@inproceedings{11818,
  abstract     = {{In this paper we present a system for indoor navigation based on received signal strength index information of Wireless-LAN access points and relative position estimates. The relative position information is gathered from inertial smartphone sensors using a step detection and an orientation estimate. Our map data is hosted on a server employing a map renderer and a SQL database. The database includes a complete multilevel office building, within which the user can navigate. During navigation, the client retrieves the position estimate from the server, together with the corresponding map tiles to visualize the user's position on the smartphone display.}},
  author       = {{Hoang, Manh Kha and Schmitz, Sarah and Drueke, Christian and Vu, Dang Hai Tran and Schmalenstroeer, Joerg and Haeb-Umbach, Reinhold}},
  booktitle    = {{Positioning Navigation and Communication (WPNC), 2013 10th Workshop on}},
  keywords     = {{SQL, navigation, smart phones, wireless LAN, RSSI, SQL database, complete multilevel office building, inertial sensor information, inertial smartphone sensors, map renderer, received signal strength index information, relative position estimates, server based indoor navigation, step detection, wireless-LAN access points, Smartphone, fingerprint, indoor navigation, map tile}},
  pages        = {{1--6}},
  title        = {{{Server based indoor navigation using RSSI and inertial sensor information}}},
  doi          = {{10.1109/WPNC.2013.6533263}},
  year         = {{2013}},
}

@inproceedings{5643,
  abstract     = {{Enduring doubts about the value of IS investments reveal that IS researchers have not fully managed to identify and to explain the economic benefits of IS. This paper assumes that literature reviews, which represent a powerful instrument for the identification and synthesis of knowledge, have not tapped their full potential to address this issue due to deficiencies in methodology. The analysis of 18 literature reviews published in pertinent academic outlets during the past 20 years shows such deficiencies. Two of the most critical weaknesses identified are (1) the lack of theory use in most reviews and (2) a weak linkage of reviews, resulting in little progress in theory and framework development. The systematic identification of these weaknesses and the extraction of promising methodological examples from past literature are the main contributions of this work, which supports the composition of more effective literature reviews in future research.}},
  author       = {{Schryen, Guido}},
  booktitle    = {{Proceedings of the First Scandinavian Conference on Information Systems (SCIS)}},
  keywords     = {{Literature review, Business value, Information systems, Methodology, Theory}},
  title        = {{{An Analysis of Literature Reviews on IS Business Value: How Deficiencies in Methodology and Theory Use Resulted in Limited Effectiveness}}},
  year         = {{2010}},
}

@article{5644,
  abstract     = {{The economic relevance of information systems has been studied for many years and has attracted an abundance of research papers. However, the ?productivity paradoxon? of the 90s, Carr?s widely recognized paper ?IT doesn?t matter?, and several studies that do not find a positive correlation between IS investments and economic performance reveal long-lasting difficulties for IS researchers to explain ?IS business value?. Business executives and researchers also continue to question the value of IS investments. This raises the question of whether literature reviews have tapped their potential to address the concerns by covering key research areas of IS business value and preserving their key findings. In order to address this question, this paper identifies and describes 12 key research areas, and synthesizes what literature reviews published in pertinent academic outlets have done to preserve knowledge. The analysis of 22 literature reviews shows that some crucial areas have not been (sufficiently) covered. They provide fertile areas for future literature reviews. As this work is based on the results of more than 200 research papers, it is capable of drawing a comprehensive picture of the current state-of-the-art in IS business value research.}},
  author       = {{Schryen, Guido}},
  journal      = {{Business \& Information Systems Engineering (BISE)}},
  keywords     = {{Business value, Information systems, Literature review, Meta review}},
  number       = {{4}},
  pages        = {{225--237}},
  publisher    = {{Springer}},
  title        = {{{Preserving knowledge on IS business value: what literature reviews have done}}},
  volume       = {{52}},
  year         = {{2010}},
}

@inproceedings{11726,
  abstract     = {{In this paper we present a robust location estimation algorithm especially focused on the accuracy in vertical position. A loosely-coupled error state space Kalman filter, which fuses sensor data of an Inertial Measurement Unit and the output of a Global Positioning System device, is augmented by height information from an altitude measurement unit. This unit consists of a barometric altimeter whose output is fused with topographic map information by a Kalman filter to provide robust information about the current vertical user position. These data replace the less reliable vertical position information provided the GPS device. It is shown that typical barometric errors like thermal divergences and fluctuations in the pressure due to changing weather conditions can be compensated by the topographic map information and the barometric error Kalman filter. The resulting height information is shown not only to be more reliable than height information provided by GPS. It also turns out that it leads to better attitude and thus better overall localization estimation accuracy due to the coupling of spatial orientations via the Direct Cosine Matrix. Results are presented both for artificially generated and field test data, where the user is moving by car.}},
  author       = {{Bevermeier, Maik and Walter, Oliver and Peschke, Sven and Haeb-Umbach, Reinhold}},
  booktitle    = {{7th Workshop on Positioning Navigation and Communication (WPNC 2010)}},
  keywords     = {{altitude measurement unit, barometers, barometric altimeter, barometric error Kalman filter, barometric height estimation, direct cosine matrix, global positioning system, Global Positioning System, GPS device, height information, height measurement, inertial measurement unit, Kalman filters, loosely-coupled error state space Kalman filter, loosely-coupled Kalman-filter, map matching, robust information, robust location estimation, sensor fusion, topographic map information, vertical user position}},
  pages        = {{128--134}},
  title        = {{{Barometric height estimation combined with map-matching in a loosely-coupled Kalman-filter}}},
  doi          = {{10.1109/WPNC.2010.5650745}},
  year         = {{2010}},
}

@article{6090,
  abstract     = {{Comments on an article by Jan Theeuwes (see record [rid]2010-20897-002[/rid]). Theeuwes summarizes an impressive number of studies demonstrating interference by irrelevant visual singletons in computer experiments with humans. Theeuwes assumes that this salience-driven capture of attention is fast and occurs within 150 ms since singleton onset, during the feed-forward phase of visual processing. In contrast to Theeuwes, we think that top–down contingent capture is the rule and explains initial and fast attention capture effects in the first feed-forward phase of visual processing. During a later phase and under some conditions exogenous capture of attention possibly follows. At the same time, we propose that the evidence presented by Theeuwes fails to support exogenous orienting because it fails to exclude a top–down contingent capture explanation. We present our arguments in two sections. One major source of evidence for top–down controlled attentional capture during the feed-forward}},
  author       = {{Ansorge, Ulrich and Horstmann, Gernot and Scharlau, Ingrid}},
  issn         = {{0001-6918}},
  journal      = {{Acta Psychologica}},
  keywords     = {{visual selection, attention, information, visual field, brain, Attention, Humans, Models, Psychological, Visual Perception, Volition, Brain, Visual Field, Visual Perception, Visual Attention, Information}},
  number       = {{2}},
  pages        = {{123 -- 126}},
  title        = {{{Top–down contingent attentional capture during feed-forward visual processing.}}},
  volume       = {{135}},
  year         = {{2010}},
}

@article{6083,
  abstract     = {{How fast can information of a first target (T1) in a rapid serial visual presentation be used for top-down allocation of attention in time? A valid cue about the temporal position of a second target (T2) was integrated into T1. The data show that 100 ms after T1 onset, T2 was identified better than without cue, raising the conditional T2 performance. T1 apparently triggers a facilitative effect of attention, known from other paradigms such as peripheral cueing. (PsycINFO Database Record (c) 2016 APA, all rights reserved)}},
  author       = {{Hilkenmeier, Frederic and Scharlau, Ingrid}},
  issn         = {{0954-1446}},
  journal      = {{European Journal of Cognitive Psychology}},
  keywords     = {{temporal attention, attentional blink paradigm, first target information, top-down allocation, rapid serial visual presentation, Stimulus Presentation Methods, Visual Stimulation, Visual Attention}},
  number       = {{8}},
  pages        = {{1222 -- 1234}},
  title        = {{{Rapid allocation of temporal attention in the attentional blink paradigm.}}},
  volume       = {{22}},
  year         = {{2010}},
}

@article{11892,
  abstract     = {{For an environment to be perceived as being smart, contextual information has to be gathered to adapt the system's behavior and its interface towards the user. Being a rich source of context information speech can be acquired unobtrusively by microphone arrays and then processed to extract information about the user and his environment. In this paper, a system for joint temporal segmentation, speaker localization, and identification is presented, which is supported by face identification from video data obtained from a steerable camera. Special attention is paid to latency aspects and online processing capabilities, as they are important for the application under investigation, namely ambient communication. It describes the vision of terminal-less, session-less and multi-modal telecommunication with remote partners, where the user can move freely within his home while the communication follows him. The speaker diarization serves as a context source, which has been integrated in a service-oriented middleware architecture and provided to the application to select the most appropriate I/O device and to steer the camera towards the speaker during ambient communication.}},
  author       = {{Schmalenstroeer, Joerg and Haeb-Umbach, Reinhold}},
  journal      = {{IEEE Journal of Selected Topics in Signal Processing}},
  keywords     = {{audio streaming, audio visual data streaming, context information speech, face identification, face recognition, image segmentation, middleware, multimodal telecommunication, online diarization, service oriented middleware architecture, sessionless telecommunication, software architecture, speaker identification, speaker localization, speaker recognition, steerable camera, telecommunication computing, temporal segmentation, terminal-less telecommunication, video streaming}},
  number       = {{5}},
  pages        = {{845--856}},
  title        = {{{Online Diarization of Streaming Audio-Visual Data for Smart Environments}}},
  doi          = {{10.1109/JSTSP.2010.2050519}},
  volume       = {{4}},
  year         = {{2010}},
}

@inproceedings{24065,
  author       = {{Pottebaum, Jens and Japs, Anna Maria and Prödel, Stephan and Koch, Rainer}},
  booktitle    = {{ISCRAM 2010 -- 7th International Conference on Information Systems for Crisis Response and Management}},
  editor       = {{French, Simon and Tomaszewski, Brian and Zobel, Chris}},
  keywords     = {{Command and control process, Command and control systems, Design and modeling, Domain ontologies, Emergency response, Fire extinguishers, Fire protection, Heterogeneous domains, Information analysis, Information sharing, Information systems, Interoperability, Ontology language, Semantic technologies, Semantic Web, Semantics}},
  title        = {{{Design and modeling of a domain ontology for fire protection}}},
  year         = {{2010}},
}

@inproceedings{1114,
  abstract     = {{This paper presents a system that uses the domain name of a German business website to locate its information pages (e.g. company profile, contact page, imprint) and then identifies business specific information. We therefore concentrate on the extraction of characteristic vocabulary like company names, addresses, contact details, CEOs, etc.  Above all, we interpret the HTML structure of documents and analyze some contextual facts to transform the unstructured web pages into structured forms. Our approach is quite robust in variability of the DOM, upgradeable and keeps data up-to-date. The evaluation experiments show high efficiency of information access to the generated data.  Hence, the developed technique is adaptive to non-German websites with slight language-specific modifications, and experimental results on real-life websites confirm the feasibility of the approach.}},
  author       = {{Lee, Yeong Su and Geierhos, Michaela}},
  booktitle    = {{Proceedings of the 9th Dutch-Belgian Information Retrieval Workshop}},
  editor       = {{Aly, Robin and Hauff, C. and Hiemstra, Djoerd and Huibers, Theo W.C. and de Jong, Franciska M.G.}},
  issn         = {{0929-0672}},
  keywords     = {{company search, information extraction, sublanguage}},
  location     = {{Enschede, The Netherlands}},
  pages        = {{79--86}},
  publisher    = {{Centre for Telematics and Information Technology (CTIT), University of Twente}},
  title        = {{{Business Specific Online Information Extraction from German Websites}}},
  year         = {{2009}},
}

@article{6087,
  abstract     = {{Visual backward masking is frequently used to study the temporal dynamics of visual perception. These dynamics may include the temporal features of conscious percepts, as suggested, for instance, by the asynchronous-updating model (Neumann, 1982) and perceptual-retouch theory (Bachmann, 1994). These models predict that the perceptual latency of a visual backward mask is shorter than that of a like reference stimulus that was not preceded by a masked stimulus. The prediction has been confirmed by studies using temporal-order judgments: For certain asynchronies between mask and reference stimulus, temporal-order reversals are quite frequent (e.g. Scharlau, & Neumann, 2003a). However, it may be argued that these reversals were due to a response bias in favour of the mask rather than true temporal-perceptual effects. I introduce two measures for assessing latency effects that (1) are not prone to such a response bias, (2) allow to quantify the latency gain, and (3) extend the perceptual e}},
  author       = {{Scharlau, Ingrid}},
  issn         = {{1895-1171}},
  journal      = {{Advances in Cognitive Psychology}},
  keywords     = {{temporal processes, prime mask interaction, perceptual consequences, masked information, visual backward masking, visual perception, Temporal Lobe, Visual Masking, Visual Perception, Consequence}},
  number       = {{1-2}},
  pages        = {{241 -- 255}},
  title        = {{{Temporal processes in prime-mask interaction: Assessing perceptual consequences of masked information.}}},
  volume       = {{3}},
  year         = {{2007}},
}

@article{6092,
  abstract     = {{The topic of the present edition is visual masking paradigms-as powerful tool for demonstrating the processing of nonconscious visual information. In the present issue one article presents an improved methodology for disentangling perceptual and temporal influences in markers. Another paper demonstrates that preemptive control, or DPS, mediates the allocation of attention towards possible targets. One of the contributions specify conditions under which DPS-like effects are found as opposed to conditions under which stimulus-driven effects are found. A study of two illusions which the prime may cause in a trailing stimulus, a temporal pre-dating of the mask and a perception of motion in later stimuli adjacent to the prime is presented in the issue. Another contribution addresses how the percept of a stimulus is altered by a temporal and spatial interplay of two backward masks or of one forward mask and two backwards masks. (PsycINFO Database Record (c) 2016 APA, all rights reserved)}},
  author       = {{Scharlau, Ingrid and Ansorge, Ulrich and Breitmeyer, Bruno G.}},
  issn         = {{1895-1171}},
  journal      = {{Advances in Cognitive Psychology}},
  keywords     = {{visual masking, visual information, attention, stimulus-driven effects, motion perception, Attention, Illusions (Perception), Motion Perception, Visual Masking}},
  number       = {{1}},
  pages        = {{1 -- 5}},
  title        = {{{Trends and styles in visual masking.}}},
  volume       = {{2}},
  year         = {{2006}},
}

@inproceedings{39496,
  abstract     = {{With the wide availability of network supporting hard-and software cooperative computer-based environments became extremely popular. A wide range of CSCW (Computer Supported Cooperative Work) tools with video conferencing, electronic mail, shared whiteboards, discussion forums, and shared information systems are already part of daily business. In contrast to the unstructured linear stream of information in electronic mails shared workspaces provide structured administration of electronic information like documents, voice, pictures, and movies. Popular examples of shared workspaces are BSCW (Basic Support for Cooperative Work), Hypernews, Lotus Notes, Alta Vista Forum, Lifelink, Microsoft Exchange and Webshare. Currently, all these systems are not flexible enough to get easily customized to the requirements of the individual application and user only supporting a limited set of predefined different views and functionality. This article introduces VIPspace (Visually Programmable Workspace). VIPspace can be easily customized to the individual needs of an user through VIPrule, a combination of a form- and icon-based visual programming language. VIPrule is based on an easy-to-use drag and drop paradigm. Direct manipulation via drag and drop allows easy access to local file systems as well as manipulation, exchange, and publication of shared multimedia documents. As VIPspace is implemented in Java it nicely integrates with other web-applications and provides a platform independent environment with a uniform graphical user interface.}},
  author       = {{Dücker, M. and Müller, Wolfgang and Rubart, Jessica}},
  booktitle    = {{ Proceedings. 1998 IEEE Symposium on Visual Languages }},
  isbn         = {{0-8186-8712-6}},
  keywords     = {{Collaborative work, Electronic mail, Computer networks, Video sharing, Videoconference, Discussion forums, Information systems, Streaming media, Motion pictures, Computer languages}},
  location     = {{Halifax, NS, Canada }},
  title        = {{{VIPspace - A Visually Programmable Shared Workspace}}},
  doi          = {{10.1109/VL.1998.706150}},
  year         = {{1998}},
}

