET of things - Abstract
In the Internet of Things (IoT), Cyber-Physical Systems (CPS), and sensor technologies huge and variety of streaming sensor data is generated. The unification of streaming sensor data is a challenging problem. Moreover, the huge amount of raw data has implied the insufficiency of manual and semi-automatic annotation and leads to an increase of the research of automatic semantic annotation. However, many of the existing semantic annotation mechanisms require many joint conditions that could generate redundant processing of transitional results for annotating the sensor data using SPARQL queries. In this paper, we present an Incremental Clustering Driven Automatic Annotation for IoT Streaming Data (IHC-AA-IoTSD) using SPARQL to improve the annotation efficiency. The processes and corresponding algorithms of the incremental hierarchical clustering driven automatic annotation mechanism are presented in detail, including data classification, incremental hierarchical clustering, querying the extracted data, semantic data annotation, and semantic data integration. The IHCAA- IoTSD has been implemented and experimented on three healthcare datasets and compared with leading approaches namely- Agent-based Text Labelling and Automatic Selection (ATLAS), Fuzzy-based Automatic Semantic Annotation Method (FBASAM), and an Ontology-based Semantic Annotation Approach (OBSAA), yielding encouraging results with Accuracy of 86.67%, Precision of 87.36%, Recall of 85.48%, and F-score of 85.92% at 100k triple data. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
40. An Open Semantic Framework for the Industrial Internet of Things.
- Author
-
Mayer, Simon, Hodges, Jack, Yu, Dan, Kritzler, Mareike, and Michahelles, Florian
- Subjects
SEMANTIC computing ,INTERNET of things ,INDUSTRIAL engineering ,KNOWLEDGE acquisition (Expert systems) ,EXPERT systems ,ONTOLOGIES (Information retrieval) - Abstract
This article introduces the Open Semantic Framework (OSF), a one-stop shop for creating and deploying semantic applications as well as their lifecycle management. The authors discuss how the OSF supports knowledge acquisition into semantic knowledge models via novel interface technologies, manages these models internally within core ontologies and pluggable knowledge packs, and provides moderated access to them via a REST API and prefabricated SPARQL queries. As an example of OSF's usage in a practical scenario, the authors show how it can increase worker safety in industrial settings by mitigating workplace safety hazards through the automatic insertion of safety-relevant actions directly in the workflow, based on a model of applicable workplace safety law and regulation. By facilitating the creation, integration, and provisioning of knowledge, the OSF represents an important step on the way to integrating knowledge models worldwide, enabling semantic applications globally to "stand on the shoulders of giants." [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
41. Design and Security impact on consumers' intention to use single platform E-payment.
- Author
-
P. C., LAI
- Subjects
CONSUMERS ,ELECTRONIC funds transfers ,SOCIAL responsibility of business ,DATA security ,QUANTITATIVE research - Abstract
This paper summarizes an explorative study of the novel design and security that contribute to consumers' adoption of an integrated, single platform payment system encompassing card, Internet and mobile technologies in the ASEAN. The attempt to survey these areas in an integrated fashion is a novel approach that differs from existing studies that mainly focus on adoption factors of these technologies in isolation as well as focuses on the novel design and the security elements. The empirical results from the quantitative analysis suggest that design, security, perceived usefulness as well as perceived ease of use are significant factors that contribute to consumers' intention to utilize a single platform payment System. Organizations will be able to utilize the study information for developing products and services that meet the consumers' single platform E-payment system while also fulfil their objective of corporate social responsibility. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
42. IoT - Internet of Things Architecture for Context Aware Sensors Data Processing in Waste Management Solution.
- Author
-
TOMA, Cristian and POPA, Marius
- Subjects
WASTE management ,INTERNET of things ,COMPUTER networks ,INFORMATION storage & retrieval systems ,CLOUD computing - Abstract
Internet of Things (IoT) refers interconnectivity of different devices and its increasing reasons aim Cloud Computing Services development, interconnectivity among personal smart devices and other devices, and significant development of the applications operate with this kind of connections and data provided by such connections. The biggest role is played by the devices with measuring capabilities helping the understanding of the world around by humans analyzing data generated in new points by these instruments. Data are securely stored and processes to be a viable source for real-time decisions. The paper provides an overview of this new data acquisitions paradigm together with short presentations of the communication protocols can be implemented in IoT infrastructure. Also, a possible solution architecture is provided for waste management. [ABSTRACT FROM AUTHOR]
- Published
- 2014
43. Brand Mentions in Social Media as a Key Performance Indicator in the German Fast Moving Consumer Goods Industry.
- Author
-
AZARKINA, Olga, KPOSSA, Monyédodo, and LICK, Erhard
- Subjects
BRAND name products ,SOCIAL media ,KEY performance indicators (Management) ,CONSUMER goods ,SALES ,STATISTICAL correlation - Abstract
This research aims to explore correlations between consumer-generated social media activity and the level of sales of German brands from the fast moving consumer goods industry. In particular, the objective was to examine whether there is a correlation between the number of brand mentions in social media and the sales of these products. The results indicate that the number of brand mentions and sales correlate positively in relation to products from the food and beverages category while this is not the case with respect to the non-food product category. Hence, marketers need to promote consumer-generated social media activity particularly for food and beverages. [ABSTRACT FROM AUTHOR]
- Published
- 2014
44. Advances in infrastructures and tools for multiagent systems.
- Author
-
Alberola, Juan, Botti, Vicent, and Such, Jose
- Subjects
MULTIAGENT systems ,INTELLIGENT agents - Abstract
An introduction is presented in which the editor discusses various reports within the issue on topics including advances on infrastructures and tools for multi agent system, Multi agent systems-based infrastructure for negotiation and its application and norm reasoning services.
- Published
- 2014
- Full Text
- View/download PDF
45. Research in the Large: Challenges for Large-Scale Mobile Application Research - A Case Study about NFC Adoption using Gamification via an App Store.
- Author
-
Kranz, Matthias, Murmann, Lukas, and Michahelles, Florian
- Published
- 2013
- Full Text
- View/download PDF
46. Moving recommender systems from on-line commerce to retail stores.
- Author
-
Walter, Frank, Battiston, Stefano, Yildirim, Mahir, and Schweitzer, Frank
- Subjects
CONSUMPTION (Economics) ,ECONOMIC demand ,SALES ,RETAIL stores ,ECONOMIC competition - Abstract
The increasing diversity of consumers' demand, as documented by the debate on the long tail of the distribution of sales volume across products, represents a challenge for retail stores. Recommender systems offer a tool to cope with this challenge. The recent developments in information technology and ubiquitous computing makes it feasible to move recommender systems from the on-line commerce, where they are widely used, to retail stores. In this paper, we aim to bridge the management literature and the computer science literature by analysing a number of issues that arise when applying recommender systems to retail stores: these range from the format of the stores that would benefit most from recommender systems to the impact of coverage and control of recommender systems on customer loyalty and competition among retail stores. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
47. WHAT IS THE INTERNET OF THINGS? AN ECONOMIC PERSPECTIVE.
- Author
-
Fleisch, Elgar
- Subjects
INTERNET & economics ,BUSINESS enterprises ,LEARNING curve ,WEB 2.0 ,FUZZY logic ,UBIQUITOUS computing ,AMBIENT intelligence ,SENSOR networks ,RADIO frequency identification systems - Abstract
In this paper, I tried to answer the question "What is the Internet of Things?" I did so by digesting a careful study of hundreds of applications that automatically or semi-automatically integrate real-world objects and places with the Internet. In the first step, I looked at the differences between Internet applications and applications that probably belong in the category of the IOT, mainly to sharpen my own understanding of what the unique features of an IOT would be and where IOT-specific challenges could be found. I identified six characteristics that suggest that integrating the real world with the Internet requires a new set of infrastructure building blocks. In the next part, I tried to group the IOT-applications to derive some common design-schemes. After several unsuccessful attempts, I started to look at the value drivers of each application, i.e., for each application I searched for the IOT-related root-cause of a benefit for businesses and users. I identified seven value drivers. Each investigated application used one or more of these value drivers. All value drivers were related to the reduction of the real world-virtual world transaction costs. Taking that as a starting point, I looked for the main economic energy of the IOT. The result of this endeavor suggests that the IOT will eventually provide management systems with low-cost, high-resolution data about the real world. The IOT therefore has the potential to become an MRI-technology for businesses and society, with all its attached advantages and drawbacks: it might become a tool that advances the entire discipline of how to manage organizations and complex systems. In the last section, I looked at some patterns in how companies make use of the IOT and found some intriguing observations that will hopefully help readers to shorten the learning curve of their organization. [ABSTRACT FROM AUTHOR]
- Published
- 2010
48. A STUDY ON INTERNET OF THINGS APPLICATIONS AND RELATED ISSUES
- Author
-
Kumar, Sandeep and Dalmia, Hemlata
- Subjects
IoT, Smart Cities, Smart Environment, Smart Industries & Smart Healthcare - Abstract
Day by day Internet of Things (IoT) has gained a great attention from research community because of the importance of IoT technology in human life. IoT is a smart system which consists of different type of sensors and real world application connected with each other through internet via wired or wireless network structure. The IoT makes the world smart in every aspects means IoT gives the information regarding the surrounding condition of things with the help of technology i.e. smart home, smart cities, smart transportation, smart industries, smart agriculture and smart environment etc. In this paper we study a different concept of IoT, various applications, Issues regarding IoT and Future Scope of IoT which will give the appropriate guidance and motivation to the research community to do the research in this field., {"references":["1.\tSaini, Harpreet Singh, and R. D. Daruwala. \"Human Machine Interface in Internet Of Things system.\" In Computing Communication Control and automation (ICCUBEA), 2016 International Conference on, pp. 1-4. IEEE, 2016. 2.\thttps://www.analyticsvidhya.com/blog/2016/08/10-youtube-videos-explaining-the-real-world-applications-of-internet-of-things-iot/ 3.\tKhan, Faraz. \"Future scope and possibilities in Internet of Things.\" In InInternational Conference on Advances in Engineering Science and Management, vol. 310. 2015. 4.\tVyas, Daiwat A., Dvijesh Bhatt, and Dhaval Jha. \"IoT: Trends, Challenges and Future Scope.\" (2015): 186-197. 5.\tMs. Yogita Pundir, Ms. Nancy Sharma, Dr. Yaduvir Singh, \"Internet of Things (IoT) : Challenges and Future Directions\" International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, No. 3, pp. 960-963, March 2016. 6.\tChase, Jim. \"The evolution of the internet of things.\" Texas Instruments, September 2013. 7.\tZeinab, Kamal Aldein Mohammed, and Sayed Ali Ahmed Elmustafa. \"Internet of Things Applications, Challenges and Related Future Technologies.\" World Scientific News, Vol. 2, No. 67, pp. 126-148, 2017. 8.\tWu, Miao, Ting-Jie Lu, Fei-Yang Ling, Jing Sun, and Hui-Ying Du. \"Research on the architecture of Internet of things.\" In 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), pp. 479-484, 2010. 9.\tUckelmann, Dieter, Mark Harrison, and Florian Michahelles. \"An architectural approach towards the future internet of things.\" In Architecting the internet of things, pp. 1-24. Springer Berlin Heidelberg, 2011. 10.\tSarma, Amardeo C., and João Girão. \"Identities in the future internet of things.\" Wireless personal communications, Vol. 49, No. 3, pp. 353-363, 2009. 11.\tHernández-Muñoz, José M., Jesús Bernat Vercher, Luis Muñoz, José A. Galache, Mirko Presser, Luis A. Hernández Gómez, and Jan Pettersson. \"Smart cities at the forefront of the future internet.\" In The Future Internet Assembly, pp. 447-462. Springer, Berlin, Heidelberg, 2011. 12.\tGluhak, Alexander, Srdjan Krco, Michele Nati, Dennis Pfisterer, Nathalie Mitton, and Tahiry Razafindralambo. \"A survey on facilities for experimental internet of things research.\" IEEE Communications Magazine, Vol. 49, No. 11, 2011. 13.\tAgrawal, Sarita, and Manik Lal Das. \"Internet of Things—A paradigm shift of future Internet applications.\" In IEEE International Conference on Nirma University Engineering (NUiCONE), pp. 1-7, 2011. 14.\tAtzori, Luigi, Antonio Iera, and Giacomo Morabito. \"The internet of things: A survey.\" Computer networks, Vol. 54, No. 15, pp. 2787-2805, 2010. 15.\tBotta, Alessio, Walter De Donato, Valerio Persico, and Antonio Pescapé. \"Integration of cloud computing and internet of things: a survey.\" Future Generation Computer Systems, Vol. 56, pp. 684-700, 2016. 16.\tBandyopadhyay, Soma, Munmun Sengupta, Souvik Maiti, and Subhajit Dutta. \"Role of middleware for internet of things: A study.\" International Journal of Computer Science and Engineering Survey, Vol. 2, No. 3, pp. 94-105, 2011. 17.\tSingh, Dhananjay, Gaurav Tripathi, and Antonio J. Jara. \"A survey of Internet-of-Things: Future vision, architecture, challenges and services.\" In IEEE International world forum on Internet of things (WF-IoT) , pp. 287-292, 2014. 18.\tBandyopadhyay, Soma, Munmun Sengupta, Souvik Maiti, and Subhajit Dutta. \"A survey of middleware for internet of things.\" In Recent trends in wireless and mobile networks, pp. 288-296. Springer, Berlin, Heidelberg, 2011. 19.\tPatton, Mark, Eric Gross, Ryan Chinn, Samantha Forbis, Leon Walker, and Hsinchun Chen. \"Uninvited connections: a study of vulnerable devices on the internet of things (IoT).\" In IEEE International Conference on Intelligence and Security Informatics Conference (JISIC), pp. 232-235, 2014. 20.\tDatta, Soumya Kanti, Rui Pedro Ferreira Da Costa, and Christian Bonnet. \"Resource discovery in Internet of Things: Current trends and future standardization aspects.\" In IEEE 2nd World Forum on Internet of Things (WF-IoT), pp. 542-547, 2015. 21.\tRazzaque, Mohammad Abdur, Marija Milojevic-Jevric, Andrei Palade, and Siobhán Clarke. \"Middleware for internet of things: a survey.\" IEEE Internet of Things Journal, Vol. 3, No. 1, pp. 70-95, 2016."]}
- Published
- 2017
- Full Text
- View/download PDF
49. Empirical Research through Ubiquitous Data Collection.
- Author
-
Henze, Niels, Shrazi, Alireza Sahami, Schmidt, Albrecht, Pielot, Martin, and Michahelles, Florian
- Subjects
UBIQUITOUS computing ,COMPUTER science ,INFORMATION technology ,COMPUTER users ,COMPUTER programming - Abstract
Ubiquitous computing technologies enable new in situ data-collection opportunities that can reveal insights into mobile users' behaviors and preferences. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
50. Intelligent Transportation Cyber Physical system toward Comfort and Safety perspective using Fuzzy Logic.
- Author
-
P.Sri Sindhuja Selvanayaki and Vishnu KumarKaliappan
- Published
- 2019
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.