Consumer Data and Privacy in Ubiquitous Computing

Total Page:16

File Type:pdf, Size:1020Kb

Consumer Data and Privacy in Ubiquitous Computing ESPOO 2007 VTT PUBLICATIONS 647 VTT PUBLICATIONS VTT PUBLICATIONS 647 Consumer Data and Privacy in Ubiquitous Computing 629 Communications Technologies. VTT's Research Programme 2002–2006. Final Report. Ed. by Markku Sipilä. 2007. 354 p. 630 Solehmainen, Kimmo. Fabrication of microphotonic waveguide components on silicon. 2007. 68 p. + app. 35 p. 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 631 Törrö, Maaretta. Global intellectual capital brokering. Facilitating the emergence of 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 innovations through network mediation. 106 p. + app. 2 p. 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 632 Lanne, Marinka. Yhteistyö yritysturvallisuuden hallinnassa. Tutkimus sisäisen 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 yhteistyön tarpeesta ja roolista suurten organisaatioiden turvallisuustoiminnassa. 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 2007. 118 s. + liitt. 81 s. 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 633 Oedewald, Pia & Reiman, Teemu. Special characteristics of safety critical organiza- 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 tions. Work psychological perspective. 2007. 114 p. + app. 9 p. 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 634 Tammi, Kari. Active control of radial rotor vibrations. Identification, feedback, feed- 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 forward, and repetitive control methods. 2007. 151 p. + app. 5 p. 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 635 Intelligent Products and Systems. Technology theme – Final report. Ventä, Olli (ed.). 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 2007. 304 p. 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 636 Evesti, Antti. Quality-oriented software architecture development. 2007. 79 p. 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 637 Paananen, Arja. On the interactions and interfacial behaviour of biopolymers. An 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 AFM study. 2007. 107 p. + app. 66 p. 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 638 Alakomi, Hanna-Leena. Weakening of the Gram-negative bacterial outer membrane. 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 A tool for increasing microbiological safety. 2007. 95 p. + app. 37 p. 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 639 Kotiluoto, Petri. Adaptive tree multigrids and simplified spherical harmonics 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 approximation in deterministic neutral and charged particle transport. 2007. 106 p. 12345678901234567890123456789012123456789012345678901234567890121234567890123456789012345678901212345 + app. 46 p. 640 Leppänen, Jaakko. Development of a New Monte Carlo Reactor Physics Code. 2007. 228 p. + app. 8 p. 641 Toivari, Mervi. Engineering the pentose phosphate pathway of Saccharomyces cerevisiae for production of ethanol and xylitol. 2007. 74 p. + app. 69 p. Teemu Mutanen 642 Lantto, Raija. Protein cross-linking with oxidative enzymes and transglutaminase. Effects in meat protein systems. 2007. 114 p. + app. 49 p. 643 Trends and Indicators for Monitoring the EU Thematic Strategy on Sustainable Consumer Data and Privacy Development of Urban Environment. Final report summary and recommendations. Häkkinen, Tarja (ed.). 2007. 240 p. + app. 50 p. in Ubiquitous Computing 644 Saijets, Jan. MOSFET RF Characterization Using Bulk and SOI CMOS Technologies. 2007. 171 p. + app. 4 p. 645 Laitila, Arja. Microbes in the tailoring of barley malt properties. 2007. 107 p. + app. 79 p. 646 Mäkinen, Iiro. To patent or not to patent? An innovation-level investigation of the propensity to patent. 2007. 95 p. + app. 13 p. 647 Mutanen, Teemu. Consumer Data and Privacy in Ubiquitous Computing. 2007. 82 p. + app. 3 p. Teemu Mutanen VTT VTT VTT PL 1000 PB 1000 P.O. Box 1000 02044 VTT 02044 VTT FI-02044 VTT, Finland Puh. 020 722 4404 Tel. 020 722 4404 Phone internat. + 358 20 722 4404 Faksi 020 722 4374 Fax 020 722 4374 Fax + 358 20 722 4374 ISBN 978-951-38-7031-7 (URL: http://www.vtt.fi/publications/index.jsp) ISSN 1455-0849 (URL: http://www.vtt.fi/publications/index.jsp) VTT PUBLICATIONS 647 Consumer Data and Privacy in Ubiquitous Computing Teemu Mutanen ISBN 978-951-38-7031-7 (URL: http://www.vtt.fi/publications/index.jsp) ISSN 1455-0849 (URL: http://www.vtt.fi/publications/index.jsp) Copyright © VTT Technical Research Centre of Finland 2007 JULKAISIJA – UTGIVARE – PUBLISHER VTT, Vuorimiehentie 3, PL 1000, 02044 VTT puh. vaihde 020 722 111, faksi 020 722 4374 VTT, Bergsmansvägen 3, PB 1000, 02044 VTT tel. växel 020 722 111, fax 020 722 4374 VTT Technical Research Centre of Finland, Vuorimiehentie 3, P.O. Box 1000, FI-02044 VTT, Finland phone internat. +358 20 722 111, fax + 358 20 722 4374 VTT, Vuorimiehentie 3, PL 1000, 02044 VTT puh.
Recommended publications
  • Private Data Protection in Ubiquitous Computing
    UBICOMM 2016 : The Tenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies Private Data Protection in Ubiquitous Computing Malika Yaici Samia Ameza¤, Ryma Houariy and Sabrina Hammachiz Laboratoire LTII Computer Department, University of Bejaia University of Bejaia Bejaia, 06000, Algeria Bejaia, 06000, Algeria ¤[email protected] [email protected] [email protected] [email protected] Abstract—A system in ubiquitous computing consists of a large care and safety where the end-user has authorized credentials amount of heterogeneous users and devices that communicate anonymity. with each other. Users in this dynamic field communicate with lightweight and autonomous devices, which accentuate security In [3], the author uses the framework of contextual integrity problems and make them more complex. The existing mechanisms related to privacy, developed by Nissenbaum in 2010 [4], as and solutions are inadequate to address new challenges mainly a tool to understand citizen’s response to the implementation for problems of authentication and protection of privacy. In this of IoT related technology in a supermarket. The purpose was paper, a new security architecture called Tree Based distributed to identify and understand specific changes in information Privacy Protection System is proposed. It supports protection of practices brought about by the IoT that may be perceived users private data and addresses the shortcomings of systems as privacy violations. Issues identified included the mining of like GAIA, OpenID and User-directed Privacy Protection (UPP). medical data, invasive targeted advertising, and loss of auton- Furthermore, it takes into account the domain dissociation omy through marketing profiles or personal affect monitoring.
    [Show full text]
  • Ubiquitous Commerce: Ubiquitous Computing Based Commerce Dolly Amit Pruthi Deptt
    Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Ubiquitous Commerce: Ubiquitous Computing Based Commerce Dolly Amit Pruthi Deptt. of Computer Science & Applications, G.J. University of Sci. & Tech., M.D. University, Rohtak, India Hisar, India Abstract- With the rapid advancement in field of networking and communications, no aspect of human life is untouched. Commercial activities are also affected by the new advancements. Traditional commercial activities are changed and modified with the passage of time. Firstly, the age of E-Commerce arrived, then M-Commerce. Now, after E-Commerce and M-Commerce, the age of Ultimate Commerce is arrived. Any time/ Always/ Anywhere service providing is the key to this ultimate or ubiquitous commerce. This paper studies the concept of ubiquitous computing and its adaption to commerce with new issues associated. Keywords- Ubiquitous computing, Ubiquitous commerce. I. INTRODUCTION Ubiquitous commerce, also referred to as „u-commerce‟ is a new paradigm that broadens and extends the Internet usage in today‟s environment. With the rapid development of ubiquitous computing and mobile communication technologies, the traditional business model is changing drastically. As a logical extension of e-commerce and m-commerce, Watson proposed the concept of ubiquitous commerce (u-commerce) in 2000. As the next generation business model, it immediately gained a lot of attention. U-commerce emerges as a continuous, seamless stream of communication, content and services exchanged among businesses, suppliers, employees, customers, and products. It will enable interactions and transactions to happen anywhere and at any time without being constrained to stay connected through power and telephone lines.
    [Show full text]
  • Ubiquitous Computing: Trends and History
    Ubiquitous Computing: Trends and History Lecture 2 CSI 660, William A. Maniatty, Dept. of Computer Science, University at Albany 1 Introduction Review: What is Ubiquitous Computing? • Immerses computers in a real environment • Sensors support interact with and control the environment. • Limited power supply, storage, memory and bandwidth. • Operate unattended (much like embedded systems). • Devices are mobile/wireless. • May reside on a person (wearable computing). • Have special peripherals. • Contrast this with virtual reality which immerses humans in a computer generated articial environment. CSI 660, William A. Maniatty, Dept. of Computer Science, University at Albany 2 Historical Origins and Trends Computers are becoming smaller and cheaper over time • Originally few computers many operators . Machines Expensive and Large . People (relatively) cheap • Trend toward more computers per person . Users may not be tech savvy . Even tech savvy users have limited time . Minimal intervention is required People don't want to be separated from their data • But spying on users upsets them • And can violate laws - security is important • Mobility and wireless access are critical. CSI 660, William A. Maniatty, Dept. of Computer Science, University at Albany 3 Some Popular Views Many visions were popularized in the press • First to work on it, although other visionaries preceded him • Entertainment Industry (Ian Fleming, Gene Rodenberry) • Vanaver Bush's seminal article [1] As We Might Think predicted the WWW and Ubiquitous Computing in 1945! • Vernor Vinge (retired Computer Science Professor and Science ction writer) has interesting ubiquitous computing visions. • Movies: The Terminator, numerous Philip K. Dick books and screen plays (Blade Runner, Total Recall, Minority Report). Has been popular in the research community for over a decade CSI 660, William A.
    [Show full text]
  • Wearable and Ubiquitous Computing
    Education & Training Editor: Scott F. Midkiff ■ Virginia Tech ■ [email protected] Wearable and Ubiquitous Computing Tom Martin EDITOR’S INTRODUCTION ture and thickness of the user’s device primarily depends on the relative power This issue’s column continues its coverage of innovative courses in pervasive computing. consumption and expense of computa- Tom Martin of Virginia Tech describes a course on wearable and ubiquitous computing that tion, communication, and local storage. he developed and has taught twice. He describes the course’s scope, assignments and grad- Because wearable and ubiquitous ing, and design projects and his experiences with them. Please send me your comments and computing systems face significant suggestions for future columns. —Scott Midkiff power consumption challenges, the course spends a good amount of time on low-power design and system-level irginia Tech has offered a course on • User input/output devices power management. These topics are V wearable and ubiquitous comput- • Location and context awareness also some of my main research areas ing in the Bradley Department of Elec- • Application case studies and let me connect teaching and re- trical and Computer Engineering twice: search. I begin this section of the class one at the senior or master’s level in The wearable and ubiquitous com- with the power consumption mecha- spring 2002 (15 students) and another puting overview begins with Mark nisms in digital CMOS (complementary at the master’s level in spring 2003 (11 Weiser’s papers from the early 1990s1–2 metal-oxide semiconductor) circuits and students). The course aims to provide and more recent articles by Mahadev then move on to higher-level power students with an appreciation of current Satyanarayanan3 and Thad Starner.4–5 management problems, such as dynamic wearable and ubiquitous computing These provide a road map and motiva- CPU speed-setting, low-power compi- research issues and give them hands-on tion for topics covered later in the lation and source code modification, design experience.
    [Show full text]
  • Ubiquitous Computing, Virtual Worlds, and the Displacement of Property Rights
    Ubiquitous Computing, Virtual Worlds, and the Displacement of Property Rights M. ScoT BOONE* Abstract: Examining one emerging technology, virtual worlds, may provide us with insight about another emerging technology, ubiquitous computing. The rapid increase in both the popularity and economic value of virtual worlds has resulted in a conflict over whether players in these worlds have any property rights with respect to virtual world objects associated with their avatars. A close examination however reveals that even if such rights exist, they can be overridden through the combined use of contract and technology. This observation may in turn provide an insight about the future of real world property. The emerging technology of ubiquitous computing shares technological characteristics with virtual worlds such that ubiquitous computing would make a displacement of property rights in real world objects possible in the same way that virtual world technology makes such a displacement possible for potential property rights in virtual world objects. "Associate Professor of Law, Appalachian School of Law. I would like to thank Charlie Condon, Judie Barger, David Ritchie and James McGrath for their helpful comments on drafts of this article. I would also like to thank for their comments the participants of the Works-in-Progress Intellectual Property Colloquium, the participants of the Intellectual Property & Communications Law and Policy Scholars Roundtable sponsored by Michigan State University College of Law, and the participants of the annual meeting of Southeastern Association of Laws Schools. The research assistance of Russell Kloosterman and Justin Williams was also immensely helpful. I/S: A JOURNAL OF LAWAND POLICY [VOL.
    [Show full text]
  • Pervasive Computing in Sugar Industry
    International Journal of Novel Research in Electronics and Communication Vol. 3, Issue 2, pp: (1-13), Month: September 2016 - February 2017, Available at: www.noveltyjournals.com Pervasive Computing in Sugar Industry Arnold C. Ndukuyu1, Franklin Wabwoba2, Anselemo Ikoha3 1Nzoia Sugar co ltd, 1, 2, 3 Department of Information Technology, Kibabii University Abstract: In the last decade, we have had several computing technology applications in the IT industry out of which Pervasive or Persistent computing has proved to be an enabler for everyday objects to become smarter and interactive in ubiquitous environment.Pervasive computing promises to revolutionize the way of doing things on field operations context in agriculture with regard to managing data using mobile technologies. There are however challenges facing adoption of mobile computing for ubiquitous data management computing technique as well as proposition ways to solve the challenges and abundant computing on basis of cloud computing. The research proposes new innovations based on pervasive computing, its interactions in agro-industrytechnology and its future.This paper proposes a Sugar Enterprise Mobility Framework (SEMF) to embrace adoption of mobile computing in sugar companies. Keywords: Pervasive Computing, Ubiquitous DataKeywords: Pervasive Computing, Abundant Computing, cloud, challenges. 1. INTRODUCTION There are various technology applications in IT Industry such ashuman computing, Autonomic computing, mobile computing, Cloud computing, Green computing, Grid computing, Supercomputing, Parallel computing among others., out of which Pervasive computing has proved to be an enabler for everyday objects to become smarter and interactive in ubiquitous environment offering control with interactive service such as refrigerators that can create grocery lists, dispensers, buildings that can adjust temperature and light according to the weather, animal feeding monitoring, power management and control just to mention but a few.
    [Show full text]
  • Continuous Deployment of Pervasive Applications in Dynamic Environments Ozan Necati Günalp
    Continuous deployment of pervasive applications in dynamic environments Ozan Necati Günalp To cite this version: Ozan Necati Günalp. Continuous deployment of pervasive applications in dynamic environments. Ubiquitous Computing. Université de Grenoble, 2014. English. NNT : 2014GRENM052. tel- 01215029 HAL Id: tel-01215029 https://tel.archives-ouvertes.fr/tel-01215029 Submitted on 13 Oct 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE Pour obtenir le grade de DOCTEUR DE L’UNIVERSITÉ DE GRENOBLE Spécialité : Informatique Arrêté ministériel : 7 août 2006 Présentée par Necati Ozan GÜNALP Thèse dirigée par Philippe LALANDA préparée au sein Laboratoire d’Informatique de Grenoble et de École Doctorale Mathématiques, Sciences et Technologies de l’Information, Informatique Déploiement continu des applications pervasives en milieux dynamiques Thèse soutenue publiquement le 13 Novembre 2014, devant le jury composé de : Mme Frédérique LAFOREST Professeur à Université de Saint Etienne, Présidente Mr Christian BECKER Professor at Universität Mannheim,
    [Show full text]
  • Ubiquitous Computing Power: the Cornerstone of an Intelligent Society Position Paper
    Ubiquitous Computing Power: the Cornerstone of an Intelligent Society Position Paper February 2020 Embrace Ubiquitous Computing Power, Embrace the Bright Future of an Intelligent Society Liang Hua Chairman of Huawei's Board of Directors Computing is a way of perceiving the world. From their intelligent journey; they will enter the next stage mainframes to PCs, and from PCs to smartphones and of growth – the developing stage – only when their per wearables, computing has become a de facto extension capita computing power surpasses 10,000 GFLOPS. of human capability. Just like the wide adoption of electricity, which laid Our approach to computing is also evolving. Statistical the foundation for an industrial society, ubiquitous computing will soon become mainstream, and we computing power will become the cornerstone of an estimate that five years from now AI applications intelligent society. will account for more than 80% of all computing Second, we need to build a diversified computing power used around the world. It will be a new age of power ecosystem to drive the computing industry intelligent computing. forward. In the intelligent world, we will see more The technologies behind computing and connectivity diverse application scenarios and data types than are progressing by leaps and bounds every day, and ever before, which calls for a much more diversified they will soon pave the way for a world where all computing power architecture. things sense, all things are connected, and all things If we hope to succeed in building a prosperous and are intelligent. Ubiquitous computing power will be diversified computing power ecosystem, we will need the cornerstone of this future world.
    [Show full text]
  • Towards a Framework to Characterize Ubiquitous Software Projects ⇑ Rodrigo Oliveira Spínola, Guilherme Horta Travassos
    Information and Software Technology 54 (2012) 759–785 Contents lists available at SciVerse ScienceDirect Information and Software Technology journal homepage: www.elsevier.com/locate/infsof Towards a framework to characterize ubiquitous software projects ⇑ Rodrigo Oliveira Spínola, Guilherme Horta Travassos Systems Engineering and Computer Science Program, COPPE, Federal University of Rio de Janeiro, P.O. Box 68511, Rio de Janeiro, Brazil article info abstract Article history: Context: Ubiquitous Computing (or UbiComp) represents a paradigm in which information processing is Received 19 July 2011 thoroughly integrated into everyday objects and activities. From a Software Engineering point of view Received in revised form 29 December 2011 this development scenario brings new challenges in tailoring or building software processes, impacting Accepted 25 January 2012 current software technologies. However, it has not yet been explicitly shown how to characterize a Available online 4 February 2012 software project with the perception of ubiquitous computing. Objective: This paper presents a conceptual framework to support the characterization of ubiquitous soft- Keywords: ware projects according to their ubiquity adherence level. It also intends to apply such characterization Ubiquitous computing approach to some projects, aiming at observing their adherence with ubiquitous computing principles. Software projects characterization Systematic review Method: To follow a research strategy based on systematic reviews and surveys to acquire UbiComp Experimental software engineering knowledge and organize a conceptual framework regarding ubiquitous computing, which can be used to characterize UbiComp software projects. Besides, to demonstrate its application by characterizing some software projects. Results: Ubiquitous computing encapsulates at least 11 different high abstraction level characteristics represented by 123 functional and 45 restrictive factors.
    [Show full text]
  • A Middleware for Ubiquitous Computing: Wcomp
    LABORATOIRE INFORMATIQUE, SIGNAUX ET SYSTÈMES DE SOPHIA ANTIPOLIS UMR 6070 AMIDDLEWARE FOR UBIQUITOUS COMPUTING: WCOMP Jean-Yves TIGLI, Michel RIVEILL, Gaëtan REY, Stéphane LAVIROTTE, Vincent HOURDIN, Daniel CHEUNG-FOO-WO, Eric CALLEGARI Equipe RAINBOW Rapport de recherche ISRN I3S/RR–2008-01–FR January 2008 Laboratoire d’Informatique de Signaux et Systèmes de Sophia Antipolis - UNSA-CNRS 2000, rte.des Lucioles – Les Algorithmes – Bât Euclide B – B.P. 121 – 06903 Sophia-Antipolis Cedex – France Tél.: 33 (0)4 92 94 27 01 – Fax: 33 (0)4 92 94 28 98 – www.i3s.unice.fr UMR6070 A Middleware for Ubiquitous Computing: WComp Jean-Yves Tigli1, Michel Riveill1, Ga¨etan Rey1, St´ephane Lavirotte1 Vincent Hourdin1, Daniel Cheung-Foo-Wo2,1, Eric Callegari1, ∗ {tigli, riveill, rey, lavirott, hourdin, cheung, callegar}@polytech.unice.fr 1 Laboratoire I3S, (Universit´ede Nice - Sophia Antipolis / CNRS) Bˆatiment Polytech’Sophia - SI 930 route des Colles B.P. 145 F-06903 Sophia-Antipolis Cedex 2 CSTB 290, route des Lucioles, BP209 06904 Sophia-Antipolis Abstract After a survey of the specific features of ubiquitous computing applications and corresponding middle- ware requirements, we list the various paradigms used in the main middlewares for ubiquitous computing in the literature. We underline the lack of works introducing the use of the concept of Aspects in mid- dleware dedicated to ubiquitous computing, in spite of being used for middlewares improvement in other domains. Then we introduce our WComp middleware model which federates three main paradigms: event based web services, a lightweight component-based approach to design dynamic composite services and an adaptation approach using the original concept called Aspect of Assembly.
    [Show full text]
  • Ubiquitous Virtual Reality: the State-Of-The-Art
    Bernadetta Kwintiana Ane et al, International Journal of Computer Science and Mobile Computing, Vol.8 Issue.7, July- 2019, pg. 16-26 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IMPACT FACTOR: 6.199 IJCSMC, Vol. 8, Issue. 7, July 2019, pg.16 – 26 Ubiquitous Virtual Reality: The State-of-the-Art 1 2 3 Bernadetta Kwintiana Ane ; Dieter Roller ; Jagadish Lolugu ¹Department of Computer Application, Crescent Institute of Science and Technology, India ²Institute of Computer-aided Product Development Systems, University of Stuttgart, Germany ³FPZ, Pvt. Ltd., India E-Mail: 1 [email protected]; 2 [email protected]; 3 [email protected] Abstract—Today, virtual reality is becoming ubiquitous and tremendous trends. Ubiquitous virtual reality (uVR) realizes virtual reality on ubiquitous smart space. In this platform, u-Content has been introduced as a new kind of realism that will realistically mediate real space. To go beyond the boundary of virtuality, pervasive virtuality has been introduced as a better fusion of reality and virtuality that will enhance visualization of virtual environments towards what is considered as the ‘true’ virtual reality. This paper addresses the state-of-the-art of uVR by deciphering its definition, dimensions and features, the concept of pervasive virtuality and its characters, as well as a case study on intelligent machine space, called DIGILOG space. Keywords— Ubiquitous virtual reality, u-content, virtuality, pervasive virtuality I. INTRODUCTION The emerging new computing paradigms have accelerated the convergence amongst different technologies and, thus, make the border between the actual and the virtual reality indistinguishable.
    [Show full text]
  • Data Management for Pervasive Computing - Cherniack, Franklin, Zdonik
    Data Management for Pervasive Computing - Cherniack, Franklin, Zdonik Data Management for Pervasive Computing Mitch Cherniack Brandeis University Mike Franklin UC Berkeley Stan Zdonik Brown University VLDB, Rome, Italy September 11, 2001 Outline 1. Pervasive Computing - Applications and Requirements. 2. Architectural Concepts 3. Data Dissemination 4. Data Synchronization 5. Data Recharging 6. Profile-Driven Data Management 7. Other Topics a. Location aware and moving objects b. Service discovery c. Sensors © 2001 M. Cherniak, M. Franklin, S. Zdonik Data Management for Pervasive Computing 2 71 Data Management for Pervasive Computing - Cherniack, Franklin, Zdonik What is Pervasive Computing? • “ … make a computer so imbedded, so fitting, so natural, that we use it without even thinking about it.” • “Ubiquitous (pervasive) computing is roughly the opposite of virtual reality. Where virtual reality puts people inside a computer-generated world, ubiquitous computing forces the computer to live out here in the world with people.” – Mark Weiser, Xerox PARC © 2001 M. Cherniak, M. Franklin, S. Zdonik Data Management for Pervasive Computing 3 What is Pervasive Computing? “Pervasive computing is a term for the strongly emerging trend toward: – Numerous, casually accessible, often invisible computing devices – Frequently mobile or embedded in the environment – Connected to an increasingly ubiquitous network structure.” – NIST, Pervasive Computing 2001 © 2001 M. Cherniak, M. Franklin, S. Zdonik Data Management for Pervasive Computing 4 72 Data Management for Pervasive Computing - Cherniack, Franklin, Zdonik Ubiquitous Computers More Many people One person Information per computer per computer Appliances PC + Network Distribution WS/Server Many computers Time Sharing per person Batch RJE Less LessPersonalization More © 2001 M. Cherniak, M. Franklin, S.
    [Show full text]