2003/4/21CSE 6362 Intelligent Environments Spring 20031 The Anatomy of a Context- Aware Application Computer Science and Engineering University of Texas.

Slides:



Advertisements
Similar presentations
Some Reflections on Augmented Cognition Eric Horvitz ISAT & Microsoft Research November 2000 Some Reflections on Augmented Cognition Eric Horvitz ISAT.
Advertisements

The Cricket Compass for Context-Aware Mobile Applications Nissanka B. Priyantha.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Pervasive Computing 通訊所 鄭筱親. Outline  Introduction  Context Awareness  Recent Research  Future and Conclusion.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Location and Tracking Spring 2004: Location Recognition Larry Rudolph Location of what? Services applications, resources, sensors, actuators where.
University of Minho School of Engineering Uma Escola a Reinventar o Futuro – Semana da Escola de Engenharia - 24 e 27 de Outubro de 2011 ABSTRACT Two areas.
Volkan Cevher, Marco F. Duarte, and Richard G. Baraniuk European Signal Processing Conference 2008.
Sentient Computing Ubiquitous Computing vision Computing devices everywhere Access to applications anywhere Whatever is on hand is available Sentient Computing.
Department of Information Science and Telecommunications Interactive Systems Michael B. Spring Department of Information Science and Telecommunications.
1 Last Time  Context Aware Applications  Defining context  Active vs. passive  Survey of some applications  No killer application yet; but maybe in.
Patrik Werle Gregory D. Abowd The Future Computing Environments (FCE) Group, Georgia Institute of Technology Ubiquitous Computing: Research.
ActiveBat:1 WirelessNet Tseng Active Bat: A 3D Location Device -- presented by Yu-Chee Tseng --
1 Research Profile Guoliang Xing Assistant Professor Department of Computer Science and Engineering Michigan State University.
Real-Time Systems and the Aware Home Anind K. Dey Ubiquitous Computing Future Computing Environments.
Location Systems for Ubiquitous Computing Jeffrey Hightower and Gaetano Borriello.
CSE5610 Intelligent Software Systems Semester 1 Enabling Intelligent Systems in Pervasive Computing.
ISIS Katrinebjerg i n t e r a c t i v e s p a c e s. n e t 1 Frank Allan Hansen, Representing Context in Hypermedia Data Models International.
UNIVERSITY of CRETE Fall04 – HY436: Mobile Computing and Wireless Networks Location Sensing Overview Lecture 8 Maria Papadopouli
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
[Context to Make You More Aware] Presentation [Adrienne Andrew, Yaw Anokwa, Karl Koscher, Jonathan Lester, Gaetano Borriello Department of Computer Science.
Smart Home Technologies CSE 4392 / CSE 5392 Spring 2006 Manfred Huber
報告日期 :2012/03/07 指導教授 : 蔡亮宙 報 告 者 : 吳烱華 自製率 :100%.
Smart Learning Services Based on Smart Cloud Computing
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
Tracking issues in the Wireless sensor Network Presented By Vinay Kumar Singh Date:
Implementation of a personalized information system on mobile phones Pablo López Escobés Advanced Services Enabling Telematic Applications MSc ICT Research.
The Design Discipline.
Context-Aware Middleware for Anytime, Anywhere Social Networks Dario Bottazzi, Rebecca Montanari, and Alessandra Toninelli University of Bologna IEEE Intelligent.
Context-Aware Applications. Introduction r Context-aware is ware applications can discover and take advantage of contextual information such as m User.
Optimal Power Control, Rate Adaptation and Scheduling for UWB-Based Wireless Networked Control Systems Sinem Coleri Ergen (joint with Yalcin Sadi) Wireless.
Chapter 3: Sentient Computing. Introduction Def: Def: a form of ubiquitous computing which uses sensors to perceive its environment and react accordingly.
Implementing a Sentient Computing System Presented by: Jing Lin, Vishal Kudchadkar, Apurva Shah.
SixthSense RFID based Enterprise Intelligence Lenin Ravindranath, Venkat Padmanabhan Interns: Piyush Agrawal (IITK), SriKrishna (BITS Pilani)
Jan 24, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements Homework #2 is due in 2 weeks. If your Homework 1 is not working (and you believe that it.
Towards Low Overhead Provenance Tracking in Near Real-Time Stream Filtering Nithya N. Vijayakumar, Beth Plale DDE Lab, Indiana University {nvijayak,
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Wireless Sensor Network Wireless Sensor Network Based.
Sentient Computing Presenter : Alhaf malik.K Syed Ammal Engineering College, Ramanathapuram.
Extending Traditional Algorithms for Cyber-Physical Systems Sumeet Gujrati and Gurdip Singh Kansas State University.
What is a Sensor Web ? Abhinav Roongta Wireless Information Networking Group University of Florida March 3, 2004.
CPET 565 Mobile Computing Systems Context-Aware Computing Lecture 10 Hongli Luo Indiana University-Purdue University Fort Wayne.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Principles of Context aware systems Presented by: Rajesh Gangam Usable Security.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
College of Engineering Anchor Nodes Placement for Effective Passive Localization Karthikeyan Pasupathy Major Advisor: Dr. Robert Akl Department of Computer.
An Architecture to Support Context-Aware Applications
Nissanka B. PriyanthaAnit Chakraborty Hari Balakrishnan MIT Lab for Computer Science The Cricket Location-Support System.
Jan 17, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements Did you hear about the Microsoft site crash yesterday? Compiling in Solaris (gemini) gcc.
Indoor Positioning System
Architecture for Context-Aware Services in Gaia Anand Ranganathan.
Programming Sensor Networks Andrew Chien CSE291 Spring 2003 May 6, 2003.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
A Survey of Context-Aware Mobile Computing Research Guanling Chen and David Kotz Dartmouth Computer Science Technical Report, 2000.
REU 2007 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Information Processing.
Sentient Computing Andy Hopper Presenter : Youn Do Lee Oct 31, 2005.
An Intelligent Expert System for Proactive Services Deploying Ubiquitous Computing Technologies IEEE 2005 Proceedings of the 38th Hawaii International.
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Tracking Indoors.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
UCI Large-Scale Collection of Application Usage Data to Inform Software Development David M. Hilbert David F. Redmiles Information and Computer Science.
REU 2009 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Information Processing.
C ONTEXT AWARE SMART PHONE YOGITHA N. & PREETHI G.D. 6 th SEM, B.E.(C.S.E) SIDDAGANGA INSTITUTE OF TECHNOLOGY TUMKUR
Presented by: Shahab Helmi Spring Authors: Publication:  ICDE 2015 Type:  Research Paper 2.
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
The Anatomy of a Context-Aware Application
Wireless Machine-to-Machine Communications in Industrial Environments
Location Sensing (Inference)
Long-range capacitive sensors for indoor person location
Outline for today Feasibility of a Serverless Distributed File System deployed on an Existing set of Desktop PCs – Microsoft research. ACM SIGMETRICS 2000.
Presentation transcript:

2003/4/21CSE 6362 Intelligent Environments Spring The Anatomy of a Context- Aware Application Computer Science and Engineering University of Texas at Arlington Cheng-Lung Chu

2003/4/212CSE 6362 Intelligent Environments Spring 2003 Overview Context and context-awareness A platform described in the paper Bat Teleporting

2003/4/213CSE 6362 Intelligent Environments Spring 2003 Context Context means situational information “ Context is any information that can be used to characterize the situation of an entity. An entity is a person, place, or object that is considered relevant to the interaction between a user and an application, including the user and application themselves. ” Dey, A.K. and Abowd. G.D., Georgia Institute of Technology, 1999.

2003/4/214CSE 6362 Intelligent Environments Spring 2003 Context cont ’ Almost any info available at the time of an interaction can be seen as context info. Examples Identity Spatial info – location, orientation, speed, and acceleration Temporal info – time of the day Environmental info Social situation Resources that are nearby Availability of resources Physiological measurements Activity Schedules and agendas

2003/4/215CSE 6362 Intelligent Environments Spring 2003 Context-Awareness Context-awareness One is able to use context info. A system is context-aware if it can extract, interpret and use context info and adapt its functionality to the current context of use Challenge – Complexity of capturing, representing and processing contextual data

2003/4/216CSE 6362 Intelligent Environments Spring 2003 A Context-aware application A context-aware application adapts its behavior to a changing environment Proposed Platform A fine-grained location system A detailed data model A persistent distributed object system Resource monitors A spatial monitoring service

2003/4/217CSE 6362 Intelligent Environments Spring 2003 Indoor Location Sensing Ideal location sensor for use indoor Fine-grain spatial info High update rate Unobtrusive Cheap Scalable Robust

2003/4/218CSE 6362 Intelligent Environments Spring 2003 The Bat Location System – Bat Bats Consist of a radio transceiver, controlling logic, and ultrasonic transducer 7.5x3.5x1.5 (cm), 35g 48-bit Globally unique ID Powered by a single 3.6V Lithium cell, a lifetime of around fifteen months

2003/4/219CSE 6362 Intelligent Environments Spring 2003 The Bat Location System – Ultrasound receiver unit Placed at known points on the ceiling of the rooms to be instrumented Connected by a high-speed serial network in daisy-chain fashion Ultrasound receiver units Receivers are placed in a square grid, 1.2m apart

2003/4/2110CSE 6362 Intelligent Environments Spring 2003 The Bat Location System Base station Periodically transmits a radio message containing a single identifier, causing the corresponding Bat to emit a short un-encoded pulse of ultrasound In the mean time, receiver are reset via the wired network Receivers monitor the incoming ultrasound and record the time of arrival of any signal from the Bat Times-of-flight of the ultrasound pulse from the Bat to receivers

2003/4/2111CSE 6362 Intelligent Environments Spring 2003 The Bat Location System Entity location is determined based on the principle of trilateration 3D position can be also deduced Orientation of an object can be deduced

2003/4/2112CSE 6362 Intelligent Environments Spring 2003 The Bat Location System Reflection error - Statistical outlier rejection algorithm Reverberation 20 ms - location updates 50/second Scalability issues Location Quality of service Scheduling info can also be used to assist power saving The set of Bats to be tracked may change over time Handover of control between base stations

2003/4/2113CSE 6362 Intelligent Environments Spring 2003 The Bat Location System

2003/4/2114CSE 6362 Intelligent Environments Spring 2003 The Bat Location System Current deployment 720 receivers and 6 radio cells to cover an area of around 1000 m 2 on three floors. The system can determine the positions of up to 75 objects each second, accurate to around 3cm in three dimensions

2003/4/2115CSE 6362 Intelligent Environments Spring 2003 Environment model Describing entities in the real world and their possible interactions Sets out the types, names, capabilities and properties of all entities and acts as a bridge, allowing computer systems to share the user ’ s perceptions of the real world Ouija – a package provides an object-oriented data modeling language which is used to generate an object layer on top of the relational model used by the Oracle DB 3-tier architecture

2003/4/2116CSE 6362 Intelligent Environments Spring 2003

2003/4/2117CSE 6362 Intelligent Environments Spring 2003 Resource Monitor Resource monitor Installed on all networked machines Machine activity Machine resources Network point-to-point bandwidth and latency Techniques to ensure the DB not to be a bottleneck Update frequency Relevancy caching

2003/4/2118CSE 6362 Intelligent Environments Spring 2003 Programming with Space Location-aware applications are interested in relative spatial facts The person is standing in front of the workstation Express relative spatial facts in terms of geometric containment relationship Applications receive a stream of events expressing spatial facts relevant to them

2003/4/2119CSE 6362 Intelligent Environments Spring 2003 Spatial monitoring

2003/4/2120CSE 6362 Intelligent Environments Spring 2003 Containment tree indexing system The index system uses a quadtree called the containment index Maximal cover – the smallest set of quadtree cells required to cover the space at a particular resolution

2003/4/2121CSE 6362 Intelligent Environments Spring 2003 The containment indexing theorem Space s is contained by space t if and only if, for each cell x in the maximal cover of s, there exists exactly one cell in the maximal cover of t that contains x or is equal to x

2003/4/2122CSE 6362 Intelligent Environments Spring 2003 Bat Teleporting Improved application based on Active Badge System Redirect X Window System environment to different displays Virtual Network Computing system Provides a windowing-system-independent means for a user to access his desktop environment from any networked machine Event driven application

2003/4/2123CSE 6362 Intelligent Environments Spring 2003 Bat Teleporting cont ’ Two buttons on the Bat One is used to allow selection of an alternative desktop The other is used to override the current desktop owned by other users Three relative geometry conditions are registered with the spatial monitor Positive containment Negative containment Negative overlap

2003/4/2124CSE 6362 Intelligent Environments Spring 2003 Bat Teleporting cont ’

2003/4/2125CSE 6362 Intelligent Environments Spring 2003 An application provides human users with browsable model of the world which they can explore

2003/4/2127CSE 6362 Intelligent Environments Spring 2003 Conclusions A fine-grained sensor system A rich data model reflecting the resource information required to support context-aware application A distributed system of persistent objects which can be queried by context-aware application A resource monitoring system for collecting information about the computing environment A spatial monitoring system which allows event- based applications to be written

2003/4/2128CSE 6362 Intelligent Environments Spring 2003 References Ward, A., Jones, A., Hopper, A. A New Location Technique for the Active Office. IEEE Personal Communications Magazine, Vol. 4, No. 5, October pp Hightower, J. and Borriello, G., A Survey and Taxonomy of Location Sensing Systems for Ubiquitous Computing, UW CSE , University of Washington, Department of Computer Science and Engineering, Seattle, WA, Aug Korkea-aho, M., Context-Aware Applications Survey, Helsinki University of Technology, Department of Computer Science, Apr, Harter, A., Hopper, A., Steggles, P., Ward, A., and Webster, P., The Anatomy of a Context-Aware Application, Wireless Networks, Vol. 8, pp