Who, What, When, Where, How: Design Issues of Capture & Access Applications.
One of the general themes in ubiquitous computing is the construction of devices and applications to support the automated capture of live experiences and the future access of those records. Over the past five years, our research group has developed over half a dozen different capture and access applications. In this paper, we present an overview of eight of these applications. We discuss the different design issues encountered while creating each of these applications and share our approaches to solving these issues (in comparison and in contrast with other work found in the literature). From these issues we define the large design space for automated capture and access. This design space may then serve as a point of reference for designers to extract the requirements for systems to be developed in the future.
[Show abstract] [Hide abstract] ABSTRACT: Resumo Captura e Acesso é um tema de pesquisa recorrente em Computação Ubíqua, que versa sobre o registro de conteúdo multimídia para posterior disponibilização e acesso. No âmbito acadêmi-co, seu uso permite a automatização de atividades educacionais, colaborando com processos de ensino e aprendizagem e criando Ambientes Educacionais Ubíquos. Nesse contexto, esta pes-quisa buscou explorar o impacto de uma plataforma educacional ubíqua denominada Classroom eXperience (CX), cujo uso por turmas de cursos de graduação e pós-graduação foi acompa-nhado ao longo de quatro semestres letivos. Variáveis de desempenho e assiduidade foram coletadas e analisadas empregando-se técnicas estatísticas para a certificação dos dados obti-dos. Também foram reunidas impressões gerais dos usuários durante o uso do sistema. Como resultado, observou-se que o uso do sistema propiciou aumento de desempenho tanto nas tur-mas de graduação quanto nas de pós-graduação, sendo maior nas primeiras. A assiduidade dos alunos de ambas as vertentes não sofreu mudanças expressivas entre turmas que tiveram ou não contato com a aplicação. Os estudantes informaram que prestaram mais atenção nas explica-ções dos professores que usaram o sistema durante as aulas, justificando que não precisaram anotar tudo o que foi escrito e puderam concentrar-se no conteúdo exposto. Além disso, decla-raram que a gravação das aulas não os desestimulou a frequentarem as disciplinas presencial-mente, encorajando-os a estudarem mais. Abstract Capture and Access is a recurring theme of research in Ubiquitous Computing, which comprises the recording multimedia content for later provision and access. In academic scope, its use allows the automation of educational activities, collaborating with teaching and learning processes and creating Ubiquitous Learning Environments. In this context, this study aimed to explore the impact of a ubiquitous learning platform called Classroom eXperience (CX), which usage by groups of undergraduate and graduate students was monitored over four semesters. Variables such as user performance and attendance were collected and analyzed employing statistical techniques for data certification. General impressions from students were also gathered. As a result, system usage resulted in a performance increase for both undergraduate and graduate students, being higher among the former ones. Student attendance suffered no significant changes either for those who have or have not had contact with the platform. Students reported they were able to pay more attention to explanations of instructors who used the system during classes, justifying they did not need to annotate everything written by the instructor and could concentrate on content displayed. In addition, they declared content recording did not discourage their attendance, but rather incited them to study more.0Comments 0Citations
- "Atualmente , o CX utiliza sete dimensões de contexto: a) tipo de dispositivo, b) velocidade de conexão, c) resolução da tela, d) data e hora de acesso, e) tempo disponível, f) local de origem do acesso e g) motivo do usuário acessar o sistema. Dessas, as quatro primeiras são aferidas automaticamente pelo sistema, enquanto as três últimas precisam ser informadas pelo usuário por meio do mini formulário de contexto presente na Figura 2. A definição das sete dimensões de contexto supracitadas seguiu a proposta de Truong et al.  , que estabeleceu um conjunto de questões a serem consideradas para o desenvolvimento de módulos contextuais para aplicações de C&A. Como foge do escopo desse artigo discutir com maiores detalhes o mapeamento das dimensões de contexto e sua utilização para personalização do acesso ao conteúdo capturado, mais informações podem ser encontradas em Araújo et al.  e Ferreira et al. . "
[Show abstract] [Hide abstract] ABSTRACT: This paper focuses on problems of access control for business processes. The subject of the paper is a specification of the Context-sensitive access control model for business processes (COBAC). In order to efficiently define and enforce access control for different business processes, the COBAC model is based on the RBAC (Role-based Access Control) model which is extended with the following entities: context, business process, activity and resource category. By using a context-sensitive access control it is possible to define more complex access control policies whose implementation by existing access control models for business processes is not possible or is very complicated. The COBAC's context model can describe rich context information and can be easily extended for specific cases. The introduction of business process and activity entities has facilitated the definition of access control policies for business processes. The categorization of resources enables the definition of access control policies for whole resource categories, and thus, potentially, reduces the number of policies which need to be defined. The COBAC model is applicable in different business information systems, and supports the definition of access control policies for both simple and complex business processes. The model is verified by a case study on a real business process.0Comments 3Citations
- "Two basic classes of the context model (seeFigure 4) are Actually, the context expression describes events that took place and the conditions under which these events occurred. We extend five semantic dimensions defined in   ( " who " , " what " , " where " , " when " and " how " ) with the notion " why " which defines the purpose, and with the notion " related " which defines the relation between different context expressions. We also define two specializations of the " what " concept. "
[Show abstract] [Hide abstract] ABSTRACT: Access control is one of key aspects of computer security. Current access control models do not take into account the context of the system and its environment. In this paper, we present a particular context model for the access control system primarily-intended for business processes access control. By using a context-sensitive access control, it is possible to define more sophisticated access control policies that cannot be implemented by existing access control models. The proposed context is modeled using Web Ontology Language (OWL) in order to provide: formal representation of context, rich representation of different contextual information, semantic interoperability between different context-aware systems and high degree of inference making.0Comments 0Citations
- "Actually, the context expression describes events that took place and the conditions under which these events occurred. We extend five semantic dimensions defined in [20, 21] ( " who " , " what " , " where " , " when " and " how " ) with the notion " why " which defines the purpose and with the notion " related " which defines the relation between different context expressions. We also define two specializations of the " what " concept. "
This is a chronological chart of Jesus' healings found in the Gospels. Scholars divide healings into types or groups: exorcisms, physical healings, resurrections, environment, economy, accidents, and relationships. See if you can classify each healing below. As you study the context of each healing, please note the "who, what, when, where, why, and how" of each event