000 14063cam a2200901 a 4500
001 ocn826895898
003 OCoLC
005 20240523125535.0
006 m o d
007 cr cnu---unuuu
008 130207s2013 enka ob 001 0 eng d
040 _aN$T
_beng
_epn
_cN$T
_dEBLCP
_dMHW
_dE7B
_dCDX
_dOCLCO
_dYDXCP
_dDG1
_dIDEBK
_dOCLCF
_dOCLCQ
_dUKDOC
_dOCLCQ
_dHEBIS
_dDEBSZ
_dDEBBG
_dOCLCQ
_dCOO
_dOCLCQ
_dDG1
_dCOCUF
_dDG1
_dLIP
_dOCLCQ
_dMERUC
_dOCLCQ
_dZCU
_dU3W
_dMERER
_dCUY
_dOCLCQ
_dCEF
_dICG
_dVTS
_dOCLCQ
_dINT
_dOCLCQ
_dDKC
_dOCLCO
_dOCLCQ
_dUKAHL
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
019 _a829910915
_a830814144
_a960203245
_a961511742
_a969521412
020 _a9781118578209
_q(electronic bk.)
020 _a1118578201
_q(electronic bk.)
020 _a1118580974
_q(electronic bk.)
020 _a9781118580974
_q(electronic bk.)
020 _z9781848214378
020 _z1848214375
020 _z9781299139893
020 _z1299139892
029 1 _aAU@
_b000051628967
029 1 _aAU@
_b000058063344
029 1 _aAU@
_b000060074115
029 1 _aCHNEW
_b000599451
029 1 _aCHNEW
_b000941112
029 1 _aCHVBK
_b480213844
029 1 _aDEBBG
_bBV041911131
029 1 _aDEBBG
_bBV044172534
029 1 _aDEBSZ
_b43132204X
029 1 _aDEBSZ
_b485031329
029 1 _aDKDLA
_b800010-katalog:99122713704705763
029 1 _aNZ1
_b14873582
029 1 _aNZ1
_b15341081
035 _a(OCoLC)826895898
_z(OCoLC)829910915
_z(OCoLC)830814144
_z(OCoLC)960203245
_z(OCoLC)961511742
_z(OCoLC)969521412
037 _a445239
_bMIL
050 4 _aQA76.9.A48
072 7 _aCOM
_x034000
_2bisacsh
072 7 _aCOM
_x079010
_2bisacsh
072 7 _aCOM
_2eflch
082 0 4 _a004.019
_223
049 _aMAIN
245 0 0 _aComputer science and ambient intelligence /
_cedited by Ga�elle Calvary [and others].
260 _aLondon :
_bISTE ;
_aHoboken, N.J. :
_bWiley,
_c2013.
300 _a1 online resource :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aISTE
504 _aIncludes bibliographical references and index.
588 0 _aPrint version record.
520 _aThis book focuses on ambient intelligence and addresses various issues related to data management, networking and HCI in this context. Taking a holistic view, it covers various levels of abstraction, ranging from fundamental to advanced concepts and brings together the contributions of various specialists in the field. Moreover, the book covers the key areas of computer science concerned with the emergence of ambient intelligence (e.g. interaction, middleware, networks, information systems, etc.). It even goes slightly beyond the borders of computer science with contributions related t.
505 0 0 _gMachine generated contents note:
_gch. 1
_tAmbient Intelligence: Science or Fad? /
_rJames L. Crowley --
_g1.1.
_tAmbient intelligence: still young at 20 years --
_g1.2.
_tstep forward in the evolution of informatics --
_g1.2.1.
_tFifty years ago: the computer as an isolated critical resource --
_g1.2.2.
_tThirty years ago: the user at the center of design --
_g1.2.3.
_tpast decade: combining physical, social, and digital worlds --
_g1.3.
_tExtreme challenges --
_g1.3.1.
_tMulti-scale --
_g1.3.2.
_tHeterogeneity --
_g1.3.3.
_tDynamic adaptation --
_g1.4.
_tConclusion --
_g1.5.
_tBibliography --
_gch. 2
_tThinking about Ethics /
_rAnne-Marie Benoit --
_g2.1.
_tEthics and fundamental rights --
_g2.2.
_tEthics and values --
_g2.3.
_tEthics and future perspectives --
_g2.4.
_tBibliography --
_gch. 3
_tSensor Networks /
_rDavid Simplot-Ryl --
_g3.1.
_tMAC layers for wireless sensor networks --
_g3.1.1.
_tChallenges atMAClevel --
_g3.1.2.
_tEnergy consumption --
_g3.1.3.
_tParameters for evaluating a MAClayer --
_g3.1.4.
_tMAC Protocols --
_g3.2.
_tTopology control --
_g3.2.1.
_tRange adjustment --
_g3.2.2.
_tSpanning --
_g3.3.
_tRouting --
_g3.3.1.
_tBroadcast --
_g3.3.2.
_tClassic routing --
_g3.3.3.
_tGeographic routing --
_g3.4.
_tDeployment of sensor networks --
_g3.4.1.
_tKnowing the hardware --
_g3.4.2.
_tDevelopment process --
_g3.4.3.
_tEnsuring stability --
_g3.4.4.
_tPreparing for deployment --
_g3.5.
_tBibliography --
_gch. 4
_tSmart Systems, Ambient Intelligence and Energy Sources: Current Developments and Future Applications /
_rFlorence Sedes --
_g4.1.
_tIntroduction --
_g4.2.
_tDid you say "smart systems"? --
_g4.2.1.
_tSmart materials --
_g4.2.2.
_tSensors and actuators --
_g4.2.3.
_tCommand and control unit --
_g4.2.4.
_tManaging data and security --
_g4.3.
_tEnergy harvesting --
_g4.3.1.
_tInitial applications --
_g4.3.2.
_tSecond generation --
_g4.3.3.
_tManaging systems, processes and energy --
_g4.4.
_tWearable computers and smart fibers --
_g4.5.
_tOther applications --
_g4.6.
_tConclusion --
_g4.7.
_tBibliography --
_gch. 5
_tMiddleware in Ubiquitous Computing /
_rGaetan Rey --
_g5.1.
_tMiddleware --
_g5.2.
_tDevelopment of middleware with new computer environments --
_g5.2.1.
_tDistribution --
_g5.2.2.
_tMobility --
_g5.2.3.
_tContext awareness and adaptation --
_g5.2.4.
_tUbiquitous computing --
_g5.3.
_tMain properties of middleware in ubiquitous computing --
_g5.3.1.
_tHeterogeneity and interoperability --
_g5.3.2.
_tScalability --
_g5.3.3.
_tMobility --
_g5.3.4.
_tVariability, unpredictability, extensibility and spontaneous interactions --
_g5.3.5.
_tDynamic adaptation --
_g5.3.6.
_tContext awareness --
_g5.3.7.
_tSecurity --
_g5.3.8.
_tAdapted and controlled response times --
_g5.4.
_tBibliography --
_gch. 6
_tWComp, Middleware for Ubiquitous Computing and System Focused Adaptation /
_rJean-Yves Tigli --
_g6.1.
_tService infrastructure in devices --
_g6.1.1.
_tInteroperability --
_g6.1.2.
_tEvent communication --
_g6.1.3.
_tAppearance and disappearance --
_g6.1.4.
_tDecentralized dynamic discovery --
_g6.1.5.
_tWSOAD --
_g6.2.
_tDynamic service composition --
_g6.2.1.
_tComposition of services for devices: LCA --
_g6.2.2.
_tDistributed composition: SLCA --
_g6.3.
_tDynamic adaptation of applications to variations in their infrastructure --
_g6.3.1.
_tprinciples of AOPs --
_g6.3.2.
_tTransverse adaptation --
_g6.3.3.
_tSummary --
_g6.4.
_tBibliography --
_gch. 7
_tData Access and Ambient Computing /
_rMarie Thilliez --
_g7.1.
_tIntroduction --
_g7.2.
_tGeneral context --
_g7.2.1.
_tDevices --
_g7.2.2.
_tCommunication --
_g7.2.3.
_tMobility --
_g7.3.
_tTypes of queries --
_g7.3.1.
_tLocation queries --
_g7.3.2.
_tContinuous queries --
_g7.4.
_tData access models --
_g7.4.1.
_tPull model --
_g7.4.2.
_tPush model --
_g7.5.
_tQuery optimization --
_g7.6.
_tSensitivity to context --
_g7.7.
_tConclusion --
_g7.8.
_tBibliography --
_gch. 8
_tSecurity and Ambient Systems: A Study on the Evolution of Access Management in Pervasive Information Systems /
_rFlorence Sedes --
_g8.1.
_tIntroduction --
_g8.2.
_tManaging access in pervasive information systems --
_g8.2.1.
_tBasic access control models --
_g8.2.2.
_tManaging service-oriented access: the XACML standard --
_g8.3.
_tevolution of context-aware RBAC models --
_g8.3.1.
_tExamples of context-aware models --
_g8.3.2.
_tSummary --
_g8.4.
_tConclusion --
_g8.5.
_tBibliography --
_gch. 9
_tInteractive Systems and User-Centered Adaptation: The Plasticity of User Interfaces /
_rLionel Balme --
_g9.1.
_tIntroduction --
_g9.2.
_tproblem space of UI plasticity --
_g9.2.1.
_tPlasticity and elasticity --
_g9.2.2.
_tAdaptation capacity and its problem space --
_g9.2.3.
_tContext of use --
_g9.2.4.
_tMeta-UI and user control --
_g9.2.5.
_tUtility, usability and value --
_g9.2.6.
_tSummary --
_g9.3.
_tCAMELEON reference framework for rational development of plastic UI --
_g9.3.1.
_tRelationships between models --
_g9.3.2.
_tDevelopment process --
_g9.4.
_tCAMELEON-RT run time infrastructure --
_g9.4.1.
_tFunctional decomposition of CAMELEON-RT --
_g9.4.2.
_tSituation identifier --
_g9.4.3.
_tEvolution engine --
_g9.4.4.
_tComponent manager --
_g9.4.5.
_tAdaptation producer --
_g9.5.
_tOur principles for implementing plasticity --
_g9.6.
_tConclusion: lessons learned and open challenges --
_g9.7.
_tAppendices --
_g9.7.1.
_tThere is plasticity and there is plasticity! --
_g9.7.2.
_tImplementation tools --
_g9.8.
_tBibliography --
_gch. 10
_tComposition of User Interfaces /
_rYoann Gabillon --
_g10.1.
_tProblem --
_g10.2.
_tCase study --
_g10.2.1.
_tDescription of the available services --
_g10.2.2.
_tExamples of services built by composition --
_g10.3.
_tIssues --
_g10.4.
_tState of the art in UI composition --
_g10.4.1.
_tComposition: a shared concern --
_g10.4.2.
_tUIs composition --
_g10.4.3.
_tdevelopment process of UIs --
_g10.4.4.
_tGeneration of UIs --
_g10.4.5.
_tPlasticity of UIs --
_g10.4.6.
_tSummary of the state of the art in UI composition --
_g10.5.
_tTwo examples of approaches --
_g10.5.1.
_tComposition driven by the UI and the context of use: Compose --
_g10.5.2.
_tresolution driven by the functional core: Alias --
_g10.6.
_tKey statements and propositions --
_g10.7.
_tBibliography --
_gch. 11
_tSmart Homes for People Suffering from Cognitive Disorders /
_rHelene Pigot --
_g11.1.
_tIntroduction --
_g11.2.
_timpact of cognitive disorders on society --
_g11.2.1.
_tCognitive deficits have high human, social and economic costs --
_g11.2.2.
_tCognitive assistance and remote monitoring: a source of hope --
_g11.3.
_tCognitive disorders, relevant clients and research at DOMUS --
_g11.3.1.
_tManifestations of cognitive difficulties in affected people --
_g11.3.2.
_tFostering autonomy and aging in place --
_g11.3.3.
_tAccompanying caregivers --
_g11.4.
_tobjectives of the research program conducted at DOMUS --
_g11.4.1.
_tBenefits for individuals and society --
_g11.4.2.
_tTransforming the habitat of people with cognitive deficits --
_g11.4.3.
_tBuilding bridges between research, practice and users --
_g11.5.
_tPervasive computing and ambient intelligence --
_g11.6.
_tintegrated and interdisciplinary approach to research --
_g11.6.1.
_tGuidelines and ethical lines that should not be crossed --
_g11.6.2.
_tMultidisciplinary solutions --
_g11.6.3.
_tLeaving the laboratory to evaluate, validate and transfer solutions --
_g11.6.4.
_tconcrete example of the research approach applied at DOMUS --
_g11.7.
_tTransforming a residence into an intelligent habitat --
_g11.8.
_tResearch activities --
_g11.8.1.
_tCognitive ortheses and remote monitoring --
_g11.8.2.
_tCognitive assistance in the home --
_g11.8.3.
_tCognitive assistance outside the home --
_g11.8.4.
_tRemote monitoring and organization of work between caregivers --
_g11.8.5.
_tinteractive AMELIS calendar: portal to an intelligent habitat --
_g11.8.6.
_tAccompanied social networking --
_g11.8.7.
_tRisk detection --
_g11.8.8.
_tAmbient intelligence: ubiquity, activity recognition and context awareness --
_g11.8.9.
_tAdvanced user interfaces --
_g11.8.10.
_tMedical monitoring: gathering ecological data and physiological data --
_g11.8.11.
_tCognitive modeling and personalization --
_g11.8.12.
_tHeterogeneous networks, distributed systems and use in real life --
_g11.8.13.
_tIdentification, localization, simulation and artificial intelligence --
_g11.8.14.
_tPrivate life, security, and reliability --
_g11.8.15.
_tDesign and ergonomics --
_g11.8.16.
_tClinical studies, usability studies --
_g11.9.
_tConclusion --
_g11.10.
_tBibliography --
_gch. 12
_tPervasive Games and Critical Applications /
_rEmanuel Zaza --
_g12.1.
_tIntroduction --
_g12.2.
_tPervasive games --
_g12.2.1.
_t"PSM: the game where you are the network" --
_g12.3.
_tCritical ubiquitous applications --
_g12.3.1.
_tDistributed black box --
_g12.3.2.
_tSafeguarding heritage --
_g12.3.3.
_tSummary --
_g12.4.
_tConclusion --
_g12.5.
_tBibliography --
_gch. 13
_tIntelligent Transportation Systems /
_rThierry Delot --
_g13.1.
_tIntroduction --
_g13.2.
_tSoftware architecture --
_g13.2.1.
_tFor what sort of applications? --
_g13.2.2.
_tImportance of the context --
_g13.2.3.
_tServices provided by the platform --
_g13.2.4.
_tExample of a platform --
_g13.3.
_tDedicated transportation services and mode of communication --
_g13.3.1.
_tTransportation-oriented services that use an infrastructure --
_g13.3.2.
_tExchange services between vehicles --
_g13.4.
_tPublic transportation services --
_g13.4.1.
_tICAU --
_g13.4.2.
_tInternet access on trains --
_g13.5.
_tConclusion --
_g13.6.
_tBibliography --
_gch. 14
_tSociotechnical Ambient Systems: From Test Scenario to Scientific Obstacles /
_rMarie-Pierre Gleizes --
_g14.1.
_tIntroduction --
_g14.2.
_tDefinitions and characteristics --
_g14.3.
_tReal-life scenario: Ambient Campus --
_g14.4.
_tIntuitive architectures --
_g14.4.1.
_tbuilding blocks of the Ambient Campus scenario --
_g14.4.2.
_tLimitations of simplistic infrastructures --
_g14.4.3.
_tContext and role bubbles --
_g14.5.
_tScientific challenges --
_g14.5.1.
_tAmID --
_g14.5.2.
_tNetwork level --
_g14.5.3.
_tMiddleware level --
_g14.5.4.
_tUser service level.
505 0 0 _gNote continued:
_g14.6.
_tConclusion --
_g14.7.
_tAcknowledgments --
_g14.8.
_tBibliography.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aAmbient intelligence.
650 6 _aIntelligence ambiante.
650 7 _aCOMPUTERS
_xInteractive & Multimedia.
_2bisacsh
650 7 _aCOMPUTERS
_xSocial Aspects
_xHuman-Computer Interaction.
_2bisacsh
650 7 _aAmbient intelligence
_2fast
650 7 _aAmbient Intelligence
_2gnd
700 1 _aCalvary, Ga�elle.
758 _ihas work:
_aComputer science and ambient intelligence (Text)
_1https://id.oclc.org/worldcat/entity/E39PCFK44t3XcgYPhRYPJYTVfq
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_tComputer science and ambient intelligence.
_dOxford : Wiley-Blackwell, 2013
_z9781848214378
_w(OCoLC)817266410
830 0 _aISTE.
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781118580974
938 _aAskews and Holts Library Services
_bASKH
_nAH25046146
938 _a123Library
_b123L
_n62954
938 _aCoutts Information Services
_bCOUT
_n24744254
_c96.95 GBP
938 _aProQuest Ebook Central
_bEBLB
_nEBL1117320
938 _aebrary
_bEBRY
_nebr10653845
938 _aEBSCOhost
_bEBSC
_n529219
938 _aProQuest MyiLibrary Digital eBook Collection
_bIDEB
_ncis24744254
938 _aYBP Library Services
_bYANK
_n9984956
938 _aYBP Library Services
_bYANK
_n9995380
938 _aYBP Library Services
_bYANK
_n12798560
994 _a92
_bINLUM
999 _c11867
_d11867