Acknowledgements Hubert Lauer, Olaf Drögehorn, Stefan Pitz, Klaus David University of Kassel, Germany Herma van Kranenburg, Johan de Heer Telematica.

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

Sharing Content and Experience in Smart Environments Johan Plomp, Juhani Heinila, Veikko Ikonen, Eija Kaasinen, Pasi Valkkynen 1.
Towards Adaptive Web-Based Learning Systems Katerina Georgouli, MSc, PhD Associate Professor T.E.I. of Athens Dept. of Informatics Tempus.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
1 CACTUS: Context Aware Communications, Terminal, and User.
6/2/ An Automatic Personalized Context- Aware Event Notification System for Mobile Users George Lee User Context-based Service Control Group Network.
1 Public Commerce brief introduction of the concept Vagan Terziyan University of Jyvaskyla, Finland
© Siemens AG 2001 Software & Systems Architectures - Mobile Computing Proposed Research Topics Cooperation between Siemens and UCB March 27, 2001 Visit.
W3C Finland Seminar: Semantic Web & Web Services© Kimmo RaatikainenMay 6, 2003 XML in Wireless World Kimmo Raatikainen University of Helsinki, Department.
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
A Human-centric framework for universal access Canadian Undergraduate Software Engineering Conference March 7-9, 2002 Jacob Slonim Dalhousie.
Teaching Metadata and Networked Information Organization & Retrieval The UNT SLIS Experience William E. Moen School of Library and Information Sciences.
Functions of a Database Management System
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
An Overview of MPEG-21 Cory McKay. Introduction Built on top of MPEG-4 and MPEG-7 standards Much more than just an audiovisual standard Meant to be a.
World Class Standards WG8 presentation of current Subscription Management Activities TISPAN WG8 – 3GPP SA#5 Joint meeting Sophia Antipolis, May14th - 15.
1 Barriers to Enum What VoIP providers ask about Enum Dr. Dorgham Sisalem.
Proposal for Term Project J. H. Wang Mar. 2, 2015.
Overview Privacy Management Reference Model and Methodology (PMRM) John Sabo Co-Chair, PMRM TC.
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
Terminology and Use Cases Status Report David Harrington IETF 88 – Nov Security Automation and Continuous Monitoring WG.
1 Towards Decentralized Communities and Social Awareness Pierre Maret Université de Lyon (St Etienne) Laboratoire Hubert Curien CNRS UMR 5516.
What’s MPEG-21 ? (a short summary of available papers by OCCAMM)
Page 1Wireless World Research Forum (WWRF) WWRF WG2 Service infrastructure of the wireless world  Chair: Prof. Radu Popescu-Zeletin, Fraunhofer FOKUS,
WG2 – Enabling Technologies Status of white paper Olaf Droegehorn, Klaus David University of Kassel Chair for Communication Technology (ComTec)
Digital Libraries1 David Rashty. Digital Libraries2 “A library is an arsenal of liberty” Anonymous.
HIPAA Security Final Rule Overview
Stefan Arbanowski, FOKUS Wolfgang Kellerer, DoCoMo Euro-Labs WWRF13, Jeju, Korea, Feb.
 IS A COLLECTION OF PROGRAMS THAT MANAGES THE DATABASES STRUCTURE AND CONTROL ACCESS TO THE DATA STORED IN THE DATABASE.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Introduction: Databases and Database Systems Lecture # 1 June 19,2012 National University of Computer and Emerging Sciences.
Virtual Local Area Networks In Security By Mark Reed.
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
Database Principles: Fundamentals of Design, Implementation, and Management Chapter 1 The Database Approach.
Ambient Awareness in wireless information and communication services Update status White Paper WG2 WWRF Herma van Kranenburg (eds.) Telematica Instituut,
Ambient Awareness in wireless information and communication services Update status White Paper WG2 WWRF Herma van Kranenburg (eds.) Telematica Instituut,
A Context Framework for Ambient Intelligence
- The most common types of data models.
Proposal for developing TR: Conceptual model for TC 100 robotics
Horizon 2020 NCPs Training 16 March, Kyiv, Ukraine
Ambient Awareness in wireless information and communication services
Privacy for Location Based Community Services (LBCS)
Introduction Multimedia initial focus
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Business Models in the future Wireless World
22-INTEGRATION HUB
Database Systems: Design, Implementation, and Management Tenth Edition
FIZZ Database General presentation.
Work Items May 2015.
TGai Guideline for Submissions to TGai Template Slides
Knut Kröger & Reiner Creutzburg
Yahoo Support Ireland Toll-Free Number:
Cloud Testing Shilpi Chugh.
An Overview of MPEG-21 Cory McKay.
Data Access Service Specification: RDF(S) Ontology Access Draft
Database Management System (DBMS)
Data Base System Lecture : Database Environment
Dr. Awad Khalil Computer Science Department AUC
THREE TIER MOBILE COMPUTING ARCHITECTURE
Unit# 5: Internet and Worldwide Web
ATIS’ Service Oriented Networks (SON) Activity
3rd Studierstube Workshop TU Wien
Chapter 19 Systems That Adapt to Their Users
Themes for the future... Simple complex systems Well behaved systems
SERV Sharing Services in the ESS
Carl-Fredrik Sørensen
Computer Applications Unit B
Presentation transcript:

Personalization - Overview of white paper Olaf Droegehorn, Stefan Pitz, Klaus David

Acknowledgements Hubert Lauer, Olaf Drögehorn, Stefan Pitz, Klaus David University of Kassel, Germany Herma van Kranenburg, Johan de Heer Telematica Instituut, The Netherlands Stefan Arbanowski Fraunhofer Fokus, Germany Erwin Postmann, Christian Feichtner Siemens AG, Austria Axel Busboom Ericsson Research, Germany Johan Hjelm Ericsson, Sweden Particia Charlton Motorola, France Kimmo Raatikainen Nokia, Finland John Yanoshy Motorola, Tx, USA

What is personalization ? Get & store the users preferences User controls the level of personalization Apply these preferences to sources of interest Changing, filtering, adopting information / content Learn the users skills / abilities Adopt the interfaces according to his needs and abilities Prefetch the needed information according to the users needs

Definition of important terms Personalization: Filtering information sources with regard to actors needs, skills and environmental conditions Profile: Set of preferences / skills / needs I-centric: Actor centric communications Agent: Item, which acts instead of the actor Scalability: Possible Use of an algorithm with a great number of actors

Issues to address Security & Privacy Who is allowed to access/control/use the profile Transparency What is going on with my profile Useability User must be able to edit/control the profile Presenting a simplified view of the profile Trust User must be sure that profile information is not abused

Issues to address (2) Profile size and granularity Adapt the size of the profile and the number of involved databases to the bandwith of available wireless media Portability Each system should be able to deal with my profile Well defined system-independent semantic is needed Scalability Ability of the network / devices to handle profile information of all actors

Technical issues What is the profile ? Which items are of interest Which items can be used by systems / actors Which items can be learned / retrieved Semantic is needed to describe the profile in a well defined but flexible way Where is the profile ? Who is responsible for the profile Where is it stored (central/distributed): network vs. User How to edit/access/use the profile Security / Recovery of the profile How to move the profile with the user

Technical issues (2) Who accesses the profile How to learn (automatic / user driven) How to use (Each system / Agent controls the use) How to Store (Open data / encrypted) How to secure the profile Encryption methods Backup / Recovery / Abuse Definition of a security context for applications/agents Transfer of profile-data

Context Description Direct context Sensor bassed data, directly measurable or provided by the user Indirect context Derived form multiple direct contexts, refers to the actual situation the user is in Context history Generated (learned) from the users behaviour over time

How to learn preferences Rule Based Systems Predefined / static system CASE Systems “computer assistend self-explication” Asking the user well defined questions Endorsement Systems Self-learning systems for complex products Collaborative Filtering Systeme Identification of common interests/skills

Personalizationsystems

Conclusion Personalization is done by associating every actor with a set of preferences Actors preferences have to be stored in secure and flexible profiles moving with the actor Acceptance by the user is influenced by privacy, usability and availability This has large implications on the technical realization of the profile (storage / security issues / access restrictions)

Proposed division of the topic Definition of describing semantic propose a semantic and syntax to describe a profile Concepts to store/move a profile Evaluation of different database approaches Concepts to secure/encrypt/transfer a profile Propose a security/key concept Usability of personalization systems (agents, etc.) User interface, manual vs. automatic adaptation Field trials, test in different scenarios

Conctact information Email :Stefan.Pitz@uet.e-technik.uni-kassel.de WWRF-Homepage http://www.uet.e-technik.uni-kassel.de/wwrf-wg2/ Access to documents is granted after registration to one of the Mailing-Lists