<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark W. Newman</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Jungwoo Kim</style></author><author><style face="normal" font="default" size="100%">Atul Prakash</style></author><author><style face="normal" font="default" size="100%">Zhenan Hong</style></author><author><style face="normal" font="default" size="100%">Jacob Mandel</style></author><author><style face="normal" font="default" size="100%">Tao Dong</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Bringing the field into the lab: supporting capture and replay of contextual data for the design of context-aware applications</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 23nd annual ACM symposium on User interface software and technology (UIST ’10)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">context-aware</style></keyword><keyword><style  face="normal" font="default" size="100%">data capture</style></keyword><keyword><style  face="normal" font="default" size="100%">design tools</style></keyword><keyword><style  face="normal" font="default" size="100%">pervasive</style></keyword><keyword><style  face="normal" font="default" size="100%">pervasive environments</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">10/2010</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete-NoFile</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;When designing context-aware applications, it is difficult to for designers in the studio or lab to envision the contextual conditions that will be encountered at runtime. Designers need a tool that can create/re-create naturalistic contextual states and transitions, so that they can evaluate an application under expected contexts. We have designed and developed RePlay: a system for capturing and playing back sensor traces representing scenarios of use. RePlay contributes to research on ubicomp design tools by embodying a structured approach to the capture and playback of contextual data. In particular, RePlay supports: capturing naturalistic data through Capture Probes, encapsulating scenarios of use through Episodes, and supporting exploratory manipulation of scenarios through Transforms. Our experiences using RePlay in internal design projects illustrate its potential benefits for ubicomp design.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Tao Dong</style></author><author><style face="normal" font="default" size="100%">Gifford, Scott</style></author><author><style face="normal" font="default" size="100%">Kim, Jungwoo</style></author><author><style face="normal" font="default" size="100%">Mark W. Newman</style></author><author><style face="normal" font="default" size="100%">Atul Prakash</style></author><author><style face="normal" font="default" size="100%">Qidwai, Sarah</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Simplifying User-Controlled Privacy Policies</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Pervasive Computing</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">location-aware computing</style></keyword><keyword><style  face="normal" font="default" size="100%">location-based computing</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy-enhancing architectures</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy-protective applications</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">09/2009</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">8</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Location-aware computing infrastructures are becoming widely available.&lt;/p&gt;&lt;p&gt;However, a key problem remains: letting users manage their privacy while&lt;/p&gt;&lt;p&gt;also giving them interesting applications that take advantage of location&lt;/p&gt;&lt;p&gt;information.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue><section><style face="normal" font="default" size="100%">2</style></section></record></records></xml>