Ubiquitous Computing

Total Page:16

File Type:pdf, Size:1020Kb

Ubiquitous Computing Ubiquitous Computing UbiquitousComputing:SmartDevices,EnvironmentsandInteractions StefanPoslad © 2009JohnWiley&Sons,Ltd. ISBN: 978-0-470-03560-3 Ubiquitous Computing Smart Devices, Environments and Interactions Stefan Poslad Queen Mary, University of London, UK A John Wiley and Sons, Ltd, Publication This edition first published 2009 Ó 2009 John Wiley & Sons Ltd., Registered office John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com. The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought. Library of Congress Cataloging in Publication Data Poslad, Stefan. Ubiquitous computing : smart device, environment, and interactions / Stefan Poslad. p. cm. Includes index. ISBN 978 0 470 03560 3 (cloth) 1. Ubiquitous computing. 2. Context aware computing. 3. Human computer interaction. I. Title. QA76.5915.P67 2009 004 dc22 2008052234 A catalogue record for this book is available from the British Library. ISBN 978 0 470 03560 3 (H/B) Set in 9/11pt Times by Integra Software Services Pvt. Ltd. Pondicherry, India Printed and bound in Great Britain by Antony Rowe, Chippenham, UK To my family, Ros and Ben here, and to friends and family in three wonderful parts of the world, South Wales (UK), Glandorf and Brisbane. Contents List of Figures xix List of Tables xxiii Preface xxv Acknowledgements xxvii 1 Ubiquitous Computing: Basics and Vision 1 1.1 Living in a Digital World 1 1.1.1 Chapter Overview 2 1.1.2 Illustrative Ubiquitous Computing Applications 2 1.1.2.1 Personal Memories 3 1.1.2.2 Adaptive Transport Scheduled Service 5 1.1.2.3 Foodstuff Management 5 1.1.2.4 Utility Regulation 6 1.1.3 Holistic Framework for UbiCom: Smart DEI 7 1.2 Modelling the Key Ubiquitous Computing Properties 8 1.2.1 Core Properties of UbiCom Systems 9 1.2.2 Distributed ICT Systems 9 1.2.2.1 Networked ICT Devices 10 1.2.2.2 Transparency and Openness 10 1.2.3 Implicit Human Computer Interaction (iHCI) 11 1.2.3.1 The Calm Computer 11 1.2.3.2 Implicit Versus Explicit Human Computer Interaction 12 1.2.3.3 Embodied Reality versus Virtual, Augmented and Mediated Reality 12 1.2.4 Context Awareness 13 1.2.4.1 Three Main Types of Environment Context: Physical, User, Virtual 14 1.2.4.2 User Awareness 14 1.2.4.3 Active Versus Passive Context Awareness 15 1.2.5 Autonomy 15 1.2.5.1 Reducing Human Interaction 16 1.2.5.2 Easing System Maintenance Versus Self Maintaining Systems 16 viii Contents 1.2.6 Intelligence 17 1.2.7 Taxonomy of UbiCom Properties 17 1.3 Ubiquitous System Environment Interaction 22 1.3.1 Human ICT Device Interaction (HCI) 24 1.3.2 ICT Device to Physical World Interaction (CPI) 25 1.4 Architectural Design for UbiCom Systems: Smart DEI Model 26 1.4.1 Smart Devices 27 1.4.1.1 Weiser’s ICT Device Forms: Tabs, Pads and Boards 28 1.4.1.2 Extended Forms for ICT Devices: Dust, Skin and Clay 28 1.4.1.3 Mobility 29 1.4.1.4 Volatile Service Access 29 1.4.1.5 Situated and Self Aware 30 1.4.2 Smart Environments 30 1.4.2.1 Tagging, Sensing and Controlling Environments 31 1.4.2.2 Embedded Versus Untethered 31 1.4.2.3 Device Sizes 32 1.4.3 Smart Interaction 32 1.4.3.1 Basic Interaction 32 1.4.3.2 Smart Interaction 33 1.5 Discussion 34 1.5.1 Interlinking System Properties, Environments and Designs 34 1.5.2 Common Myths about Ubiquitous Computing 35 1.5.3 Organisation of the Smart DEI Approach 37 Exercises 38 References 39 2 Applications and Requirements 41 2.1 Introduction 41 2.1.1 Overview 41 2.2 Example Early UbiCom Research Projects 41 2.2.1 Smart Devices: CCI 42 2.2.1.1 Smart Boards, Pads and Tabs 42 2.2.1.2 Active Badge, Bat and Floor 42 2.2.2 Smart Environments: CPI and CCI 43 2.2.2.1 Classroom 2000 43 2.2.2.2 Smart Space and Meeting Room 43 2.2.2.3 Interactive Workspaces and iRoom 44 2.2.2.4 Cooltown 44 2.2.2.5 EasyLiving and SPOT 45 2.2.2.6 HomeLab and Ambient Intelligence 46 2.2.3 Smart Devices: CPI 46 2.2.3.1 Unimate and MH 1 Robots 46 2.2.3.2 Smart Dust and TinyOS 47 2.2.4 Smart Devices: iHCI and HPI 48 2.2.4.1 Calm Computing 48 2.2.4.2 Things That Think and Tangible Bits 48 2.2.4.3 DataTiles 49 2.2.4.4 Ambient Wood 50 2.2.4.5 WearComp and WearCam 50 2.2.4.6 Cyborg 1.0 and 2.0 52 2.2.5 Other UbiCom Projects 52 Contents ix 2.3 Everyday Applications in the Virtual, Human and Physical World 53 2.3.1 Ubiquitous Networks of Devices: CCI 53 2.3.2 Human Computer Interaction 54 2.3.2.1 Ubiquitous Audio Video Content Access 54 2.3.2.2 Ubiquitous Information Access and Ebooks 55 2.3.2.3 Universal Local Control of ICT Systems 56 2.3.2.4 User Awareness and Personal Spaces 58 2.3.3 Human to Human Interaction (HHI) Applications 58 2.3.3.1 Transaction based M Commerce and U Commerce Services 59 2.3.3.2 Enhancing the Productivity of Mobile Humans 59 2.3.3.3 Care in the Community 60 2.3.4 Human Physical World Computer Interaction (HPI) and (CPI) 61 2.3.4.1 Physical Environment Awareness 61 2.3.4.2 (Physical) Environment Control 61 2.3.4.3 Smart Utilities 62 2.3.4.4 Smart Buildings and Home Automation 62 2.3.4.5 Smart Living Environments and Smart Furniture 63 2.3.4.6 Smart Street Furniture 65 2.3.4.7 Smart Vehicles, Transport and Travel 65 2.3.4.8 Pervasive Games and Social Physical Spaces 66 2.4 Discussion 67 2.4.1 Achievements from Early Projects and Status Today 67 2.4.1.1 Smart Devices 67 2.4.1.2 Smart Physical World Environments 68 2.4.1.3 Context Awareness and Service Discovery 69 2.4.1.4 Wearable Smart Devices and Implants 69 Exercises 71 References 71 3 Smart Devices and Services 75 3.1 Introduction 75 3.1.1 Chapter Overview 75 3.1.2 Smart Device and Service Characteristics 75 3.1.3 Distributed System Viewpoints 77 3.1.4 Abstraction Versus Virtualisation 78 3.2 Service Architecture Models 80 3.2.1 Partitioning and Distribution of Service Components 80 3.2.2 Multi tier Client Service Models 81 3.2.2.1 Distributed Data Storage 82 3.2.2.2 Distributed Processing 82 3.2.2.3 Client Server Design 83 3.2.2.4 Proxy based Service Access 84 3.2.3 Middleware 85 3.2.4 Service Oriented Computing (SOC) 86 3.2.5 Grid Computing 87 3.2.6 Peer to Peer Systems 88 3.2.7 Device Models 91 3.3 Service Provision Life Cycle 91 3.3.1 Network Discovery 92 3.3.2 Service Announcement, Discovery, Selection and Configuration 93 x Contents 3.3.2.1 Web Service Discovery 95 3.3.2.2 Semantic Web and Semantic Resource Discovery 95 3.3.3 Service Invocation 95 3.3.3.1 Distributed Processes 96 3.3.3.2 Asynchronous (MOM) Versus Synchronous (RPC) Communication Models 97 3.3.3.3 Reliable versus Unreliable Communication 99 3.3.3.4 Caches, Read Ahead and Delayed Writes 99 3.3.3.5 On Demand Service Access 100 3.3.3.6 Event Driven Architectures (EDA) 101 3.3.3.7 Shared Data Repository 103 3.3.3.8 Enterprise Service Bus (ESB) Model 103 3.3.3.9 Volatile Service Invocation 104 3.3.4 Service Composition 105 3.3.4.1 Service Interoperability 106 3.4 Virtual Machines and Operating Systems 106 3.4.1 Virtual Machines 106 3.4.2 BIOS 107 3.4.3 Multi Tasking Operating Systems (MTOS) 108 3.4.4 Process Control 109 3.4.5 Memory Management 110 3.4.6 Input and Output 111 Exercises 111 References 112 4 Smart Mobiles, Cards and Device Networks 115 4.1 Introduction 115 4.1.1 Chapter Overview 115 4.2 Smart Mobile Devices, Users, Resources and Code 115 4.2.1 Mobile Service Design 116 4.2.1.1 SMS and Mobile Web Services 117 4.2.1.2 Java VM and J2ME 119 4.2.1.3 .NET CF 120 4.2.2 Mobile Code 121 4.2.3 Mobile Devices and Mobile Users 122 4.3 Operating Systems for Mobile Computers and Communicator Devices 123 4.3.1 Microkernel Designs 123 4.3.2 Mobility Support 123 4.3.3 Resource Constrained Devices 124 4.3.4 Power Management 125 4.3.4.1 Low Power CPUs 125 4.3.4.2 Application Support 126 4.4 Smart Card Devices 126 4.4.1 Smart Card OS 127 4.4.2 Smart Card Development 128 4.5 Device Networks 128 4.5.1 HAVi, HES and X10 129 4.5.2 Device Discovery 129 4.5.3 OSGi 131 Exercises 132 References 133 Contents xi 5 Human–Computer Interaction 135 5.1 Introduction 135 5.1.1 Chapter Overview 135 5.1.2 Explicit HCI: Motivation and Characteristics 136 5.1.3 Complexity of Ubiquitous Explicit HCI 136 5.1.4 Implicit HCI: Motivation and Characteristics 137 5.2 User Interfaces and Interaction for Four Widely
Recommended publications
  • Mobile Phones and Cloud Computing
    Mobile phones and cloud computing A quantitative research paper on mobile phone application offloading by cloud computing utilization Oskar Hamrén Department of informatics Human Computer Interaction Master’s programme Master thesis 2-year level, 30 credits SPM 2012.07 Abstract The development of the mobile phone has been rapid. From being a device mainly used for phone calls and writing text messages the mobile phone of today, or commonly referred to as the smartphone, has become a multi-purpose device. Because of its size and thermal constraints there are certain limitations in areas of battery life and computational capabilities. Some say that cloud computing is just another buzzword, a way to sell already existing technology. Others claim that it has the potential to transform the whole IT-industry. This thesis is covering the intersection of these two fields by investigating if it is possible to increase the speed of mobile phones by offloading computational heavy mobile phone application functions by using cloud computing. A mobile phone application was developed that conducts three computational heavy tests. The tests were run twice, by not using cloud computing offloading and by using it. The time taken to carry out the tests were saved and later compared to see if it is faster to use cloud computing in comparison to not use it. The results showed that it is not beneficial to use cloud computing to carry out these types of tasks; it is faster to use the mobile phone. 1 Table of Contents Abstract ..................................................................................................................................... 1 Table of Contents ..................................................................................................................... 2 1. Introduction .......................................................................................................................... 5 1.1 Previous research ........................................................................................................................
    [Show full text]
  • Uses and Effects of Mobile Computing Devices in K–8 Classrooms
    Uses and Effects of Mobile Computing Devices in K–8 Classrooms Karen Swan Mark van ‘t Hooft Annette Kratcoski Kent State University Darlene Unger Virginia Commonwealth University Abstract This preliminary study employed mixed methodologies to explore students’ use of mobile comput- ing devices and its effects on their motivation to learn, engagement in learning activities, and support for learning processes. Data collected from students in four elementary and two seventh grade science classes in Northeast Ohio included usage logs, student work samples, student and teacher interviews, and classroom observations. Findings highlight the personalization of learning afforded by such devices both in terms of individuals and individual classroom cultures, as well as their usefulness in extending learning beyond the classroom. They also sug- gest that increased motivation due to mobile device use leads to increases in the quality and quantity of student work. (Keywords: mobile computing, motivation, writing.) BACKGROUND More than a decade ago, Mark Weiser (1991) wrote that we live in a society in which technology is so pervasive that we do not notice it anymore when used for everyday tasks such as information retrieval, communication, and entertainment. Defining this environment as ubiquitous computing, he described it more as a state of mind, as “a new way of thinking about computers in the world . [that] allows the computers themselves to vanish into the background . [and] be- come indistinguishable from everyday life” (p. 94). As a result, the current gener- ation of K–12 students is growing up more technologically literate than children their age were a decade ago, with access to an increasing number of devices and services such as video game consoles, mobile gaming devices, cell phones, the In- ternet, and instant messaging.
    [Show full text]
  • On Energy Consumption of Mobile Cloud Gaming Using Gaminganywhere
    Thesis no.:MSEE-2016-54 On energy consumption of mobile cloud gaming using GamingAnywhere Suren Musinada Faculty of Computing Blekinge Institute of Technology SE–371 79 Karlskrona, Sweden This thesis is submitted to the Faculty of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Masters in Electrical Engineering with Emphasis on Telecommunication Systems. The thesis is equivalent to 20 weeks of full time studies. Contact Information: Author(s): Suren Musinada E-mail: [email protected] University advisor: Dr. Yong Yao Department of communication systems E-mail: [email protected] Faculty of Computing Internet : www.bth.se Blekinge Institute of Technology Phone : +46 455 38 50 00 SE–371 79 Karlskrona, Sweden Fax : +46 455 38 50 57 Abstract In the contemporary world, there has been a great proliferation of using smart-phone devices and broadband wireless networks, the young gener- ation using mobile gaming market is tremendously increasing because of the enormous entertainment features. Mobile cloud gaming is a promising technology that overcome the implicit restrictions such as computational capacity and limited battery life. GamingAnywhere is an open source cloud gaming system which is used in this thesis and calculate the energy con- sumption of mobile device when using GamingAnywhere. The aim of the thesis is to measure the power consumption of the mo- bile device when the game is streamed from the GamingAnywhere server to GamingAnywhere client. Total power consumption is calculated for four resolutions by using the hardware monsoon power monitoring tool and the individual components of mobile device such as CPU, LCD and Audio power are calculated by software PowerTutor.
    [Show full text]
  • Mobile Supercomputers
    EMBEDDED COMPUTING ing. We also anticipate the emergence of relatively simple, disposable devices Mobile that support the pervasive computing infrastructure—for example, sensor network nodes. The requirements of low-end devices Supercomputers are increasing exponentially, and com- puter architectures must adapt to keep Todd Austin, David Blaauw, Scott Mahlke, up. Some elements of high-end devices and Trevor Mudge, University of Michigan are already present in 3G cell phones Chaitali Chakrabarti, Arizona State University from the major manufacturers. High- Wayne Wolf, Princeton University end PDAs also include an amazing range of features, such as networking and cameras. oore’s law has held sway over the past several Current trends in computer decades, with the number architecture and power cannot M of transistors per chip doubling every 18 meet the demands of mobile months. As a result, a fairly inexpen- supercomputing. Significant sive CPU can perform hundreds of millions of operations per second— innovation is required. performance that would have cost mil- lions of dollars two decades ago. We should be proud of our achieve- puters. Rather than worrying solely SUPERCOMPUTING REQUIREMENTS ments and rest on our laurels, right? about performance, with the occa- A mobile supercomputer will employ Unfortunately, no. sional nod to power consumption and natural I/O interfaces to the mobile The human appetite for computation cost, we need to judge computers by user. For example, input could come has grown even faster than the pro- their performance-power-cost product. through a continuous real-time speech- cessing power that Moore’s law pre- This new way of looking at proces- processing component.
    [Show full text]
  • Private Data Protection in Ubiquitous Computing
    UBICOMM 2016 : The Tenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies Private Data Protection in Ubiquitous Computing Malika Yaici Samia Ameza¤, Ryma Houariy and Sabrina Hammachiz Laboratoire LTII Computer Department, University of Bejaia University of Bejaia Bejaia, 06000, Algeria Bejaia, 06000, Algeria ¤[email protected] [email protected] [email protected] [email protected] Abstract—A system in ubiquitous computing consists of a large care and safety where the end-user has authorized credentials amount of heterogeneous users and devices that communicate anonymity. with each other. Users in this dynamic field communicate with lightweight and autonomous devices, which accentuate security In [3], the author uses the framework of contextual integrity problems and make them more complex. The existing mechanisms related to privacy, developed by Nissenbaum in 2010 [4], as and solutions are inadequate to address new challenges mainly a tool to understand citizen’s response to the implementation for problems of authentication and protection of privacy. In this of IoT related technology in a supermarket. The purpose was paper, a new security architecture called Tree Based distributed to identify and understand specific changes in information Privacy Protection System is proposed. It supports protection of practices brought about by the IoT that may be perceived users private data and addresses the shortcomings of systems as privacy violations. Issues identified included the mining of like GAIA, OpenID and User-directed Privacy Protection (UPP). medical data, invasive targeted advertising, and loss of auton- Furthermore, it takes into account the domain dissociation omy through marketing profiles or personal affect monitoring.
    [Show full text]
  • The Application of Personal Digital Assistants As Mobile Computing Device on Construction Site
    The Application of Personal Digital Assistants as Mobile Computing Device on Construction Site Kenji Kimoto, Kazuyoshi Endo, Satoru Iwashita and Mitsuhiro Fujiwara Konoike Construction Co., Ltd., Research Institute of Technology 1-20-1 Sakura, Tsukuba-Science City, IBARAKI 305-0003, Japan. {kimoto_kj, Iwashita_st, fujiwara_mh}@konoike.co.jp . Kogakuin University, Department of Architecture, 1-24-2 Nishishinjuku, Shinjyuku-ku, TOKYO 163-8677, Japan. [email protected] ABSTRACT: Construction managers need to access the real construction site to manage the construction project. They have recently handled various types of digital information such as drawings, specification, checklists and daily reports. They usually use sheets of paper and/or field notes. As a result, a gap in time and space between the outdoor construction site and the office, which leads to the low efficiency, occurs. This paper reports the application of PDA (Personal Digital Assistants) as mobile computing device for construction managers on construction sites. First, this paper describes the aim and the essential element of the mobile systems. This also shows the analysis of necessary functions as mobile computing device through the discussion with construction managers, and the concept of development of this computer-aided engineering system. Secondly, this paper describes the outline of below subsystems with PDA: Progress Monitoring System, Inspection System and Position Check System. Subsystems have two programs: the data input program in PDA and the output program in PC. Finally, this paper indicates the development of more refined process of construction management with the mobile computing device on construction site. • Progress Monitoring System has been built for construction managers to monitor the progress of works.
    [Show full text]
  • Consumer Data and Privacy in Ubiquitous Computing
    ESPOO 2007 VTT PUBLICATIONS 647 VTT PUBLICATIONS VTT PUBLICATIONS 647 Consumer Data and Privacy in Ubiquitous Computing 629 Communications Technologies. VTT's Research Programme 2002–2006. Final Report. Ed. by Markku Sipilä. 2007. 354 p. 630 Solehmainen, Kimmo. Fabrication of microphotonic waveguide components on silicon. 2007. 68 p. + app. 35 p. 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 631 Törrö, Maaretta. Global intellectual capital brokering. Facilitating the emergence of 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 innovations through network mediation. 106 p. + app. 2 p. 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 632 Lanne, Marinka. Yhteistyö yritysturvallisuuden hallinnassa. Tutkimus sisäisen 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345
    [Show full text]
  • Ambient Multimodality: an Asset for Developing Universal Access to the Information Society
    Ambient Multimodality: an Asset for Developing Universal Access to the Information Society Noëlle Carbonell University Henri Poincaré, LORIA, CNRS & INRIA LORIA, Campus Scientifique BP 249 F54506 Vandœuvre-lès-Nancy Cedex France [email protected] Abstract Our aim is to point out the benefits that can be derived from research advances in the implementation of concepts such as ambient intelligence and ubiquitous/pervasive computing for promoting Universal Access to the Information Society, that is, for contributing to enable everybody, especially people with physical disabilities, to have easy access to all computing resources and information services that the coming worldwide Information Society will make available to the general public as well as to expert users in the near future. Following definitions of basic concepts relating to multimodal interaction, the significant contribution of multimodality to developing Universal Access is briefly discussed. Then, a short state of the art in ambient intelligence research is presented, including references to some of the major recent and current research projects in this area. The last section is devoted to bringing out the potential contribution of advances in ambient intelligence research and technology to the improvement of computer access for physically disabled people, hence, to the implementation of Universal Access. This claim is mainly supported by the following observations: (i) most projects aiming at implementing ambient intelligence focus their research efforts on the design
    [Show full text]
  • Ubiquitous Commerce: Ubiquitous Computing Based Commerce Dolly Amit Pruthi Deptt
    Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Ubiquitous Commerce: Ubiquitous Computing Based Commerce Dolly Amit Pruthi Deptt. of Computer Science & Applications, G.J. University of Sci. & Tech., M.D. University, Rohtak, India Hisar, India Abstract- With the rapid advancement in field of networking and communications, no aspect of human life is untouched. Commercial activities are also affected by the new advancements. Traditional commercial activities are changed and modified with the passage of time. Firstly, the age of E-Commerce arrived, then M-Commerce. Now, after E-Commerce and M-Commerce, the age of Ultimate Commerce is arrived. Any time/ Always/ Anywhere service providing is the key to this ultimate or ubiquitous commerce. This paper studies the concept of ubiquitous computing and its adaption to commerce with new issues associated. Keywords- Ubiquitous computing, Ubiquitous commerce. I. INTRODUCTION Ubiquitous commerce, also referred to as „u-commerce‟ is a new paradigm that broadens and extends the Internet usage in today‟s environment. With the rapid development of ubiquitous computing and mobile communication technologies, the traditional business model is changing drastically. As a logical extension of e-commerce and m-commerce, Watson proposed the concept of ubiquitous commerce (u-commerce) in 2000. As the next generation business model, it immediately gained a lot of attention. U-commerce emerges as a continuous, seamless stream of communication, content and services exchanged among businesses, suppliers, employees, customers, and products. It will enable interactions and transactions to happen anywhere and at any time without being constrained to stay connected through power and telephone lines.
    [Show full text]
  • Ubiquitous Computing: Trends and History
    Ubiquitous Computing: Trends and History Lecture 2 CSI 660, William A. Maniatty, Dept. of Computer Science, University at Albany 1 Introduction Review: What is Ubiquitous Computing? • Immerses computers in a real environment • Sensors support interact with and control the environment. • Limited power supply, storage, memory and bandwidth. • Operate unattended (much like embedded systems). • Devices are mobile/wireless. • May reside on a person (wearable computing). • Have special peripherals. • Contrast this with virtual reality which immerses humans in a computer generated articial environment. CSI 660, William A. Maniatty, Dept. of Computer Science, University at Albany 2 Historical Origins and Trends Computers are becoming smaller and cheaper over time • Originally few computers many operators . Machines Expensive and Large . People (relatively) cheap • Trend toward more computers per person . Users may not be tech savvy . Even tech savvy users have limited time . Minimal intervention is required People don't want to be separated from their data • But spying on users upsets them • And can violate laws - security is important • Mobility and wireless access are critical. CSI 660, William A. Maniatty, Dept. of Computer Science, University at Albany 3 Some Popular Views Many visions were popularized in the press • First to work on it, although other visionaries preceded him • Entertainment Industry (Ian Fleming, Gene Rodenberry) • Vanaver Bush's seminal article [1] As We Might Think predicted the WWW and Ubiquitous Computing in 1945! • Vernor Vinge (retired Computer Science Professor and Science ction writer) has interesting ubiquitous computing visions. • Movies: The Terminator, numerous Philip K. Dick books and screen plays (Blade Runner, Total Recall, Minority Report). Has been popular in the research community for over a decade CSI 660, William A.
    [Show full text]
  • Wearable and Ubiquitous Computing
    Education & Training Editor: Scott F. Midkiff ■ Virginia Tech ■ [email protected] Wearable and Ubiquitous Computing Tom Martin EDITOR’S INTRODUCTION ture and thickness of the user’s device primarily depends on the relative power This issue’s column continues its coverage of innovative courses in pervasive computing. consumption and expense of computa- Tom Martin of Virginia Tech describes a course on wearable and ubiquitous computing that tion, communication, and local storage. he developed and has taught twice. He describes the course’s scope, assignments and grad- Because wearable and ubiquitous ing, and design projects and his experiences with them. Please send me your comments and computing systems face significant suggestions for future columns. —Scott Midkiff power consumption challenges, the course spends a good amount of time on low-power design and system-level irginia Tech has offered a course on • User input/output devices power management. These topics are V wearable and ubiquitous comput- • Location and context awareness also some of my main research areas ing in the Bradley Department of Elec- • Application case studies and let me connect teaching and re- trical and Computer Engineering twice: search. I begin this section of the class one at the senior or master’s level in The wearable and ubiquitous com- with the power consumption mecha- spring 2002 (15 students) and another puting overview begins with Mark nisms in digital CMOS (complementary at the master’s level in spring 2003 (11 Weiser’s papers from the early 1990s1–2 metal-oxide semiconductor) circuits and students). The course aims to provide and more recent articles by Mahadev then move on to higher-level power students with an appreciation of current Satyanarayanan3 and Thad Starner.4–5 management problems, such as dynamic wearable and ubiquitous computing These provide a road map and motiva- CPU speed-setting, low-power compi- research issues and give them hands-on tion for topics covered later in the lation and source code modification, design experience.
    [Show full text]
  • Ambient Intelligence in Assistive Technologies
    G.A.247447 Collaborative Project of the 7th Framework Programme Work Package 5 AmI and Social Network Services D.5.1: Ambient Intelligence in Assistive Technologies Fundació Privada Barcelona Digital Centre Tecnològic Version 1.1 29/04/2010 www.BrainAble.org Document Information Project Number 247447 Acronym BrainAble Full title Autonomy and social inclusion through mixed reality Brain‐Computer Interfaces: connecting the disabled to their physical and social world Project URL http://www.BrainAble.org EU Project officer Jan Komarek Deliverable Number 5.1 Title Ambient Intelligence in Assistive Technologies Work package Number 5 Title AmI and Social Network Services Date of delivery Contractual PM04 Actual PM04 Status Reviewed Final Nature Prototype Report Dissemination Other Dissemination Level Public Consortium Authors (Partner) Fundació Privada Barcelona Digital Centre Tecnològic (BDCT) Responsible Author Agustin Navarro Email [email protected] Partner BDCT Phone +34 93 553 45 40 Abstract State of the Art about Ambient Intelligence with special emphasis to its application in (for assisted environments dissemination) Keywords AmI, Ambient Assisted Living, Context‐awareness, Smart devices, Interoperability Version Log Issue Date Version Author Change 31/01/2010 DRAFT ‐ v.0.1 Agustin Navarro First released version for internal reviewers 28/04/2010 Version 1.0 Agustin Navarro Details and feedback from partners 28/04/2010 Version 1.1 Agustin Navarro Formatting, final version released to the P.O. The information in this document is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability.
    [Show full text]