Entity

Time filter

Source Type

Oslo, Norway

Fuglerud K.S.,Norsk Regnesentral | Sloan D.,University of Dundee
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2013

It is often said that universal design and similar approaches can be a source of innovation. In this paper key elements in inclusive design are identified, and examples of innovations related to inclusive design are presented. Then, some core elements of the inclusive design process that will help spur innovation are identified. Based on this the link between inclusive design and innovation is discussed. Finally, some recommendations for an inclusive and innovative design process are presented. © 2013 Springer-Verlag. Source


Dale O.,Norsk Regnesentral
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2010

Dementia is a chronic brain disease affecting cognitive functioning. People with dementia have a higher risk of getting lost. In recent years GPS based technology has been utilised to locate lost persons with dementia. We interviewed six families using such technology focusing on perceived usability, user-friendliness and usefulness. The informants also completed the QUEST 2.0 questionnaire which measures satisfaction with assistive technology. By and large the informants found the equipment easy to use, and it was viewed by all as being very useful. There were a number of usability issues which adversely affected usage, e.g. system stability, secure fastening, size, user interface issues and varying GPS-reception. The QUEST 2.0 results corresponded with the findings in the interviews. Further usability studies, as well as R&D to address issues such as security and privacy protection and use in the public health sector are needed. © 2010 Springer-Verlag Berlin Heidelberg. Source


Zibuschka J.,Fraunhofer Institute for Industrial Engineering | Fritsch L.,Norsk Regnesentral
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

We present a novel approach for password/credential storage in Pseudo-SSO scenarios based on a hybrid password hashing/password syncing approach that is directly applicable to the contemporary Web. The approach supports passwords without requiring modification of the server side and thus is immediately useful; however, it may still prove useful for storing more advanced credentials in future SSO and identity management scenarios, and offers a high password security, high availability and integration of secure elements while providing familiar interaction paradigms at a low cost. © 2012 Springer-Verlag. Source


Grant
Agency: Cordis | Branch: FP7 | Program: CP | Phase: ICT-2007.1.4 | Award Amount: 4.61M | Year: 2008

The core scientific focus of GEMOM is the significant and measurable increase in end-to-end intelligence and resilience of complex, distributed information systems. GEMOMs definition of intelligence and resilience include: - Insensitivity or significant reduction in sensitivity to individual and sometimes multiple faults in the system. Fault is defined as any deterioration of the functional profile of informational system, the volumetric profile, and the security profile - Support for a reconfiguration as an efficient system The primary objective of GEMOM is to research, develop and deploy a prototype of a messaging platform that is evolutionary, self-organising, self-healing, scalable and secure. GEMOM will be resilient and be able to utilise redundant modules (hot-swap or switchover) instantly without information loss. These resilience features will allow specialist, independent system actors, viz. watch-dogs, security and situation monitors, routers, and other optimisers, to remove or replace compromised nodes from the broader network instantly without compromising higher level functionality. GEMOM considers the Publish-Subscribe variant of Message Oriented Middleware to be the predominant one and will focus on issues surrounding that kind of messaging. For completeness GEMOM would provide a synchronous Request and Reply overlay as well. The advances that GEMOM proposes to make to the area of messaging revolve around the notion of a fault. In addition to the intuitive understanding of what a fault might be, whereby any actor stops being operable, connection is lost etc, GEMOM extends the notion of fault to include compromised security or inadequate bandwidth availability in the first iteration and compromised abstract notion of resource in its final iteration.


Dale O.,Norsk Regnesentral | Schulz T.,Norsk Regnesentral
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

We present an alternate mobile phone keyboard for inputing text, the JusFone Keyboard. This keyboard allows people to enter characters by resting their finger on a the desired key, and rocking to select a specific character. We ran user tests of the keyboard with 12 seniors comparing it against a touchscreen keyboard, a phone with large buttons, and an on-screen PC keyboard. The users found several things to like about the JusFone Keyboard, including comfort and size of keys and having direct access to characters. Users also had several suggestions about how to make the keyboard better such as making the text on the keys bigger and adjusting the spacing between keys. We also conducted a diary study of a user with reduced hand function who used the JusFone keyboard on his PC. The results indicate that the keyboard may be of assistance to persons with reduced hand function. © 2012 Springer-Verlag. Source

Discover hidden collaborations