Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Trenton Schulz is active.

Publication


Featured researches published by Trenton Schulz.


ambient intelligence | 2011

On the Internet of Things, Trust is Relative

Lothar Fritsch; Arne-Kristian Groven; Trenton Schulz

End-users on the Internet of Things (IoT) will encounter many different devices and services; they will need to decide whether or not they can trust these devices and services with their information. We identify three items of trust information that end-users will need to determine if they should trust something on the IoT. We create a taxonomy of the likely scenarios end-users will encounter on the IoT and present five trust strategies for obtaining this trust information. Upon applying these strategies to our scenarios, we find that there is no strategy that can work efficiently and effectively in every situations; end-users will need to apply the strategy that best fits their current situation. Offering multiple trust strategies in parallel and having this information transparent to end-users will ensure a sustainable IoT.


Archive | 2011

Quality of Service, Adaptation, and Security Provisioning in Wireless Patient Monitoring Systems

Wolfgang Leister; Trenton Schulz; Arne Lie; Knut Grythe; Ilangko Balasingham

Modern patient monitoring systems are designed to put the individual into the centre of the system architecture. In this paradigm, the patient is seen as a source of health-relevant data that are processed and transferred. Patient monitoring systems are used in health care enterprises as well as in paramedic, mobile, and home situations to foster ambient assisted living (AAL) scenarios. There are a multitude of standards and products available to support Quality of Service (QoS) and security goals in patient monitoring systems. Yet, an architecture that supports these goals from data aggregation to data transmission and visualisation for end user has not been developed. Medical data from patient monitoring systems includes sampled values from measurements, sound, images, and video. These data often have a time-aspect where several data streams need to be synchronised. Therefore, rendering data from patient monitoring systems can be considered an advanced form of multimedia data. We propose a framework that will fill this QoS and security gap and provide a solution that allows medical personnel better access to data and more mobility to the patients. The framework is based on MPEG-21 and wireless sensor networks. It allows for end-to-end optimisation and presentation of multimedia sensor data. The framework also addresses the QoS, adaptation and security concerns of handling this data. In Section 2 we present background on patient monitoring systems, their requirements and how we envision communication is handled. We present communication systems in Section 3 and how to treat QoS in Section 4. A short introduction to data streaming, binary XML and how they relate to patient monitoring systems is presented in Section 5. In Section 6we our proposed solution for the framework and present a security analysis of it in Section 7. Finally, we offer our conclusions in Section 8. 36


international conference on universal access in human-computer interaction | 2015

Applying Universal Design Principles to Themes for Wearables

Vladimir Tomberg; Trenton Schulz; Sebastian Kelle

Wearable computing offers new opportunities for technology to help us in many different contexts. Yet, it is important that designers of wearable devices take into account Universal Design principles to ensure that as many people as possible can benefit. We discuss the possible advantages of applying universal design principles to different themes that wearable technologies address. We use six themes that are driving wearable enhancements. These themes cut across industry and use cases; most wearable technologies will use at least one of these themes. We take each of the universal design principles and see how they apply to each theme and what advantages can be expected from such an application. The study shows that a balance needs to be achieved to the accessibility, usability, and general use of a wearable device.


trust and trustworthy computing | 2013

All In: Targeting Trustworthiness for Special Needs User Groups in the Internet of Things

Marc Busch; Christina Hochleitner; Mario Lorenz; Trenton Schulz; Manfred Tscheligi; Eckhart Wittstock

We showcase how privacy, security, and trust requirements of people with mental and physical disabilities can be integrated in the development of smart home applications and devices. We present our chosen process leading to trustworthy design of a smart medicine cabinet that informs about potential privacy and security risks along with helping users manage their life.


international conference on learning and collaboration technologies | 2014

Creating Universal Designed and Trustworthy Objects for the Internet of Things

Trenton Schulz

The Internet of Things promises to connect different kinds of devices, allow for new ways of interaction, and make our lives easier. But, we need to be able to trust that the Internet of Things will protect our security and privacy. It should also be universally designed so that anyone can use it regardless of ability. We applied a user-centered approach to looking at user-centered trust in the Internet of Things, including universal design issues. We conducted an evaluation with 85 participants of a security assistant that can present security and privacy information to users. The evaluation included participants who were either elderly, had vision impairment, or had dsylexia. Participants found the information useful, but there was confusion about how the UI worked. We present an updated security assistant and future areas for research in trust and the Internet of Things.


international conference on human-computer interaction | 2013

Increasing Trust Perceptions in the Internet of Things

Trenton Schulz; Ingvar Tjøstheim

When interacting with objects and services in the Internet of Things, people will need to trust that their data is safe, and that “things” will do what they promise they will do. As part of a user evaluation of a toolkit for providing security and privacy information to users, we created two models to find a pattern in changes in the perception of trust in the participants. The model based on demographics was not very descriptive. But, the model based on participants’ privacy concerns and trust traits revealed a good match between changes in trust based on information from our toolkit. While there were some limitations in the current study, it showed how TFT can be improved for future evaluations.


international conference on computers helping people with special needs | 2012

Easier mobile phone input using the jusfone keyboard

Øystein Dale; Trenton Schulz

We present an alternate mobile phone keyboard for inputing text, the JusFone Keyboard. This keyboard allows people to enter characters by resting their finger on a the desired key, and rocking to select a specific character. We ran user tests of the keyboard with 12 seniors comparing it against a touchscreen keyboard, a phone with large buttons, and an on-screen PC keyboard. The users found several things to like about the JusFone Keyboard, including comfort and size of keys and having direct access to characters. Users also had several suggestions about how to make the keyboard better such as making the text on the keys bigger and adjusting the spacing between keys. We also conducted a diary study of a user with reduced hand function who used the JusFone keyboard on his PC. The results indicate that the keyboard may be of assistance to persons with reduced hand function.


quality of multimedia experience | 2015

The role of emotion and enjoyment for QoE — A case study of a science centre installation

Ingvar Tjøstheim; Wolfgang Leister; Trenton Schulz; Andreas Larssen

We performed a user evaluation in a science centre to uncover the impact of emotion and enjoyment on the perceived Quality of Experience. In an evaluation with 60 students, we assessed data from the use of an installation and relate Positive And Negative Affect Schedule (PANAS) scales and other subjective and objective data using the partial least square methodology. We present interpretations for how participants, winners, and losers of a quiz game in the science centre experience their visit.


nordic conference on human-computer interaction | 2018

The role of animacy for communicating behavior in robots.

Trenton Schulz; Rebekka Soma

This paper examines the role perception of movements has had in the development for biological systems. We used a phenomenological investigation into perception in nature. This investigation enables us to look at how concepts and techniques from film animation can be applied to communicate robot behavior. Finally, we discuss future work and research.


international conference on human-computer interaction | 2018

Privacy at Home: An Inquiry into Sensors and Robots for the Stay at Home Elderly

Trenton Schulz; Jo Herstad; Harald Holone

The elderly in the future will use smart house technology, sensors, and robots to stay at home longer. Privacy at home for these elderly is important. In this exploratory paper, we examine different understandings of privacy and use Palen and Dourish’s framework to look at the negotiation of privacy along boundaries between a human at home, the robot, and its sensors. We select three dilemmas: turning sensors on and off, the robot seeing through walls, and machine learning. We discuss these dilemmas and also discuss ways the robot can help make the elderly more aware of privacy issues and to build trust.

Collaboration


Dive into the Trenton Schulz's collaboration.

Top Co-Authors

Avatar

Wolfgang Leister

Norwegian Computing Center

View shared research outputs
Top Co-Authors

Avatar

Christina Hochleitner

Austrian Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Lothar Fritsch

Norwegian Computing Center

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ivar Solheim

Norwegian Computing Center

View shared research outputs
Top Co-Authors

Avatar

Marc Busch

Austrian Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Franziska Pürzel

Chemnitz University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jos Dumortier

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Niels Vandezande

Katholieke Universiteit Leuven

View shared research outputs
Researchain Logo
Decentralizing Knowledge