Software agents: An overview

HS Nwana - The knowledge engineering review, 1996 - cambridge.org
Agent software is a rapidly develo** area of research. However, the overuse of the word
“agent” has tended to mask the fact that, in reality, there is a truly heterogeneous body of …

Information filtering: Overview of issues, research and systems

U Hanani, B Shapira, P Shoval - User modeling and user-adapted …, 2001 - Springer
An abundant amount of information is created and delivered over electronic media. Users
risk becoming overwhelmed by the flow of information, and they lack adequate tools to help …

Charting past, present, and future research in ubiquitous computing

GD Abowd, ED Mynatt - ACM Transactions on Computer-Human …, 2000 - dl.acm.org
The proliferation of computing into the physical world promises more than the ubiquitous
availability of computing infrastructure; it suggest new paradigms of interaction inspired by …

Cognitive enhancement: methods, ethics, regulatory challenges

N Bostrom, A Sandberg - Science and engineering ethics, 2009 - Springer
Cognitive enhancement takes many and diverse forms. Various methods of cognitive
enhancement have implications for the near future. At the same time, these technologies …

A diary study of task switching and interruptions

M Czerwinski, E Horvitz, S Wilhite - … of the SIGCHI conference on Human …, 2004 - dl.acm.org
We report on a diary study of the activities of information workers aimed at characterizing
how people interleave multiple tasks amidst interruptions. The week-long study revealed the …

[LIVRE][B] Fundamentals of wearable computers and augmented reality

W Barfield - 2015 - books.google.com
Upon publication almost 15 years ago, the first edition almost instantly became a trusted
reference, setting the stage for the coming decade, in which the explosion in research and …

Personal data platform

C Kalaboukis, CW Higgins, ME Davis… - US Patent …, 2014 - Google Patents
Receive a plurality of data management policies from a user. Store in a memory the data
management policies in associa tion with a context and an identifier of the user. Receive …

Augmented reality through wearable computing

T Starner, S Mann, B Rhodes, J Levine… - … Teleoperators & Virtual …, 1997 - direct.mit.edu
Wearable computing moves computation from the desktop to the user. We are forming a
community of networked, wearable-computer users to explore, over a long period, the …

Data warehouse computing system

NK Mullen, MJ Green - US Patent 7,003,560, 2006 - Google Patents
5,287,266 A 2/1994 Malec et al. 5,295,064 A 3/1994 Malec et al. 5,475,753 A* 12/1995
Barbara et al.............. 713/187 5,495,610 A 2/1996 Shing et al. 5,602.997 A 2/1997 …

An architecture for privacy-sensitive ubiquitous computing

JI Hong, JA Landay - Proceedings of the 2nd international conference on …, 2004 - dl.acm.org
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest
barrier to its long-term success. However, developers currently have little support in …