The Smart Party: A Personalized Location-aware Multimedia Experience Kevin Eustice, V. Ramakrishna, Nam Nguyen, and Peter Reiher CCNC January 11, 2008.

Slides:



Advertisements
Similar presentations
Aspire Vertical Markets Retail Store. Retail Store Solution.
Advertisements

Motorola General Business Use MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are.
Starting With The OSGi Specifications By Peter Kriens, CEO aQute OSGi Fellow
2006/12/05ICS Home Automation Examples of WSN: (iPower: An Energy Conservation System for Intelligent Buildings) Yu-Chee Tseng (appeared in ICS 2006)
Martin Wagner and Gudrun Klinker Augmented Reality Group Institut für Informatik Technische Universität München December 19, 2003.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Bundubox ITU IOT IOT APPLICATION CHALLENGE. Proposal ▫Main idea ▫Local Communication Issues, Involved Solution ▫Bundubox: Local off the grid ip communication.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Adaptive Video Streaming in Vertical Handoff: A Case Study Ling-Jyh Chen, Guang Yang, Tony Sun, M. Y. Sanadidi, Mario Gerla Computer Science Department,
The Smart Party A Personalized Location-Aware Multimedia Experience Kevin EusticeNam Nguyen V. Ramakrishna Dr. Leonard Kleinrock Dr. Peter Reiher Location-Driven.
An Investigation into Guest Movement in the Smart Party Jason Stoops Faculty advisor: Dr. Peter Reiher.
Mobile and Ubiquitous Computing. Overview Attributes Discussion.
Quality of Service in IN-home digital networks Alina Albu 23 October 2003.
Terminal Bridge Extension Over Distributed Architecture MSc. Sami Saalasti.
PROGRESS project: Internet-enabled monitoring and control of embedded systems (EES.5413)  Introduction Networked devices make their capabilities known.
2006/12/05ICS iPower: An Energy Conservation System for Intelligent Buildings by Wireless Sensor Networks Yu-Chee Tseng, You-Chiun Wang, and Lun-Wu.
UPnP AV Architectural Multimedia System with a Home Gateway Powered by the OSGi Platform Manuscript received January 15, 2005 Reporter: Sy-Han Wang.
Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
New Technologies Are Surfacing Everyday. l Some will have a dramatic affect on the business environment. l Others will totally change the way you live.
Smart Party: Song Selection Kevin F. Eustice, Jason Stoops, Peter Reiher, Venkatraman Ramakrishna, Nam Nguyen UCLA.
Smart Home Technologies CSE 4392 / CSE 5392 Spring 2006 Manfred Huber
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
報告日期 :2012/03/07 指導教授 : 蔡亮宙 報 告 者 : 吳烱華 自製率 :100%.
Operating System.
A Collaborative Music DJ for Ad Hoc Networks Ursula Wolz Mike Massimi Eric Tarn Department of Computer Science The College of New Jersey.
What is it? Social networking is the grouping of individuals into specific groups, much like a neighborhood subdivision, if you will. Although social.
The Energy Aware Smart Home
AGENT-BASED GATEWAY OPERATING SYSTEM FOR RFID- ENABLED UBIQUITOUS MANUFACTURING ENTERPRISE - JI FANG, TING QU, ZHI LI, GANGYAN XU, GEORGE Q. HUANG HKUZIRI.
JDBC Vs. Java Blend Presentation by Gopal Manchikanti Shivakumar Balasubramanyam.
MINI MEDIA CENTER Charles Hayden Network Security and Electronics Department of Applied Engineering and Technology Eastern Kentucky University.
Mobile data. Introduction Wireless (cellular) communications has experienced a tremendous growth in this decade. Most of the wireless users also access.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Spring 2011 CIS 4911 Senior Project Catalog Description: Students work on faculty supervised projects in teams of up to 5 members to design and implement.
Wireless Networks of Devices (WIND) Hari Balakrishnan and John Guttag MIT Lab for Computer Science NTT-MIT Meeting, January 2000.
Configuring Directory Certificate Services Lesson 13.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
© 2005 Avaya Inc. All rights reserved. Using Context-Awareness and User Negotiation for Intelligent Dialing in Enterprise Communications Amogh Kavimandan.
Putting it all together Dynamic Data Base Access Norman White Stern School of Business.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
INVITATION TO COMPUTER SCIENCE, JAVA VERSION, THIRD EDITION Chapter 6: An Introduction to System Software and Virtual Machines.
Future Learning Landscapes Yvan Peter – Université Lille 1 Serge Garlatti – Telecom Bretagne.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Internet Real-Time Laboratory Arezu Moghadam and Suman Srinivasan Columbia University in the city of New York 7DS System Design 7DS system is an architecture.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
TTCN-3 MOST Challenges Maria Teodorescu
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
PIMRC 2007 A lightweight approach for providing Location Based Content Retrieval Anastasios Zafeiropoulos, Emmanuel Solidakis, Stavroula Zoi, Nikolaos.
Experiment Management System CSE 423 Aaron Kloc Jordan Harstad Robert Sorensen Robert Trevino Nicolas Tjioe Status Report Presentation Industry Mentor:
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
1 Ubiquitous Computing in Home Networks Henning Schulzrinne, Columbia University Stefan Berger, IBM Research IEEE Communication Magazine 2003.
Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Environments V. Ramakrishna, Kevin Eustice, Matthew Schnaider Laboratory.
Web Service-Based Remote Monitoring System for Smart Home Space Sheng Cai Joshua Ferguson Xinhui Hu Wei Wu Project for CSE535 Mobile Computing.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
WOSS 04 1 Task-based Self-adaptation David Garlan Bradley Schmerl Joao Sousa Vahe Poladian Carnegie Mellon University WOSS’04.
Saahithi Chillara Radhika Goyal ECE Fall Senior Design Project.
Background Music System -- Home Automation. Background Music System Features RF and IR remote control Multi source for music input Easy programme for.
Planning Engagement Kickoff
Mixus Daniel Mittelman Tomer Brosh
Amazon Echo Customer Service Support Number
Anne Pratoomtong ECE734, Spring2002
The Smart Party.
Application Layer Mobility Management Scheme for Wireless Internet
3rd Studierstube Workshop TU Wien
Presentation transcript:

The Smart Party: A Personalized Location-aware Multimedia Experience Kevin Eustice, V. Ramakrishna, Nam Nguyen, and Peter Reiher CCNC January 11, 2008

2 The Ubicomp Home of the Future Increasing numbers of computing and communications devices in the home Wireless networks are common in the home The family and visitors carry personal devices with them What new things can we do for people with these capabilities?

3 One Example: The Smart Party People commonly carry devices that hold the music they like Speakers can be connected to the home network Localization techniques can determine where people are in a house So why not combine those abilities to improve a party in the house? Provide a dynamic customized music mix to match the tastes of people in different rooms in the house

4 What We’ve Got The Home Living Room Dining Room Family Room Sam Bob Mary Charlie Alice Kevin Carol Todd Betty Shawn

5 What We Want Smart Party Living Room Dining Room Family Room Rock Rap Jazz Folk R&B

6 The Basic Approach Run a ubiquitous computing application –On both devices in the home and personal devices –Built using Panoply middleware Automatically recognize and enroll people you invited to the party as they arrive Figure out everyone’s location Use musical preferences of those in a room to choose music Get chosen music from personal device and play it

7 Major Challenges Configuring the personal devices –Only for those invited, of course Localization Selecting the music –To maximize overall satisfaction of partygoers Handling dynamism

8 Smart Party Architecture Smart Party Living Room SmartPartyLocationApp Kitchen SmartPartyLocationApp Family Room SmartPartyLocationApp Sam SmartParty UserDeviceApp Mary SmartParty UserDeviceApp Localization Map Updates Content Selection Protocol Bob Access Negotiation Alice SmartParty UserDeviceApp A partygoer arrives The personal device localizes A room gathers music preferences Music is selected, fetched, and played Content Provisioning Protocol

9 Handling the Hard Parts Configuration –Cryptographic voucher carries both invitation and necessary configuration information Localization –Using maps of wireless characteristics Selecting and retrieving the music –Automated voting algorithm based on known user preferences Handling dynamism –Middleware builds and maintains groups based on users’ locations

10 Smart Party Status Working version in UCLA LASR lab –Based on our Panoply ubicomp middleware –Required around 1800 lines of Java Continuing work –To measure user satisfaction –To study different methods of choosing music –To handle changing wireless maps –New application features

11 Conclusion The Smart Party is an example of neat things ubicomp can do for users The Panoply middleware made the Smart Party easy to build The Smart Party demonstrates the value of organizing applications by groups The Smart Party demonstrates practical solutions to common ubicomp problems