2001
DOI: 10.1109/2.940013
|View full text |Cite
|
Sign up to set email alerts
|

Implementing a sentient computing system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
225
0
4

Year Published

2003
2003
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 382 publications
(229 citation statements)
references
References 9 publications
0
225
0
4
Order By: Relevance
“…This world model may help us not only in discovering the impacts of our activities on the world around us but also in optimizing our use of energy and other resources in the existing infrastructure (Addlesee et al 2001).…”
Section: The World Modelmentioning
confidence: 99%
“…This world model may help us not only in discovering the impacts of our activities on the world around us but also in optimizing our use of energy and other resources in the existing infrastructure (Addlesee et al 2001).…”
Section: The World Modelmentioning
confidence: 99%
“…In an Active Office [5], primitive events might be 'The door opens' and 'Peter is seen in the room'. Similarly, 'The door opens, then Peter is seen in the room' could be a composite event.…”
Section: Composite Event Detection Frameworkmentioning
confidence: 99%
“…2). Workers wear Active Bats [5] to inform the building of their movements at least once a minute. Other sensors monitor doors, office temperatures, electronic whiteboard usage, and lighting.…”
Section: Application Scenario: the Active Officementioning
confidence: 99%
“…At the network layer, [10] combines hop-to-hop routing based on handles with limited public-key cryptography to preserve privacy from eavesdroppers and traffic analyzers. At the architectural level, and in a manner similar to outdoor GPS [24], solutions such as Cricket [33] and Place Lab [36] protect a user's (private) location by having a user's carry-on device calculate its location based on a series of beacons from the infrastructure rather than having the infrastructure compute the location as in [42] and [8]. In contrast, we assume that the sensor might not have enough context and resources to compute observations nor it is the final recipient of information (i.e., it is the system who captures and interprets the information and applications, on behalf of their users, the recipients of information).…”
Section: Related Workmentioning
confidence: 99%