In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
This paper presents a social and personal context modeling method on mobile device. It infers user’s contexts, such as amity with others and emotional state, from uncertain logs...
In the last decade, e-learning has been introduced to a variety of blended learning scenarios, such as life-long learning, University lectures, and game-based learning. In all the...
—We present a structured model of context that supports an integrated approach to language acquisition and use. The model extends an existing formal notation, Embodied Constructi...
This work draws on the cultural historical activity-theory and the theory of social systems to model socio-technical systems. The concepts of practice, system, and context work as ...