Hybrid Context Inconsistency Resolution for Context-aware Services

Slides:



Advertisements
Similar presentations
Provenance-Aware Storage Systems Margo Seltzer April 29, 2005.
Advertisements

Automated Test Data Generation Maili Markvardt. Outline Introduction Test data generation problem Black-box approach White-box approach.
Alex Cheung and Hans-Arno Jacobsen August, 14 th 2009 MIDDLEWARE SYSTEMS RESEARCH GROUP.
Adaptive Accurate Indoor-Localization Using Passive RFID Xi Chen, Lei Xie, Chuyu Wang, Sanglu Lu State Key Laboratory for Novel Software Technology Nanjing.
A Unified Framework for Context Assisted Face Clustering
Mining Compressed Frequent- Pattern Sets Dong Xin, Jiawei Han, Xifeng Yan, Hong Cheng Department of Computer Science University of Illinois at Urbana-Champaign.
Online Filtering, Smoothing & Probabilistic Modeling of Streaming Data In short, Applying probabilistic models to Streams Bhargav Kanagal & Amol Deshpande.
Intelligent systems Lecture 6 Rules, Semantic nets.
Validation and Monitoring Measures of Accuracy Combining Forecasts Managing the Forecasting Process Monitoring & Control.
SE 450 Software Processes & Product Metrics Reliability: An Introduction.
A Heuristic Bidding Strategy for Multiple Heterogeneous Auctions Patricia Anthony & Nicholas R. Jennings Dept. of Electronics and Computer Science University.
Group 9: Chill Geordi: RFID based location sensing Brian Loo (bloo) Geeta Shroff (gshroff) Zane Starr (zcs)
P11016: Intra-building Navigation Shannon Carswell Dan Paris Tim Garvin Dan Stanley.
Conventional AI Machine Learning Techniques Environmental Mapping Case Statements Statistical Analysis Computational Intelligence Pattern Recognition.
Developing a Deterministic Patrolling Strategy for Security Agents Nicola Basilico, Nicola Gatti, Francesco Amigoni.
CSE5610 Intelligent Software Systems Semester 1 Enabling Intelligent Systems in Pervasive Computing.
Brian Loo (bloo)‏ Zane Starr (zcs)‏ Geeta Shroff (gshroff)‏ Group 9: Chill Geordi: RFID based navigation.
Statistical Critical Path Selection for Timing Validation Kai Yang, Kwang-Ting Cheng, and Li-C Wang Department of Electrical and Computer Engineering University.
1 Time Scales Virtual Clocks and Algorithms Ricardo José de Carvalho National Observatory Time Service Division February 06, 2008.
Learning Table Extraction from Examples Ashwin Tengli, Yiming Yang and Nian Li Ma School of Computer Science Carnegie Mellon University Coling 04.
1 Efficiently Learning the Accuracy of Labeling Sources for Selective Sampling by Pinar Donmez, Jaime Carbonell, Jeff Schneider School of Computer Science,
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
Presented by: Z.G. Huang May 04, 2011 Did You See Bob? Human Localization using Mobile Phones Romit Roy Choudhury Duke University Durham, NC, USA Ionut.
Alert Correlation for Extracting Attack Strategies Authors: B. Zhu and A. A. Ghorbani Source: IJNS review paper Reporter: Chun-Ta Li ( 李俊達 )
Language Identification of Search Engine Queries Hakan Ceylan Yookyung Kim Department of Computer Science Yahoo! Inc. University of North Texas 2821 Mission.
A Novel Method for Formally Detecting RFID Event Using Petri Nets SEKE 2011.
Novel Sensing Networks for Intelligent Monitoring (Newton) Z Q Lang, H Chen, T Dodd Department of Automatic Control & Systems Engineering University of.
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
Michael Ernst, page 1 Collaborative Learning for Security and Repair in Application Communities Performers: MIT and Determina Michael Ernst MIT Computer.
Ahsanul Haque *, Swarup Chandra *, Latifur Khan * and Charu Aggarwal + * Department of Computer Science, University of Texas at Dallas + IBM T. J. Watson.
Cristian Urs and Ben Riveira. Introduction The article we chose focuses on improving the performance of Genetic Algorithms by: Use of predictive models.
© 2007 Tom Beckman Features:  Are autonomous software entities that act as a user’s assistant to perform discrete tasks, simplifying or completely automating.
Ahsanul Haque *, Swarup Chandra *, Latifur Khan * and Michael Baron + * Department of Computer Science, University of Texas at Dallas + Department of Mathematical.
Exploring Online Social Activities for Adaptive Search Personalization CIKM’10 Advisor : Jia Ling, Koh Speaker : SHENG HONG, CHUNG.
MINING FREQUENT ITEMSETS IN A STREAM TOON CALDERS, NELE DEXTERS, BART GOETHALS ICDM2007 Date: 5 June 2008 Speaker: Li, Huei-Jyun Advisor: Dr. Koh, Jia-Ling.
A Hybrid Method for achieving High Accuracy and Efficiency in Object Tracking using Passive RFID Lei Yang 1, Jiannong Cao 1, Weiping Zhu 1, and Shaojie.
1 Software Reliability Assurance for Real-time Systems Joel Henry, Ph.D. University of Montana NASA Software Assurance Symposium September 4, 2002.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Chengjie Sun,Lei Lin, Yuan Chen, Bingquan Liu Harbin Institute of Technology School of Computer Science and Technology 1 19/11/ :09 PM.
DISCERN: Cooperative Whitespace Scanning in Practical Environments Tarun Bansal, Bo Chen and Prasun Sinha Ohio State Univeristy.
Agent-Based Hybrid Intelligent Systems and Their Dynamic Reconfiguration Zili Zhang Faculty of Computer and Information Science Southwest University
Automatically Repairing Broken Workflows for Evolving GUI Applications Sai Zhang University of Washington Joint work with: Hao Lü, Michael D. Ernst.
Exploiting Context Analysis for Combining Multiple Entity Resolution Systems -Ramu Bandaru Zhaoqi Chen Dmitri V.kalashnikov Sharad Mehrotra.
CprE 458/558: Real-Time Systems
Advisor: Hsin-His Chen Reporter: Chi-Hsin Yu Date: From AAAI 2008 William Pentney, Department of Computer Science & Engineering University of.
Learning to Navigate Through Crowded Environments Peter Henry 1, Christian Vollmer 2, Brian Ferris 1, Dieter Fox 1 Tuesday, May 4, University of.
VLDB2005 CMS-ToPSS: Efficient Dissemination of RSS Documents Milenko Petrovic Haifeng Liu Hans-Arno Jacobsen University of Toronto.
August 30, 2004STDBM 2004 at Toronto Extracting Mobility Statistics from Indexed Spatio-Temporal Datasets Yoshiharu Ishikawa Yuichi Tsukamoto Hiroyuki.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless Communication David K. Y. Yau Purdue University Department of Computer Science.
UNIT: User-ceNtrIc Transaction Management in Web-Database Systems Huiming Qu, Alexandros Labrinidis, Daniel Mosse Advanced Data Management Technologies.
8/23/00ISSTA Comparison of Delivered Reliability of Branch, Data Flow, and Operational Testing: A Case Study Phyllis G. Frankl Yuetang Deng Polytechnic.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
A Framework for Composing Pervasive Applications Oleg Davidyuk, Ivan Sanchez, Jon Imanol Duran and Jukka Riekki Advances in Methods of Information and.
1 Developing Aerospace Applications with a Reliable Web Services Paradigm Pat. P. W. Chan and Michael R. Lyu Department of Computer Science and Engineering.
Deterministic Diagnostic Pattern Generation (DDPG) for Compound Defects Fei Wang 1,2, Yu Hu 1, Huawei Li 1, Xiaowei Li 1, Jing Ye 1,2 1 Key Laboratory.
1 Travel Times from Mobile Sensors Ram Rajagopal, Raffi Sevlian and Pravin Varaiya University of California, Berkeley Singapore Road Traffic Control TexPoint.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
SEMI-SYNTHETIC CIRCUIT GENERATION FOR TESTING INCREMENTAL PLACE AND ROUTE TOOLS David GrantGuy Lemieux University of British Columbia Vancouver, BC.
September 2003, 7 th EDG Conference, Heidelberg – Roberta Faggian, CERN/IT CERN – European Organization for Nuclear Research The GRACE Project GRid enabled.
Resource Optimization for Publisher/Subscriber-based Avionics Systems Institute for Software Integrated Systems Vanderbilt University Nashville, Tennessee.
Structure Recovery by Part Assembly Chao-Hui Shen, Hongbo Fu, Kang Chen and Shi-Min Hu Tsinghua University City University of Hong Kong Presented by: Chenyang.
Tanmaya Kumar 3 rd May Outline  Problem and Objective  Key personnel  Approach  Risks  Test Cases  Results  Impact  Tasks as Executed.
Consistency Methods for Temporal Reasoning
QianZhu, Liang Chen and Gagan Agrawal
The Extensible Tool-chain for Evaluation of Architectural Models
Hierarchical Search on DisCSPs
Code search & recommendation engines
A maximum likelihood estimation and training on the fly approach
Presentation transcript:

Hybrid Context Inconsistency Resolution for Context-aware Services Chenhua Chen1, Chunyang Ye2, 3 and Hans-Arno Jacobsen2 1Department of Computer Science, University of Saarland 2Middleware Systems Research Group, University of Toronto 3 Institute of Software, Chinese Academy of Sciences Chenhua Chen, Chunyang Ye and Hans-Arno Jacobsen, PerCom'11, Seattle

Chen, Ye and Jacobsen, PerCom'11, Seattle Outline Background Context-awareness Research Problem Context Inconsistency Resolution Hybrid Solution Context Correlation Model Application Recovery Model Experimental Results Chen, Ye and Jacobsen, PerCom'11, Seattle Chenhua Chen, Chunyang Ye and Hans-Arno Jacobsen, PerCom'11, Seattle

Chen, Ye and Jacobsen, PerCom'11, Seattle Context-awareness An important feature of pervasive applications Contexts locations, time etc. Implicit input/output Seamless integrated Context-awareness Sense environment automatically Remember history Adapt to changing situations Chen, Ye and Jacobsen, PerCom'11, Seattle Chenhua Chen, Chunyang Ye and Hans-Arno Jacobsen, PerCom'11, Seattle

Chen, Ye and Jacobsen, PerCom'11, Seattle Supply Chain Scenario Update warehouse database Reading RFID tags Chen, Ye and Jacobsen, PerCom'11, Seattle Chenhua Chen, Chunyang Ye and Hans-Arno Jacobsen, PerCom'11, Seattle

Context Inconsistency Reasons Environmental noise Examples RFID reader report wrong readings Register incorrect number in warehouse GPS or GSM devices report inaccurate location Pick wrong route Chen, Ye and Jacobsen, PerCom'11, Seattle Chenhua Chen, Chunyang Ye and Hans-Arno Jacobsen, PerCom'11, Seattle

Context Inconsistency Resolution Validate consistency constraints Consistency constraints Context queue Inconsistency resolution 2) Remove oldest 3) Remove all Inconsistent contexts 4) User preference, heuristics etc. 1) Remove latest Chen, Ye and Jacobsen, PerCom'11, Seattle Chenhua Chen, Chunyang Ye and Hans-Arno Jacobsen, PerCom'11, Seattle

Chen, Ye and Jacobsen, PerCom'11, Seattle Limitations Difficult to identify problematic contexts E.g., remove the latest, oldest, least frequently used etc. Counter example to remove the latest Two RFID readers, the first one is inaccurate, the second one is accurate Resolution approaches rely heavily on constraints Accuracy and completeness of constraints are crucial Counter example Constraint: Two RFID readers report identical readings Reported readings are the same but inaccurate Chen, Ye and Jacobsen, PerCom'11, Seattle

Our Proposal: Hybrid Solution Chen, Ye and Jacobsen, PerCom'11, Seattle

Example of Our Proposal 1. Two readers report inconsistent readings 2. Postpone inconsistency resolution 3. Warehouse check in, collect weight info 4. Update profile of goods 5. Resolve inconsistent readings based on weight and profile Chen, Ye and Jacobsen, PerCom'11, Seattle

Challenges How to make use of the application semantics in resolution? Close to T0: Semantic information is of limited usefulness When to resolve? Close to T2: unacceptable recovery cost Chen, Ye and Jacobsen, PerCom'11, Seattle

Example of Application Semantics Previous Location: (2, 3) Current Location: (4, 5) Inconsistency found! The probability of each context being inaccurate is 50% Continue move one step New Location: (4, 4) warehouse (2, 3) is more likely to be inaccurate, since it is impossible to move from (2, 3) to (4, 4) in two steps. Chen, Ye and Jacobsen, PerCom'11, Seattle

Context-correlation Model CL NL C1 C2 C3 C4 C5 C7 C6 C8 C9 fe (c3, a) Current contexts Contexts after invoking action a fe(CL, a): | NL – CL|≤ 1 C3 C8 At least one of C3 and C8 is inaccurate! Chen, Ye and Jacobsen, PerCom'11, Seattle

Context-correlation Model … C7 C8 C9 Ci Cj Ck Context Ci1 Contexts Ci2 Contexts Cin C1 C2 C3 p1 p2 p3 p1 ≥ 1- p2 * p3

Application Error Recovery Inconsistency resolution s0 s2 a1 a2 s1 s3 a3 s4 a4 Sensing c detection s2’ s3’ b4 s2” b3 b2 Backward recovery Forward recovery Chen, Ye and Jacobsen, PerCom'11, Seattle

Example of Error Recovery Backward recovery Backtrack the movement Forward recovery Select a different path warehouse Chen, Ye and Jacobsen, PerCom'11, Seattle

Chen, Ye and Jacobsen, PerCom'11, Seattle Cost Model Compensation cost (cpc) For backward recovery Cost of compensating a task Execution cost (ecc) For forward recovery Cost of executing a task Total cost for an error recovery plan Chen, Ye and Jacobsen, PerCom'11, Seattle

Resolution Algorithm Collect application semantics Inconsistency detected Postpone resolution Application continues Build correlation graph Compute error recovery cost Resolve inconsistency Calculate probability Error recovery Chen, Ye and Jacobsen, PerCom'11, Seattle

Chen, Ye and Jacobsen, PerCom'11, Seattle Experiment Setup 16 X 16 Map cpc = ecc = 1 Search the target in a heuristic way Random placement of goods Metrics: Accuracy of resolution Cost of error recovery warehouse Chen, Ye and Jacobsen, PerCom'11, Seattle

Results L-RL: Remove latest L-RO: Remove oldest M-H: Hybrid solution Higher error rate Chen, Ye and Jacobsen, PerCom'11, Seattle

Results L-RL: Remove latest L-RO: Remove oldest M-H: Hybrid solution Location-aware Higher threshold Chen, Ye and Jacobsen, PerCom'11, Seattle

Chen, Ye and Jacobsen, PerCom'11, Seattle Results L-RL: Remove latest L-RO: Remove oldest M-H: Hybrid solution H-ER: Error recovery only Higher error rate Chen, Ye and Jacobsen, PerCom'11, Seattle

Chen, Ye and Jacobsen, PerCom'11, Seattle Results L-RL: Remove latest L-RO: Remove oldest M-H: Hybrid solution H-ER: Error recovery only Location-aware Higher threshold Chen, Ye and Jacobsen, PerCom'11, Seattle

Chen, Ye and Jacobsen, PerCom'11, Seattle Scalability Randomly generate correlation graph Calculate probability of each context being inaccurate Record the time needed Chen, Ye and Jacobsen, PerCom'11, Seattle

Chen, Ye and Jacobsen, PerCom'11, Seattle Conclusions A novel approach to resolve context inconsistency Combine low-level inconsistency resolution with high-level error recovery Correlation model to reason about inaccurate contexts Cost model to calculate recovery cost Algorithm to trade off accuracy against recovery cost Future work More real-life experiments Extend the correlation model to support confidence Chen, Ye and Jacobsen, PerCom'11, Seattle

Chen, Ye and Jacobsen, PerCom'11, Seattle

Chen, Ye and Jacobsen, PerCom'11, Seattle Related Work Existing resolution strategies [Heckmann, IJCAI-MRC’05] Remove the latest, the oldest, the least frequently used [Bu et al. QSIC’06] Remove all [Park et al. Compsac’05] User preference [Capra et al. TSE’03] Auction [Xu et al. ICDCS’08] Heuristics Chen, Ye and Jacobsen, PerCom'11, Seattle