Subject: recommendation service | Context-aware | smartphone sensing
The context-aware concept is to reduce the gap between users and information systems so that the information systems actively get to understand users' context and demand and in return provide users with better experience. This study integrates the concept of context-awa... View more
 R. Agrawal and R. Srikan, “Fast algorithms for mining association rules,” Proceedings of the 20th international conference on very large data bases, San Francisco, CA, USA,1994, pp.478-499.
 T. Kowatsch and W. Maass, “In-store consumer behavior: How mobile recommendation agents influence usage intentions, product purchases, and store preferences,” Computers in Human Behavior, vol.26, No.4, pp.697-704, 2010.
 Y. L. Chen and Z.R. Chen, “A PID Positioning Controller with a Curve Fitting Model Based on RFID Technology,” Journal of Applied Research and Technology, vol. 11, no. 2, pp.301-310, 2013.
 J. Hightower et al., “SpotON: An indoor 3D location sensing technology based on RF signal strength,” UW CSE Technical Report, vol. 02, no. 02, pp1-16, 2000.
 W.W.T. Ngai et al., “RFID research: An academic literature review (1995-2005) and future research directions,”International Journal of Production Economics, vol.112, no.2, pp.510-520, 2008.
 P. Prasithsangaree et al., “On Indoor Position Location with Wireless LANs,” The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communication, no. 2, pp. 720-724, 2002.
 L.M. Ni et al., “LANDMARC: indoor location sensing using active RFID,” Wireless networks, vol.10, no.6, pp.701-710, 2004.
 V. Alarcon-Aquino et al., “Design and Implementation of a Security Layer for RFID Systems,” Journal of Applied Research and Technology, vol. 6, no.2, pp.69- 83, 2008.
 M. S. Amin et al., “Digital Modulator and Demodulator IC for RFID Tag Employing DSSS and Barker Code,” Journal of Applied Research and Technology, vol. 10, no. 6, pp.819-825, 2012.
 F.H. Grupe and M. M. Owrang, “Data base mining discovering new knowledge and competitive advantage”, Information Systems Management, vol. 12, no.1, pp. 26- 31, 1995.