Nymity (and other made up words) Dan Cutting July 2003.

Slides:



Advertisements
Similar presentations
References Overview User attention is by far the most precious resource in a world where computational and networking infrastructure is becoming cheaper.
Advertisements

Designing for Context: Usability in a Ubiquitous Environment Jenna Burrell, Paul Treadwell, Geri K. Gay Human Computer Interaction Group Cornell University.
Composite Device Computing Environment: A Framework for Situated Interaction Using Small Screen Devices Thai-Lai Pham, Georg Schneider, Stuart Goose and.
Supporting Cooperative Caching in Disruption Tolerant Networks
A MOBILE SPONTANEOUS SEMANTIC P2P SYSTEM University of Applied Sciences for Technology and Economics Berlin / Germany (HTW Berlin)
Wiki-Reality: Augmenting Reality with Community Driven Websites Speaker: Yi Wu Intel Labs/vision and image processing research Collaborators: Douglas Gray,
AR phone University of Sydney. Introduction University of Sydney University of Sydney Adam Hudson, Mark Assad, Dan Cutting. Adam Hudson, Mark Assad, Dan.
Lecture 0: Course Overview
A PowerPoint Presentation
Martin Wagner and Gudrun Klinker Augmented Reality Group Institut für Informatik Technische Universität München December 19, 2003.
Augmented Reality David Johnson.
UBIGIous – A Ubiquitous, Mixed-Reality Geographic Information System Daniel Porta Jan Conrad Sindhura Modupalli Kaumudi Yerneni.
A Context Aware Framework Mark Assad Supervisor: Bob Kummerfeld.
Data availability in a mobile environment Daniel Cutting University of Sydney & Smart Internet Technology CRC.
Context  situations  policy Daniel Cutting, Aaron Quigley University of Sydney Daniel Cutting, Aaron Quigley University of Sydney.
1 SAFIRE Project DHS Update – July 15, 2009 Introductions  Update since last teleconference Demo Video - Fire Incident Command Board (FICB) SAFIRE Streams.
Reference: [1] TeamSpace paper
Ubiquitous Computing Computers everywhere. Agenda Old future videos
Ubiquitous Computing Computers everywhere.
FYP Project LYU0301: Secure and Reliable PDA-Based Communication System.
WMCSA Keystone Scott Kirkpatrick CSE at HU, Jerusalem.
FYP Project LYU0303: 1 Video Object Tracking and Replacement for Post TV Production.
Overview and Mathematics Bjoern Griesbach
The Internet & The World Wide Web Notes
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Ubiquitous Advertising: the Killer Application for the 21st Century Author: John Krumm Presenter: Anh P. Nguyen
X3D Extension for (Mobile) AR Contents International AR Standards Workshop Seoul, Korea Oct 11-12, 2010 Gerard J. Kim (WG 6 AR Standards Study Group Coordinator)
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
SeaDataNet Ontology Use Case Roy Lowry British Oceanographic Data Centre Coastal Atlas Interoperability Workshop, Corvallis, July (+ Lessons.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
SMART BUILDING Yousef Awwad Te-Yuan Huang Newlin Rajkumar Group No.11.
Twenty-First Century Automatic Speech Recognition: Meeting Rooms and Beyond ASR 2000 September 20, 2000 John Garofolo
Where’s the Reality in Augmented Reality? Mark Billinghurst HIT Lab NZ University of Canterbury.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Pervasive Video Jack Powers, director The Future of TV Everywhere.
Gathering Data in Wireless Sensor Networks Madhu K. Jayaprakash.
Context-aware Adaptive Routing for Delay Tolerant Networking Mirco Musolesi Joint work with Cecilia Mascolo Department of Computer Science University College.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
Building Mobile Augmented Reality Services in Pervasive Computing Environment Hiroaki Kimura Eiji Tokunaga
Submitted by:- Vinay kr. Gupta Computer Sci. & Engg. 4 th year.
Implementing a Sentient Computing System Presented by: Jing Lin, Vishal Kudchadkar, Apurva Shah.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
updated CmpE 583 Fall 2008 Ontology Integration- 1 CmpE 583- Web Semantics: Theory and Practice ONTOLOGY INTEGRATION Atilla ELÇİ Computer.
Semantics for Cybersecurity and Privacy Tim Finin, UMBC Joint work with Anupam Joshi, Karuna Joshi, Zareen Syed andmany UMBC graduate students
Doc.: IEEE /0795r0 Submission HEW Usage Scenarios Categorization July 2013 Eldad Perahia (Intel)Slide 1 Date: Authors:
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
Internet Real-Time Laboratory Arezu Moghadam and Suman Srinivasan Columbia University in the city of New York 7DS System Design 7DS system is an architecture.
A Case Study of Interaction Design. “Most people think it is a ludicrous idea to view Web pages on mobile phones because of the small screen and slow.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Mobile and Location-Based Services Jason I. Hong Product Design and Usability April
Intelligent Environments1 Conclusions and Future Directions.
Semantic Gadgets Pervasive Computing Meets the Semantic Web Reza Zakeri Sharif University of Technology.
FYP Project LYU0304: “Monster Battle”: A Prototype of Augmented Reality Card Game.
Real-Time Cyber Physical Systems Application on MobilityFirst Winlab Summer Internship 2015 Karthikeyan Ganesan, Wuyang Zhang, Zihong Zheng Shantanu Ghosh,
Presented by Darshan Balakrishna Shetty. Contents Internet of Things? Sample IoT devices What's Smart? Why Now? IoT in Power Grids and Homes Smart Grid.
Pervasive Gaming with Mobile Devices Prepared By: Karnung Liang Project Supervisor: Dr Brett Wilkinson.
CONTENT FOCUS FOCUS INTRODUCTION INTRODUCTION COMPONENTS COMPONENTS TYPES OF GESTURES TYPES OF GESTURES ADVANTAGES ADVANTAGES CHALLENGES CHALLENGES REFERENCE.
Students: Aiman Md Uslim, Jin Bai, Sam Yellin, Laolu Peters Professors: Dr. Yung-Hsiang Lu CAM 2 Continuous Analysis of Many CAMeras The Problem Currently.
The Personal Server Changing the Way We Think About Ubiquitous Computing Roy Want, et al. / Intel Research UBICOMP 2002 Nov Seungjae Lee
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Latest List of Computer Science Projects for Engineering.
What is Multimedia Anyway? David Millard and Paul Lewis.
AUGMENTED REALITY VIJAY COLLEGE OF ENGG. FOR WOMEN PRESENTED BY…….
Context-aware Adaptive Routing for Delay Tolerant Networking
iPhones and iPads and iTunes, Oh My!
What is Augmented Reality?
Augmented Reality By: Erica Baas.
3rd Studierstube Workshop TU Wien
Presentation transcript:

Nymity (and other made up words) Dan Cutting July 2003

Overview  Background reading  Nymity (identity management)  Conceptual locations  Adhocracy  Augmented Reality (AR)  Schedule and research directions.

Background reading  Intelligent Environment (IE) Stick-e’s (University of Kent at Canterbury) Stick-e’s (University of Kent at Canterbury) GLOSS/HearSay (University of St Andrews) GLOSS/HearSay (University of St Andrews) Taxonomy of location systems (University of Washington) Taxonomy of location systems (University of Washington)  Identity management Roger Clarke’s work on nymity Roger Clarke’s work on nymity  Augmented Reality (AR) MagicBook / ARToolkit (HIT labs). MagicBook / ARToolkit (HIT labs).

Nymity BACKGROUND  IEs need information from people using them, e.g. Cinema needs age for R-rated films. IDEA  Only show what’s required, e.g. Cinema doesn’t need name  Person controls level of anonymity: simple, unobtrusive. MOTIVATION  Privacy (‘Big Brother’).

Nymity APPROACH  Nyms - sets of information related to an entity  Entities can have multiple nyms  Anonymity  verinymity.

Nymity RESEARCH  Reduce probability of entity discovery Constraints processing by classification of nym fields Constraints processing by classification of nym fields Identity fusion. Identity fusion. Identity fusion Constraints

Conceptual locations BACKGROUND  Location holds much context  Where you are, who you’re with  what you’re doing. IDEA  ‘Location’ as point in abstract space  E.g. ‘location’ on web  Need model and distance metric  Also map between physical and conceptual locations.

Conceptual locations MOTIVATION  Can link people who are ‘close’  More context for IE. APPLICATION  User downloading a Monet painting is ‘close’ to person viewing the real painting in a gallery  Web user could ask gallery visitor to take close ups of certain parts.

Conceptual locations APPROACH  Where do we get models and metrics?  Different domains, different needs  Graph theory, social sciences. SAMPLE MODEL / METRIC  Hierarchical ontology of Yahoo!  Monet  Picasso = 6.

Adhocracy BACKGROUND  Three classes of IE: 1. Client-Server 2. Peer-Peer 3. Hybrid - some centralised infrastructure but communication is peer-peer.IDEA  Data associated with physical locations without fixed storage infrastructure  Use mobile, ad hoc nodes for storage.

Adhocracy MOTIVATION  Decentralised, hard to control / censor  Tag places with ‘virtual graffiti’  E.g. Tag shops with poor service  E.g. Tag shops with poor service  Freedom of speech!

Adhocracy This fountain is boring! - Jamie

Adhocracy APPROACH  Common PDAs / phones  Wireless data sharing (Bluetooth, WiFi)  Transient storage in devices when passing through physical location  Replicate, encrypt and distribute graffiti  Location sensed in many ways - sensor fusion.

Adhocracy CONSTRAINTS  Requires critical mass of users, graffiti vanishes at night!  Susceptible to jamming. APPLICATIONS  Wiki-style content management, Slashdot-style moderation, access reinforcement  Abstract objects (‘The Matrix’ movie)  multiple physical cinemas.

AR phone BACKGROUND  Virtual objects in real world  Fiducial markers position virtual objects  Inaccessible (viewed through expensive glasses)  Clumsy (viewed with computer and web cam).

Practical use of AR

AR phone IDEA  Use common mobile device as a view port. MOTIVATION  Increase accessibility  Reduce clumsiness.

AR phone APPROACH  Smart-phones (e.g. Ericsson P800) Camera Camera Large screen Large screen Bluetooth Bluetooth Too slow for video processing. Too slow for video processing.  Offload AR to server with Bluetooth.

AR phone BluetoothCamera Display Find fiducial marker Augment image

AR phone APPLICATION  Allan Richards’ usability study - real time gaze analysis (

Schedule  Submitted nymity paper for UbiComp Doctoral Colloquium  Adhocracy UbiComp workshop paper with Aaron and David Symonds  Visiting HIT labs in August with AR phone  Short paper on AR phone for OZCHI 2003  Nymity paper with Aaron and John Zic for IEEE Internet Computing  Exploring broad areas, focusing on overlaps.

Questions? Dan Cutting G61B Laboratory