Frank Krüger

Learn More
In this paper we describe an implicit user interface for smart environment control: We make our system guess how to assist the user(s) proactively. Our controller is based on two formal descriptions: One that describes user activities, and another that specifies the devices in the environment. Putting both together, we can synthesize a probabilistic model,(More)
BACKGROUND Computational state space models (CSSMs) enable the knowledge-based construction of Bayesian filters for recognizing intentions and reconstructing activities of human protagonists in application domains such as smart environments, assisted living, or security. Computational, i. e., algorithmic, representations allow the construction of(More)
A consistent user experience in combination with proactive assistance may improve the user performance while interacting with heterogeneous data sources as e.g., occurring in business decision making. We describe our approach which is based on inferring the user intentions from sensory inputs, providing a situation aware information assistance, and(More)
We describe first experiments for controlling smart environments using a brain-computer interface. The graphical user interface is automatically synthesised from device models that specify effects of device functions on the environment. Thus, the number of interactions can be reduced, and a novel way of human machine interaction is introduced: Controlling(More)
Activity recognition is a challenging research problem in ubiquitous computing domain and has to tackle omnipresent uncertainties, e.g., resulting from ambiguous or intermittent sensor readings. In this paper, we introduce an activity recognition approach based on causal modeling and probabilistic plan recognition. To evaluate the performance of our(More)
Modern buildings are often equipped with universal bus systems. The purpose of these bus systems is to control the functions of houses such as lighting, climate control, and heating. In this paper we present a case study that shows how privacy issues evolve out of an untypical utilization of those control systems. As a controversial example, we show that we(More)