Proccedings of the ICAIIT2016 2016
DOI: 10.20544/aiit2016.16
|View full text |Cite
|
Sign up to set email alerts
|

Context-aware Technologies and Systems

Abstract: Abstract. The move from traditional desktop computing environment to ubiquitous and mobile computing have brought to the front Context-aware applications which are capable of providing appropriate information and services to the user depending upon the computational/user context. This paper attempts to discuss the concept of Context-awareness from functionality perspective. The components and characteristics of Context-aware systems are identified and described in terms of the requirements expected from other … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(12 citation statements)
references
References 39 publications
(73 reference statements)
0
12
0
Order By: Relevance
“…Different formats for Key-Value pairs are possible, such as text files or binary files [Surve and Ghorpade, 2017]. With its simple nature, a Key-Value model is very easy to implement and to manage [Esseynew et al, 2016]. Furthermore, it is useful for building prototypes and running on devices with low computing power and storage [Hodaie et al, 2013].…”
Section: Key-valuementioning
confidence: 99%
See 4 more Smart Citations
“…Different formats for Key-Value pairs are possible, such as text files or binary files [Surve and Ghorpade, 2017]. With its simple nature, a Key-Value model is very easy to implement and to manage [Esseynew et al, 2016]. Furthermore, it is useful for building prototypes and running on devices with low computing power and storage [Hodaie et al, 2013].…”
Section: Key-valuementioning
confidence: 99%
“…The Key-Value modeling approach is incapable of modeling sophisticated, complex information [Wei and Jin, 2012] and to retrieve efficient context [Esseynew et al, 2016]. This approach also lacks capabilities for structuring context information and mechanisms to check its validity [Bellavista et al, 2012].…”
Section: Key-valuementioning
confidence: 99%
See 3 more Smart Citations