2006
DOI: 10.1007/11788485_5
|View full text |Cite
|
Sign up to set email alerts
|

Plans and Planning in Smart Homes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…Also, the availability of resources might change due to user mobility or other factors. Therefore, more advanced planning techniques have been proposed by extending classical planning techniques [105]. One example is the distributed hierarchal task network (D-HTN) technique [106] which extends the hierarchal task network (HTN).…”
Section: Algorithms and Methodsmentioning
confidence: 99%
“…Also, the availability of resources might change due to user mobility or other factors. Therefore, more advanced planning techniques have been proposed by extending classical planning techniques [105]. One example is the distributed hierarchal task network (D-HTN) technique [106] which extends the hierarchal task network (HTN).…”
Section: Algorithms and Methodsmentioning
confidence: 99%
“…The set of required rules to manage complex situation is very di cult to de ne. Hence Ac-tion Planning focuses on the determination of the best path of actions according to current system state such as presented in Simpson et al [15]. Decision Tree (DT) is a sub-model to consider the possibility of deviations from the expected result to the nal environment state because of hidden variables.…”
Section: Ambient Intelligencementioning
confidence: 99%
“…Many research groups have focused on one of the most important issue in telemedicine, that of the integrity and security of transmitted data. Simpson et al (2006) posed several challenging issues regarding continuous home monitoring: who should receive information as the patient, family members, caregivers and medical professionals all have interest; what information should each person receive without violating any data privacy and security concerns; how should information be presented since each party may prefer different mode of communication such as telephone, computer, etc. Proposed solutions to the security issue include cryptography (Mantas et al 2009) and context-aware access control rules (Guennoun and El-Khatib 2009).…”
Section: Challenges and Issuesmentioning
confidence: 99%