<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">User-initiated context switching using NFC</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Janne</forename><surname>Jalkanen</surname></persName>
							<email>janne.jalkanen@nokia.com</email>
							<affiliation key="aff0">
								<orgName type="department">Insight &amp; Foresight</orgName>
								<orgName type="institution" key="instit1">Nokia Corporation</orgName>
								<orgName type="institution" key="instit2">Nokia Group</orgName>
								<address>
									<postBox>PO Box 407</postBox>
									<postCode>FI-00045</postCode>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">User-initiated context switching using NFC</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">DF74B36A57D76244531B5C23A3CC7254</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T19:34+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Near Field Communication is an application of Radio Frequency Identification technologies in very short range. In this paper we present an easy and cheap way for users to set their context using a mobile phone equipped with an NFC reader device. In one application, the user is able to update presence information in a web log, in another to convey simple emotions to another person, and in a third application, update a "mood meter" by touching.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The promise of an ubiquitous context-sensitive system is that it is able to invisibly and discreetly adapt to the user's needs, wants and wishes. In order to do this, the context-sensitive system needs to draw information from a number of sensors and sources, including things like the clock, calendar, location, movement, previous information, etc. However, extracting this information can sometimes be difficult, cumbersome, or downright impossible, resulting in a multitude of failures and exceptions in the context-sensitive system.</p><p>One possible way of getting the more complex context information is simply to ask the user. However, even when you do it in a relatively non-intrusive way, it can still be an annoyance. You don't want the Microsoft Office assistant to pop up every five minutes and ask: "It looks like you're writing a letter. Would you like some help?" In order for such a proactive agent to work properly, it needs to be aware of the user in a multitude of ways: it needs to know when the user is receptive to such information, whether the mood is correct, and so on. This is relatively difficult, as it requires a computer to be "tuned" to the user.</p><p>Of course, if the user is not attempting productive work, proactive context setting becomes easier: e.g. in games and entertainment systems such an agent can be interwoven as a part of the game, for example the context-aware agents of the game "Black and White" <ref type="bibr" target="#b18">[22]</ref>.</p><p>The user can also set his context manually, but this is difficult for two reasons:</p><p>1. The user needs to be aware of the system and know how to use it. This is, of course, contrary to the ubiquitous computing vision. 2. Users in general don't remember to "flip the switch back": it's much easier to forget the lights on when leaving the room, than to forget to turn them on when entering. This means that while a context-sensitive system can mostly rely on the information the user gives it, it cannot trust the lack of information as continuation of a previous state. It is conceivable that a good context-sensitive system would combine these approaches: start with whatever the user tells you to do, then do a bestguess estimate on what the user would like to do next.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Background</head><p>Context is traditionally redefined in every context-awareness paper, but we stick to Dey's definition: "Context is any information that can be used to characterize the situation of an entity. An entity is a person, place, or object that is considered relevant to the interaction between a user and an application, including the user and applications themselves." <ref type="bibr" target="#b13">[15]</ref>. Other definitions in the literature tend to include all or some of the following aspects, especially when talking about mobile technology <ref type="bibr" target="#b5">[6]</ref>, <ref type="bibr" target="#b8">[9]</ref>:</p><p>• Physical context (e.g. time, location, temperature)</p><p>• Social context (e.g. social group, friends, work/home, activities of nearby people) • Mental context (what the user is doing or feeling.) Some of these contexts are more easily derived than others; time can usually be acquired with sufficient accuracy very easily, while other physical properties can be acquired with some limited accuracy/efficiency using different sensors. Social context is fuzzier, but some educated guesses can be made using things like Bluetooth neighborhood <ref type="bibr" target="#b8">[9]</ref>.</p><p>User's mental context is however often difficult, if not impossible to determine. It is hard sometimes even for people to pick nuances of moods from the behavior of other people. The only remotely reliable method is to ask the person (unless, of course, they are lying or incapable of articulating their feelings).</p><p>Since determining the context of the user is a challenging task at best, one must be prepared for errors. In case of an error, the context sensitive system should not produce a result that impacts the user in a way that is found disturbing. "Do no harm" is a major imperative to any context sensitive system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Presence</head><p>RFC 2779 defines presence is a means for finding, retrieving, and subscribing to changes in the presence information (e.g. "online" or "offline") of other users. <ref type="bibr" target="#b14">[16]</ref> In practice, presence takes a form of an icon and/or a piece of text that describes what the user's current action is, for example "I'm available", "Do not disturb", or "In a meeting, please SMS". In many instant messaging (IM) systems users also can include things like the currently playing song or mood.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Previous work</head><p>Using intelligence embedded in the environment in the forms of smart tags is not a new concept <ref type="bibr" target="#b9">[10]</ref>. For example, Siegemund and Florkemeier are using Bluetooth beacons and RFID tags in the mobile phones <ref type="bibr" target="#b0">[1]</ref>, however, their smart tags are far smarter than our "dumb tags".</p><p>Bardram and Hansen <ref type="bibr" target="#b6">[7]</ref> present a system similar to ours, where mobile devices where used to mediate social situations in a context-aware fashion, which they call "Context mediated awareness". Their system works with Bluetooth beacons, and cell-based positioning, and thus also require expensive infrastructure to function.</p><p>Another very smart system is presented by Göker et al <ref type="bibr" target="#b7">[8]</ref>, but this one, too, suffers from large infrastructure costs.</p><p>The practice of putting URLs on objects has been explored in HP's CoolTown project, though their work concentrates on infrared beacons <ref type="bibr" target="#b17">[21]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">The Setup</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">NFC Technology</head><p>Near Field Communication is a name for a particular type of communication that occurs at close distances. It is closely related to RFID technology, but due to different design, the maximum communication distance is very short, in the order of 10 cm. A recent study by the German government found that even with very good equipment, it is extremely difficult to intercept communication between two NFC devices from more than 2m away <ref type="bibr" target="#b2">[3]</ref>, <ref type="bibr" target="#b3">[4]</ref>, even with a very aggressive antenna design.</p><p>NFC is not new as such, and in fact it is already used in many commercial applications, such as ski passes, public transportation tickets, access keys, and payment systems <ref type="bibr" target="#b10">[11]</ref>. The NFC standards are maintained by the NFC Forum <ref type="bibr">[18]</ref> and standardized in ECMA 340 and ISO 18092 <ref type="bibr" target="#b12">[13]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.1">NFC Tags</head><p>NFC tags are essentially antennas with little logic, that contain memory. A small tag contains typically ~50 bytes of user memory, while large tags can have up to 4 kilobytes of memory.</p><p>A tag can either be active or passive. An active tag contains its own power source, whereas a passive tag draws power from the RF field of the reader. Typically most of the tags in use are passive tags, since they are cheaper to manufacture and require no charging or power source.</p><p>Each tag has an unique ID code, ranging from 4 to 10 bytes, depending on the manufacturer and technology. These ID codes are usually sufficiently unique within one manufacturer, though with multiple manufacturers collisions may occur.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.2">NFC Readers</head><p>An NFC reader contains an antenna, much like the one in a tag, a microprocessor and a power source of some kind. It typically also interfaces with a more complex microprocessor. A device with an NFC reader is usually called an NFC device, and is capable of bi-directional information transfer with another similar NFC device, as defined in the NFC-IP1 standard <ref type="bibr" target="#b12">[13]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Weblog</head><p>A weblog is a web site with periodic, time-stamped posts collected on a single page, typically in a chronological order. They have gained popularity and visibility lately, both as a self-expression as well as a publishing tool.</p><p>In this paper, we used the freely available JSPWiki software as our backend system. While JSPWiki is technically a Wiki, it also has weblog capabilities <ref type="bibr" target="#b15">[17]</ref>. It was chosen because of its flexibility, easy interfacing from the server, and author's familiarity with the software.</p><p>A dual-processor 1.4 GHz Ubuntu Linux server was used as the backend. All software was developed in Java, and specifically as Java Server Pages (JSP).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Nokia NFC Shell</head><p>The Nokia NFC shell is a Near Field Communication enabled functional cover, developed for the Nokia 3220 phone The transfer speed varies from 106 kbps to 424 kbps, and the device has also a tag emulation mode, which allows a second NFC shell or another commercial tag reader to read the information from it.</p><p>The NFC shell comes with a pre-built Java application called "Service Discovery", which allows URLs, phone numbers and SMSs to be read from and stored to tags.</p><p>In this particular case, we are using both Philips Mifare Ultralight and Mifare Classic 1k passive tags <ref type="bibr">[19]</ref>. The former has a storage capacity of 48 bytes, and the latter can store up to 1 kB. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">The Applications</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Presence determination</head><p>In this application, the user is able to announce his presence information using a simple touch paradigm.</p><p>Multiple tags are encoded with a URL pointing at a JSP page residing on the same server as the weblog. When an user touches a tag (see <ref type="bibr">Fig 3)</ref>, a Java midlet application on the phone reads the URL and starts the phone native web browser. The URL on the tag consists of the web server address as well as the tag ID. Once the HTTP request is made, the web server parses the HTTP GET request, and determines the user presence information from a preset table. For example: Tag code is "048b22b9ca028000" has been defined in the server database to correspond to presence value of "At work".</p><p>The other possibility would be to simply embed the URL (e.g. "http://www.ecyrd.com/P.jsp?p=At+work") in the tag, in which case no lookup table would be required. However, using the tag ID codes allows the predefined presence strings to be arbitrarily long, due to the limited space in MIFARE Ultralight tags.</p><p>After the P.jsp page has the presence information, it interfaces with the Wiki page repository and writes the presence message to a predefined page. The Wiki software aggregates a number of pages on the front page as a weblog, and displays the last received presence status to whoever is viewing the page (see Fig. <ref type="figure" target="#fig_2">2</ref>).</p><p>Authentication is done with a simple passkey mechanism: whenever the user uses the system the first time, he is redirected to a JSP page, which requests a passphrase. Once a valid passphrase is given, a cookie with a long expiry time is saved in the browser, which allows the user to bypass the authentication phase the next time he touches a tag. Finally, the user is redirected back to the original page he tried to access.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Instant emoticons</head><p>The second application is used to transmit moods and feelings to a loved one. A tag is attached to the backside of a photograph, and an SMS command is written on it. The tag, when touched, directs the phone to send a simple SMS message with the text "*hugs*" to the recipient (see Fig. <ref type="figure" target="#fig_4">4</ref>). This allows "low-bitrate emotions" to be sent with little effort, letting the other person know that you are thinking of him/her at that moment. As the tag is readable through the wallet, the picture does not need to be removed from the wallet, and neither the wallet needs to be removed from the pocket: the tag can be read through the fabric for quick access. (However, coins or other metallic objects do disturb the field, and thus the outward facing side of the wallet should not contain anything metallic.) This is similar to the practice of sending empty SMS messages to other people, just to tell them that one thinks of them. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Mood Swinger</head><p>Mood is a prolonged state of mind, resulting from a cumulative effect of emotions <ref type="bibr" target="#b1">[2]</ref>. In this application we allow the user to signal simple emotions which then are aggregated to the weblog to show a mood.</p><p>The application consists of a series of tags, each one of which is encoded with a simple emotion: "Happy", "Sad", etc. When a user touches the tag with the mobile phone, a HTTP GET request to a server is initiated, and the weblog system mentioned previously is updated.</p><p>The difference here to the Presence application is that an emotion dissipates over time; the level of emotion is increased upon each touch, and the value dilutes over time towards an indifferent state. For example, the first touch on "happy" will move him to roughly halfway up in the scale (to "pretty happy"), and a second touch will move him all the way to "very happy".</p><p>Our system uses three basic axis, along which an emotion can vary: 1. Happy -sad 2. Strained -relaxed 3. Focused -unfocused The mood is represented as a floating point value varying from -1.0 to 1.0. For visualization purposes, this has been divided into five states, which are (in the order of strength):</p><p>1. Very (0.9+) 2. Quite (0.7-0.9) 3. Pretty (0.4-0.7) 4. Somewhat (0.2-0.4) 5. Slightly (0.05-0.2) 6. (Indifferent -this is the zero state, corresponding to values less than 0.05) For example, "Very happy" would mean a value &gt; 0.9, whereas somewhat sad would mean a value around -0.3.</p><p>As the mood moves towards indifferent, so does the indicator on the weblog. The mood value is updated discreetly every T seconds and reduced by p per cent. The values of T and p are chosen so that an emotion dissipates to indifference in slightly under two hours.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Discussion</head><p>We have presented a simple way of using an off-the shelf system to make the user indicate his physical or mental context at any given time. Using a standard mobile phone has several advantages:</p><p>• A phone is something that the user typically carries all the time.</p><p>• The device has on-demand connectivity in most areas.</p><p>• The touch paradigm is easy and intuitive, and does not require any complicated menu traversal. • Works well even if the user cannot see the display. This can be a benefit to people with poor eyesight. • Having the reader in the phone eases privacy concerns: user is in control of his information all the time. In a typical RFID-based system anyone could set up a reader and read passing tags, which would be a privacy concern, as a passive tag cannot be turned off the same way as the phone can. The system is relatively cheap and easy to set up: the user needs a single NFCenabled phone, and tags are readily available in the open market. A typical ubiquitous computing system, where the intelligence embedded in the environment requires a complicated infrastructure is expensive to install and maintain, whereas our system scales by multiplication of cheap tags and keeping the intelligence and connectivity in the mobile device.</p><p>However, this is still a far cry from a fully ubiquitous system, where the computer does all the work for the user. It still requires conscious user action to trigger the context changing event, and also requires physical access to the tags (which in many cases could be argued to be a benefit as well). In some cases it was found that no suitable tag was present, or the phone was inconveniently located and not used. In addition, if there is no concrete, immediate benefit (such as feedback from other users) from switching the context (or the mood), the initial interest in it tends to wane rapidly. Also, not having such a mobile phone would mean no access to most of the functionalities, therefore making it difficult for casual visitors to participate.</p><p>Also, the fact that the device required confirmations for each access was experienced as a burden. The lag between touching an object and the browser actually starting and connecting also contributed to a non-optimal user experience.</p><p>Is this then more convenient than having the environment watch the user? Yes, for some purposes. Since determining the user's "mental context" is difficult for even a complex computer program, this kind of explicit context setting is a reliable way of finding the user's context. But, as mentioned earlier, this information loses its relevance as time goes on, as users cannot be expected to continuously update the state of the context-sensitive system. However, it is possible to "fix" the estimates of a system using user-input, in much the same way as a GPS device uses auxiliary methods like accelerometers, pedometers, or dead-reckoning to compensate for the times it has no satellite coverage.</p><p>One important thing is that the user needs some immediate benefit from setting the context: the Remote Hug -case, while not really very complicated, nor useful at first sight, provides the most feedback to the user by nurturing the generic human need of being social, and therefore would also give an ubiquitous computing system the most valuable information for a longer period. Also, making the user's mood visible in the weblog allows other people to access this information, making feedback from people possible ("oh, you have been feeling sad for days now; what's wrong?") A computer system can tap in this flow of information between people, and learn from it; rather than forcing the user to communicate directly with the computer and figuring out the proper responses.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Future work</head><p>The system, as presented here, is at a relatively "hackish" stage. The JSPWiki engine is stable, and easily enhanced, but it is not exactly a highly advanced context awareness platform. The NFC system could easily be interfaced with other similar systems that offer a web services or SMS-based interface. Some further possibilities include:</p><p>• Hooking up to an IM client (e.g. Apple iChat, using Applescript). This would allow interfacing with commercial presence systems. • More efficient modeling of emotions, using established virtual character emotion modeling tools <ref type="bibr" target="#b4">[5]</ref>, <ref type="bibr" target="#b11">[12]</ref>, <ref type="bibr" target="#b16">[20]</ref>. • Extending the range of emotions available to the user, while making it configurable. • Distributing the devices to an user group, and doing usability observations.</p><p>The whole project was intended to explore what can be done using off-the-shelf, cheap components by interfacing them with existing person-to-person communication systems like SMS and weblogs, which are not context-aware as such. One further avenue of study would be to augment existing context-aware systems, both commercial and research prototypes.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>[14]. It replaces the normal battery cover with a slightly thicker version, which contains an NFC reader/writer antenna and microchip. The reader functions in the 13.56 MHz frequency range, and has a reading distance of a few centimeters. It supports the ISO-14443-A tag standard, as well as the ISO 18092, ISO 21481, ECMA (340), and ETSI TS 102 190 standards.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig 1 .</head><label>1</label><figDesc>Fig 1. System overview. All applications are built around the same base system.</figDesc><graphic coords="4,160.26,279.50,290.46,225.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig 2 .</head><label>2</label><figDesc>Fig 2. How a casual viewer would see the presence information on the weblog.</figDesc><graphic coords="5,255.66,232.90,110.10,77.30" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig 3 .</head><label>3</label><figDesc>Fig 3. Touching the tag and initiating a context switch. In this case, the tag has been attached on a mirror next to the home front door.</figDesc><graphic coords="5,254.46,347.60,101.24,118.90" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig 4 .</head><label>4</label><figDesc>Fig 4.Sending the "hug" SMS by touching a picture. The tag has been attached to the backside of the picture. The user keeps this picture in his wallet, and is able to send the "hug" without taking the picture out of the wallet.</figDesc><graphic coords="6,192.16,120.70,225.64,144.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. How the mood dissipates over time.</figDesc><graphic coords="7,212.86,110.50,184.38,142.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Fig 6 .</head><label>6</label><figDesc>Fig 6. How the mood is visible in the weblog. The "Now playing" -field is extracted from iTunes, and shows yet another new kind of presence/context information, not discussed in this paper.</figDesc><graphic coords="7,242.56,300.70,124.70,85.50" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">Acknowledgments</head><p>This work could not have been done without the dedicated effort of the NFC teams in Nokia. My gratitude goes to the NVO 3220 NFC shell team, Sebastian Nyström, Carmen Kühl, and Heikki Huomo. Special thanks go to Tatu Koljonen for providing the opportunity to write about this, and Chris Heathcote and Matt Jones for being such good company.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Interaction in Pervasive Computing Settings using Bluetooth-Enabled Active Tags and Passive RFID Technology together with Mobile Phones</title>
		<author>
			<persName><forename type="first">Frank</forename><surname>Siegemund</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Christian</forename><surname>Florkemeier</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom&apos;03)</title>
				<meeting>the First IEEE International Conference on Pervasive Computing and Communications (PerCom&apos;03)</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Virtual Humans Personified</title>
		<author>
			<persName><forename type="first">Sumedha</forename><surname>Kshirsagar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings Autonomous Agents Conference (AAMAS) 2002</title>
				<meeting>Autonomous Agents Conference (AAMAS) 2002</meeting>
		<imprint>
			<date type="published" when="2002-07">July, 2002</date>
			<biblScope unit="page" from="356" to="359" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<author>
			<persName><forename type="first">Thomas</forename><surname>Finke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Harald</forename><surname>Kelter</surname></persName>
		</author>
		<ptr target="http://www.bsi.bund.de/fachthem/rfid/whitepaper.htm" />
	</analytic>
	<monogr>
		<title level="m">Radio Frequency Identification -Abhörmöglichkeiten der Kommunikation zwischen Lesegerät und Transponder am Beispiel eines ISO14443-Systems</title>
		<title level="s">Bundesamt für Sicherheit in der Informationstechnik</title>
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Risiken und Chancen des Einsatzes von RFID-Systemen</title>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">185</biblScope>
			<biblScope unit="page">128</biblScope>
			<pubPlace>Bonn</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Bundesamt für Sicherheit in der Informationstechnik-BSI ; Godesberger Allee</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Beyond Cognition: Modeling Emotion in Cognitive Architectures</title>
		<author>
			<persName><forename type="first">Eva</forename><surname>Hudlicka</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Sixth International Conference on Cognitive Modeling</title>
				<meeting>the Sixth International Conference on Cognitive Modeling<address><addrLine>Mahwah, NJ; Pittsburgh, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Lawrence Earlbaum</publisher>
			<date type="published" when="2004">ICCM2004</date>
			<biblScope unit="page" from="118" to="123" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Utilising Context Ontology in Mobile Device Application Personalisation</title>
		<author>
			<persName><forename type="first">Panu</forename><surname>Korpipää</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jonna</forename><surname>Häkkilä</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Juha</forename><surname>Kela</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sami</forename><surname>Ronkainen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ilkka</forename><surname>Känsälä</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia</title>
				<meeting>the 3rd international conference on Mobile and ubiquitous multimedia<address><addrLine>College Park, Maryland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="133" to="140" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">The AWARE Architecture: Supporting Context-Mediated Social Awareness in Mobile Cooperation</title>
		<author>
			<persName><forename type="first">Jakob</forename><forename type="middle">E</forename><surname>Bardram</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Thomas</forename><forename type="middle">R</forename><surname>Hansen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of CSCW&apos;04</title>
				<meeting>CSCW&apos;04<address><addrLine>Chicago, Illinois, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2004">November 6-10, 2004</date>
			<biblScope unit="page" from="192" to="201" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">An Ambient, Personalised, and Context-Sensitive Information System for Mobile Users</title>
		<author>
			<persName><forename type="first">Ayse</forename><surname>Göker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Stuart</forename><surname>Watt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hans</forename><forename type="middle">I</forename><surname>Myrhaug</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nik</forename><surname>Whitehead</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Murat</forename><surname>Yakici1</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ralf</forename><surname>Bierig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sree</forename><surname>Kanth Nuti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hannah</forename><surname>Cumming</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2nd European Union symposium on Ambient intelligence</title>
				<meeting>the 2nd European Union symposium on Ambient intelligence<address><addrLine>Eindhoven, the Netherlands</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2004-11">November 2004</date>
			<biblScope unit="page" from="19" to="24" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Usability Issues in Utilizing Context Metadata in Content Management of Mobile Devices</title>
		<author>
			<persName><forename type="first">Antti</forename><surname>Sorvari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Janne</forename><surname>Jalkanen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Riitta</forename><surname>Jokela</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alastair</forename><surname>Black</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kimmo</forename><surname>Koli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Marko</forename><surname>Moberg ; Keinonen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of NordiCHI &apos;04</title>
				<meeting>NordiCHI &apos;04</meeting>
		<imprint>
			<date type="published" when="2004">October 23-27, 2004</date>
		</imprint>
	</monogr>
	<note>Turkka</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Harrison: Bridging Physical and Virtual Worlds with Electronic Tags</title>
		<author>
			<persName><forename type="first">Roy</forename><surname>Want</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kenneth</forename><forename type="middle">P</forename><surname>Fishkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Anuj</forename><surname>Gujar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Beverly</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of CHI &apos;99</title>
				<meeting>CHI &apos;99<address><addrLine>Pittsburgh PA, USA</addrLine></address></meeting>
		<imprint>
			<biblScope unit="page" from="370" to="377" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Short-range Wireless Technologies with Mobile Payments Systems</title>
		<author>
			<persName><forename type="first">Jim</forename><surname>Jiajun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Carl</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><surname>Adams</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 6th international conference on Electronic commerce</title>
				<meeting>the 6th international conference on Electronic commerce<address><addrLine>Delft, The Netherlands</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="649" to="656" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Beyond Shallow Models of Emotion</title>
		<author>
			<persName><forename type="first">Aaron</forename><surname>Sloman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Workshop on Behaviour planning for life-like avatars, 13 Spring Days Workshop</title>
				<meeting><address><addrLine>Sitges, Spain</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1999-03">March 1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<idno>ECMA-340</idno>
		<ptr target="http://www.ecma-international.org/publications/standards/Ecma-340.htm" />
		<title level="m">Near Field Communication -Interface and Protocol (NFCIP-1)</title>
				<imprint>
			<date type="published" when="2004-12">December 2004</date>
		</imprint>
	</monogr>
	<note>2 nd edition</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Understanding and Using Context</title>
		<author>
			<persName><forename type="first">Anind</forename><surname>Dey</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Personal &amp; Ubiquitous Computing</title>
				<imprint>
			<date type="published" when="2001-02">Feb. 2001</date>
			<biblScope unit="page" from="4" to="7" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Day</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Aggarwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Mohr</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Vincent</surname></persName>
		</author>
		<ptr target="http://www.ietf.org/rfc/rfc2779.txt" />
		<title level="m">RFC 2779 -Instant Messaging / Presence Protocol Requirements</title>
				<imprint/>
	</monogr>
	<note>On-line document</note>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<author>
			<persName><forename type="first">Janne</forename><surname>Jalkanen</surname></persName>
		</author>
		<ptr target="http://www.jspwiki.org/" />
		<title level="m">JSPWiki</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Improv: A System for Scripting Interactive Actors in Virtual Worlds</title>
		<author>
			<persName><forename type="first">Ken</forename><surname>Perlin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Goldberg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Graphics</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">People, places, things: web presence for the real world</title>
		<author>
			<persName><forename type="first">Tim</forename><surname>Kindberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">John</forename><surname>Barton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jeff</forename><surname>Morgan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gene</forename><surname>Becker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Debbie</forename><surname>Caswell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Philippe</forename><surname>Debaty</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gita</forename><surname>Gopal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Marcos</forename><surname>Frid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Venky</forename><surname>Krishnan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Howard</forename><surname>Morris</surname></persName>
		</author>
		<author>
			<persName><forename type="first">John</forename><surname>Schettino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bill</forename><surname>Serra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mirjana</forename><surname>Spasojevic</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mobile Networks and Applications</title>
		<idno type="ISSN">:1383-469X</idno>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="365" to="376" />
			<date type="published" when="2002-10">October 2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">Black &amp; White. PC Game</title>
		<author>
			<persName><forename type="first">Peter</forename><surname>Molyneux</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
			<publisher>Lionhead Games</publisher>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
