Advertisement

Wireless Personal Communications

, Volume 56, Issue 1, pp 37–53 | Cite as

Uncertainty Management in Context-Aware Applications: Increasing Usability and User Trust

  • Pedro Damián-Reyes
  • Jesús Favela
  • Juan Contreras-Castillo
Article

Abstract

Uncertainty in context-aware computing is mainly a consequence of the complexity of context acquisition mechanisms and context processing. The presence of uncertainty may harm the users’ confidence in the application, rendering it useless. This paper describes a three-phase strategy to manage uncertainty by identifying its possible sources, representing uncertain information, and determining how to proceed, once uncertain context is detected. We conducted an experiment to assess the impact and utility of uncertainty management in a location-aware museum guide that incorporated the approach proposed. The impact was measured by comparing the number of erroneous location estimations and the number of interactions performed by users. A survey was used to measure user friendliness, the utility of the application and user trust among 118 museum visitors who participated in the experiment. Results suggest that uncertainty management helps improve the accuracy of context estimates and the user’s perception on the reliability of the application.

Keywords

Uncertainty management Context-aware computing User trust Usability Museum guides 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abowd G. D., Ebling M., Hunt G., Lei H., Gellersen H.-W. (2002) Context-aware computing. IEEE Pervasive Computing 1(3): 22–23CrossRefGoogle Scholar
  2. 2.
    Satyanarayanan M. (2001) Pervasive computing: Vision and challenges. IEEE Personal Communications 8(4): 10–17CrossRefGoogle Scholar
  3. 3.
    Weiser M. (1991) The computer for the 21st century. Scientific American 265(3): 94–104CrossRefGoogle Scholar
  4. 4.
    Dey A. K. (2001) Understanding and using context. Personal and Ubiquitous Computing 5(1): 4–7CrossRefGoogle Scholar
  5. 5.
    Prekop P., Burnett M. (2003) Activities, context and ubiquitous computing. Computer Communications 26(11): 1168–1176CrossRefGoogle Scholar
  6. 6.
    Satyanarayanan M. (2003) Coping with uncertainty. IEEE Pervasive Computing 2(3): 2CrossRefGoogle Scholar
  7. 7.
    Antifakos, S., Kern, N., Schiele, B., & Schwaninger, A. (2005). Towards improving trust in context-aware systems by displaying system confidence. In 7th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCIG05) (pp. 9–14). ACM.Google Scholar
  8. 8.
    Gu, T., Pung, H. K., & Zhang, D. Q. (2004). A bayesian approach for dealing with uncertain contexts. In 2nd International Conference on Pervasive Computing (Pervasive 2004).Google Scholar
  9. 9.
    Ranganathan A., Al-Muhtadi J., Campbell R. H. (2004) Reasoning about uncertain contexts in pervasive computing environments. IEEE PERVASIVE Computing Journal 3(2): 62–70CrossRefGoogle Scholar
  10. 10.
    Truong, B. A., Lee, Y.-K., & Lee, S.-Y. (2005). Modeling and reasoning about uncertainty in context-aware systems. In IEEE International Conference on e-Business Engineering (ICEBE’05) (pp.102–109). IEEE Computer Society.Google Scholar
  11. 11.
    Xu, C., & Cheung, S. (2005). Inconsistency detection and resolution for context-aware middleware support. In 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering ESEC/FSE-13 (pp. 336–345). ACM Press.Google Scholar
  12. 12.
    Dey, A. K., Mankoff, J., Abowd, G. D., & Carter, S. (2002). Distributed mediation of ambiguous context in aware environments. In Proceedings of the 15th Annual ACM Symposium on User Interface Software and Technology (pp. 121–130). ACM Press.Google Scholar
  13. 13.
    Guan, D., Yuan, W., Gavrilov, A., Lee, S., Lee, Y.-K., & Han, S. (2006). Using fuzzy decision tree to handle uncertainty in context deduction. In D.-S. Huang, K. Li & G. W. Irwin (Eds.), International Conference on Intelligent Computing, ICIC 2006, Lecture Notes in Computer Science (Vol. 4114, pp. 63–72). Springer.Google Scholar
  14. 14.
    Buchholz, T., Kpper, A., & Schiffers, M. (2003). Quality of context: What it is and why we need it. In 10th Workshop of the Open View University Association (OVUA 03).Google Scholar
  15. 15.
    Sheikh K., Wegdam M., Sinderen M. V. (2008) Quality-of-context and its use for protecting privacy in context aware systems. Journal of Software 3(3): 83–93CrossRefGoogle Scholar
  16. 16.
    Kim, Y., & Lee, K. (2006). A quality measurement method of context information in ubiquitous environments. In Hybrid Information Technology (ICHIT 06) (pp. 576–581). IEEE Computer Society.Google Scholar
  17. 17.
    Bu, Y., Gu, T., Tao, X., Li, J., Chen, S., & Lu, J. (2006). Managing quality of context in pervasive computing. In Sixth International Conference on Quality Software (QSIC 2006). IEEE Computer Society.Google Scholar
  18. 18.
    Park, I., Lee, D., & Hyun, S. J. (2005). A dynamic context-conflict management scheme for group-aware ubiquitous computing environments. In 29th Annual International Computer Software and Applications Conference (COMPSAC 2005) (pp. 359–364). IEEE.Google Scholar
  19. 19.
    Dey A. K., Mankoff J. (2005) Designing mediation for context-aware applications. ACM Transactions on Computer-Human Interaction 12(1): 53–80CrossRefGoogle Scholar
  20. 20.
    Rukzio, E., Hamard, J., Noda, C., & Luca, A. D. (2006). Visualization of uncertainty in context aware mobile applications. In 8th Conference on Human-Computer Interaction with Mobile Devices and Services (pp. 247–250). ACM Press.Google Scholar
  21. 21.
    Benford S., Crabtree A., Flintham M., Drozd A., Anastasi R., Paxton M., Tandavanitj N., Adams M., Row-Farr J. (2006) Can you see me now? ACM Transactions on Computer-Human Interaction 13(1): 100–133CrossRefGoogle Scholar
  22. 22.
    Beeharee A., Steed A. (2007) Exploiting real world knowledge in ubiquitous applications. Personal and Ubiquitous Computing 11: 429–437CrossRefGoogle Scholar
  23. 23.
    Poole, D., & Smyth, C. (2005). Type uncertainty in ontologically-grounded qualitative probabilistic matching. In L. Godo (Ed.), 8th European Conference, ECSQARU 2005, LNCS (Vol. 3571, p. 763). Springer Verlag.Google Scholar
  24. 24.
    Hightower, J., Consolvo, S., LaMarca, A., Smith, I., & Hughes, J. (2005). Learning and recognizing the places we go. In Ubiquitous Computing: 7th International Conference on Ubiquitous Computing, UBICOMP 2005 (pp. 159–176). Springer.Google Scholar
  25. 25.
    Mäntyjärvia J., Seppänen T. (2003) Adapting applications in handheld devices using fuzzy context information. Interacting with Computers 15(4): 521–538CrossRefGoogle Scholar
  26. 26.
    Ranganathan A., Campbell R. H. (2003) An infrastructure for context-awareness based on first order logic. Personal and Ubiquitous Computing 7(6): 353–364CrossRefGoogle Scholar
  27. 27.
    Benford S., Anastasi R., Flintham M., Drozd A., Crabtree A., Greenhalgh C., Tandavanitj N., Adams M., Row-Farr J. (2003) Coping with uncertainty in a location-based game. IEEE Pervasive Computing 2(3): 34–41CrossRefGoogle Scholar
  28. 28.
    Castro, L. A., & Favela, J. (2005). Continuous tracking of user location in wlans using recurrent neural networks. In Sexto Encuentro Internacional de Computación (ENC 2005) (pp. 174–181). IEEE Press.Google Scholar
  29. 29.
    Baldauf M., Dustdar S., Rosenberg F. (2007) A survey on context-aware systems. International Journal of Ad Hoc and Ubiquitous Computing 2(4): 263–277CrossRefGoogle Scholar
  30. 30.
    Indulska, J., & Sutton, P. (2003). Location management in pervasive systems. In The Australasian Information Security Workshop, Conferences in Research and Practice in Information Technology (Vol. 34, pp. 143–151). ACM.Google Scholar
  31. 31.
    Broens T., Halteren A. V., Sinderen M. V., Wac K. (2007) Towards an application framework for context-aware m-health applications. International Journal of Internet Protocol Technology 2(2): 109–116CrossRefGoogle Scholar
  32. 32.
    Konomi S., Roussos G. (2007) Ubiquitous computing in the real world: Lessons learnt from large scale rfid deployments. Personal and Ubiquitous Computing 11: 507–521CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC. 2009

Authors and Affiliations

  • Pedro Damián-Reyes
    • 1
  • Jesús Favela
    • 1
  • Juan Contreras-Castillo
    • 2
  1. 1.Computer Science DepartmentCICESEEnsenadaMexico
  2. 2.School of TelematicsUniversity of ColimaColimaMexico

Personalised recommendations