TDT49 Mobile Information Systems, Jørgen Birkeland

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

Designing Mobile Phones and Communicators for Consumers Needs at Nokia By: Kaisa Vaananen-Vainio-Mattila, Satu Ruuska Review by: Irina Ceaparu.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Beyond Prototypes: Challenges in Deploying Ubiquitous Systems N. Davies and H. Gellersen IEEE pervasive computing, 2002 Presenter: Min Zhang
Ubiquitous Computing Definitions Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical.
Visual Event Detection & Recognition Filiz Bunyak Ersoy, Ph.D. student Smart Engineering Systems Lab.
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
Context-based Information Sharing and Authorization in Mobile Ad Hoc Networks Incorporating QoS Constraints Sanjay Madria, Missouri University of Science.
Smart Space & Oxygen CIS 640 Project By Usa Sammpun
1 3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)
Cloud Usability Framework
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
Looking ahead in Pervasive Computing: Challenges, Opportunities in the era of Cyber Physical Convergence Authors : Marco Conti, Sajal K. Das, Chatschik.
Pervasive Environments and Digital Inclusion Patrick Olivier Newcastle University.
The Fully Networked Car Geneva, 4-5 March Ubiquitous connectivity to improve urban mobility Hermann Meyer ERTICO.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Comp 15 - Usability & Human Factors Unit 9 - Ubiquitous Computing in Healthcare This material was developed by Columbia University, funded by the Department.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
Semantic Gadgets Pervasive Computing Meets the Semantic Web Reza Zakeri Sharif University of Technology.
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
Designing Attention-Centric Notification Systems Five HCI Challenges Scott McCrickard Center for Human-Computer Interaction & Department of Computer Science.
Computer Architecture and Embedded Systems Paul Havinga University of Twente.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
UBICOMP SYSTEMS: TOPICS & CHALLENGES. New computing model  Heterogeneous devices  Interaction:  Many-to-many  Possibly implicit, invisible, through.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Pervasive Computing Parts of the slides are extracted from those of Profs. Mark Weiser, Deborah Estrin, Akbar Sayeed, Jack Stankovic, Mani Srivastava,
Introduction to Pervasive Computing
1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel:
The Structure of the User Interface Lecture # 2 Gabriel Spitz.
RESEARCH INTENT PRESENTATION Presented by Remigus Onuoha Centre for Computing, Intelligence and Security Systems School of Computing, Engineering & Technology.
Status & Challenges Interoperability and global integration of communication infrastructure & service platform Fixed-mobile convergence to achieve a future.
Network Centric Operations Industry Consortium The Intersection of Cloud Computing and Cyber Security Melvin Greer, NCOIC Vice Chair, Cloud Computing Working.
LECTURER: NGUY Ễ N ANH TU Ấ N (TUAN NGUYEN) TUTORS: TÔN TH Ị KIM LOAN TR Ầ N H Ồ NG NGHI {TUANNA, LOANTTK, Developing Applications.
Towards ‘Ubiquitous’ Ubiquitous Computing: an alliance with ‘the Grid’ Oliver Storz, Adrian Friday, and Nigel Davies Computing Department, Lancaster University,
Luigi Cicchese Partner Reply Building a Smarter City.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Mobile Networks & Computing Mobile computing : Some Definitions 1 NYANZI A CCNP,CCNAI,CCNA, A+, MIT-SANA, MBA_IT.
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
Energy Management Solution
CS6501/ECE6501 IoT Sensors and Systems
Smart World: A Better World
Update from the Faster Payments Task Force
“Internet of Things” – The new age drivers of Power Distribution Automation Speaker: Jayant Sinha Date of session: 2 Oct, 2015.
Parallel Autonomous Cyber Systems Monitoring and Protection
Chapter 18 MobileApp Design
Algorithms for Big Data Delivery over the Internet of Things
Energy Management Solution
High Intelligent Network (Smart Pipe)
Edge and Cloud Computing Breakout Session CSR PI Meeting, June 2, 2017
NSF CSR PI Meeting Breakout Session: Integrated Networked Systems and Internet of Things Saurabh Bagchi Purdue University.
Howell Istance Ambient Assisted Living Group
DrillSim July 2005.
Presentation for information days Units involved:
WIS Strategy – WIS 2.0 Submitted by: Matteo Dell’Acqua(CBS) (Doc 5b)
Postal & Telecommunications Regulatory Authority of Zimbabwe (POTRAZ)
Internet of Things (IoT) for Industrial Development and Automation
Towards Unified Management
Self-Managed Systems: an Architectural Challenge
3.7 Market Research for EC Market research is aimed at finding information that describes the relationship between consumers, products, marketing methods,
Presenter: Richard Brennan, Vice-Chair TC TISPSAN
NextGRID: From Compute Grids to Grid SOAs and beyond
Themes for the future... Simple complex systems Well behaved systems
Requirements of Computing in Network
End-to-End Reconfigurability II (E2RII)
Presentation transcript:

TDT49 Mobile Information Systems, Jørgen Birkeland Pervasive Computing TDT49 Mobile Information Systems, Jørgen Birkeland

Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence More real-world components interacting with cyberspace Modify physical world through actuators Real-time traffic monitoring, Urban planning Autonomic self-management and adoption Mobile social networking (ONC) Bandwidth, storage Quality of Information Seamless interoperation Cyber-world security and privacy

Navigating MazeMap: Indoor human mobility, spatio-logical ties and future potential Case study: Spatial and temporal distributions from MazeMap Indoor positioning system (IPS) MazeMap Trilateration Wayfinding Human mobility patterns Example usages

Toward a framework for evaluating ubiquitous computing apps Evaluate pervasive apps systematically Usability and acceptance issues Can help researchers: Compare results Create design guidelines Avoid overlooking key areas Reasons for the framework: Improve comparability: Terminology More effective evaluations Example use cases: Tour guide system Distraction: UAE: Attention - focus Confusion due to inaccurate user location UAE: Invisibility - accuracy UEA Metrics Attention Focus, Overhead Adoption Rate, Value, Cost, Availability, Flexibility Trust Privacy, awareness, control Conceptual models Predictability of app behaviour, awareness of app capabilities, vocabulary awareness Interaction Effectiveness, efficiency, user satisfaction, distraction, interaction transparency, scalability, collaborative interaction Invisibility Intelligibility, control, accuracy, customization Impact and side effects Utility, behaviour changes, social acceptance, environment change Appeal Fun, aesthetics, status App robustness Robustness, performance speed, volatility

Discussion Cyber-physical convergence security issues Use framework for evaluation Continuous development of MazeMap Info-flow cyber-physical world: Example: Real-time path finding system (MazeMap) UAE: App robustness – performance, speed MazeMap example of system visioned by Mark Weiser Proxemic interactions – cyber-world adapts to the physical world Context-aware systems