Update meeting November 24 th. 2 Outline Paper presented in Int’l Conference on Ubiquitous Computing (UCS’04), Japan Current work on new paper – Data.

Slides:



Advertisements
Similar presentations
User Care Preference-based Service Discovery in a Ubiquitous Environments Dongpil Kwak, Joongsoo Lee, Dohyun Kim, and Younghee Lee Talk by Joongsoo Lee.
Advertisements

ARCHITECTURES FOR ARTIFICIAL INTELLIGENCE SYSTEMS
15 th International Conference on Design Theory and Methodology 2-6 September 2003, Chicago, Illinois Intelligent Agents in Design Zbigniew Skolicki Tomasz.
FixtureFinder: Discovering the Existence of Electrical and Water Fixtures Vijay Srinivasan*, John Stankovic, Kamin Whitehouse University of Virginia *(Currently.
Context-Awareness on Mobile Devices – the Hydrogen Approach Sangkeun Lee.
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next  Input device is any hardware component used to enter data or instructions.
1 Moving Upstream: Facilitation in the IEP Life Cycle The First National Symposium on IEP Facilitation October 28-29, 2005 Greg Abell Sound Options Group,
Design and Implementation of a Middleware for Sentient Spaces Bijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyue Ji, Daniel Massaguer Sharad Mehrotra,
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Paper Title Your Name CMSC 838 Presentation. CMSC 838T – Presentation Motivation u Problem paper is trying to solve  Characteristics of problem  … u.
6.1 Intelligent User Interfaces: achievements and challenges ISE554 The WWW for eLearning.
An Approach for Configuring Ontology- based Application Context Model Chung-Seong Hong, Hyun Kim, Hyoung-Sun Kim Electronics and Telecommunication Research.
2006/12/05ICS iPower: An Energy Conservation System for Intelligent Buildings by Wireless Sensor Networks Yu-Chee Tseng, You-Chiun Wang, and Lun-Wu.
Architectural Issues in C-A Mobile Apps. Andrés Fortier 1,2, Cecilia Challiol 1, Gustavo Rossi 1,3, Silvia Gordillo 1,4 {andres, ceciliac, gustavo,
Behavior- Based Approaches Behavior- Based Approaches.
Intelligent Agents: an Overview. 2 Definitions Rational behavior: to achieve a goal minimizing the cost and maximizing the satisfaction. Rational agent:
Introduction to the course January 9, Points to Cover  What is GIS?  GIS and Geographic Information Science  Components of GIS Spatial data.
報告日期 :2012/03/07 指導教授 : 蔡亮宙 報 告 者 : 吳烱華 自製率 :100%.
There is more to Context than Location Albrecht Schmidt, Michael Beigl, and Hans-W. Gellersen Telecooperation Office (TecO), University of Karlsruhe, Elsevier,
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
Chapter 7 Requirement Modeling : Flow, Behaviour, Patterns And WebApps.
南台科技大學 資訊工程系 Posture Monitoring System for Context Awareness in Mobile Computing Authors: Jonghun Baek and Byoung-Ju Yun Adviser: Yu-Chiang Li Speaker:
Chapter 8 Prediction Algorithms for Smart Environments
Social Computing Networks: A New Paradigm for Engineering Pervasive Software Systems Naeem Esfahani Sam Malek 32th International Conference on Software.
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
Comp 20 - Training & Instructional Design Unit 6 - Assessment This material was developed by Columbia University, funded by the Department of Health and.
CPET 565 Mobile Computing Systems Context-Aware Computing (2) Lecture 11 Hongli Luo Indiana University-Purdue University Fort Wayne.
A Study of Context-Awareness - CASS, Hydrogen Context Team Summarized and Presented by Seungseok Kang.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Intelligent Large Scale Sensing Systems (ILS 3 ) initiative Initiative Status and Activities Kevin M. McNeill, PhD Research Assoc. Professor Director,
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
CASS – Middleware for Mobile Context-Aware Applications Patrick Fahy Siobhan Clarke Trinity College Dublin, Ireland Summarized by Babar Tareen,
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Implicit Human Computer Ineraction Through Context
1 Chapter 11 Analysis Concepts and Principles. 2 Requirements Analysis.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Intelligent Environments1 Conclusions and Future Directions.
Semantic Gadgets Pervasive Computing Meets the Semantic Web Reza Zakeri Sharif University of Technology.
THE VISION OF AUTONOMIC COMPUTING. WHAT IS AUTONOMIC COMPUTING ? “ Autonomic Computing refers to computing infrastructure that adapts (automatically)
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
Providing User Context for Mobile and Social Networking Applications A. C. Santos et al., Pervasive and Mobile Computing, vol. 6, no. 1, pp , 2010.
Srinivas Cheekati( ) Instructor: Dr. Dong-Chul Kim
INRIA - Progress report DBGlobe meeting - Athens November 29 th, 2002.
Science Terms TAKS Objective 1.
1 A Peripheral Display Toolkit Tara Matthews[1], Tye Rattenbury[1], Scott Carter[1], Anind K. Dey[2], Jennifer Mankoff[1] [1] EECS Department UC Berkeley.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
International Conference on Fuzzy Systems and Knowledge Discovery, p.p ,July 2011.
The Nature of Evidence Evidence Management & Intelligence Analysis Richard M Leary.
Lucent Technologies - Proprietary 1 Interactive Pattern Discovery with Mirage Mirage uses exploratory visualization, intuitive graphical operations to.
By: Nelson Webster. Algorithm Engineers Algorithm engineers study the effectiveness and efficiency of procedures of solving problems on a computer.
Feb 12, ECET 581/CPET/ECET 499 Mobile Computing Technologies & Apps Context Aware Computing 3 of 3 Lecture 12 Paul I-Hai Lin, Professor Electrical.
Smart Instant HKU Context-aware Instant Messenger for Mobile Users Supervisor: Dr.Cho-Li Wang CS Final Year Project (Year )
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
RADAR February 15, RADAR /Space-Time Learning.
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
Control-Theoretic Approaches for Dynamic Information Assurance George Vachtsevanos Georgia Tech Working Meeting U. C. Berkeley February 5, 2003.
Reasoning under Uncertainty Eugene Fink LTI Seminar November 16, 2007.
C ONTEXT AWARE SMART PHONE YOGITHA N. & PREETHI G.D. 6 th SEM, B.E.(C.S.E) SIDDAGANGA INSTITUTE OF TECHNOLOGY TUMKUR
3.1 Hardware Strand 3 Sara Liquori.
MARKETING RESEARCH ? ? ? ? ? ?.
TECHNOLOGY GUIDE FOUR Intelligent Systems.
Posture Monitoring System for Context Awareness in Mobile Computing
Autonomous Cyber-Physical Systems: Course Introduction
Model-Driven Analysis Frameworks for Embedded Systems
Class Announcements 1 week left until project presentations!
Science of Biology
전문가 시스템(Expert Systems)
Presentation transcript:

Update meeting November 24 th

2 Outline Paper presented in Int’l Conference on Ubiquitous Computing (UCS’04), Japan Current work on new paper – Data Fusion Algorithm

3 Recap on previous talk: The Context Spaces Model SjSj SiSi RiRi Operators:

4 UCS’04 - Situations in the Smart Room: problem of uncertainty a b c x y z - A Meeting - A Presentation - Friday Gathering visualization of situation definitions in smart room and context states

5 UCS’04 - Verification I State-space difference = where, User in a meeting User working in office

6 UCS’04 - Verification II The Objective: Recognize conflicts and intelligently resort to other elements in the environment for verification. ‘On’‘Off’

7 UCS’04 - Verification II Event TypesSituation Subspaces Contradicting Event Values Value corresponds to def. of Identifying supporting events

8 UCS’04 - Verification III Healthy Walking Standing Running Sick Respiratory Rate Heart Rate Running Sick Standing The problem: ‘Running’? ’Sick’? (‘Running’ ‘Sick’)? The procedure: We reveal that: (If ‘Walking’ AND ’Sick’ then infer ‘Running’) ’Walking’ ’Sick’ It is more likely that we are in: ‘Running’

9 UCS’04 - The Reasoning Process Knowledge Synthesis Conflict Analysis Verification Situation Composition Low-Level Discrepancies Discovery Raw Data input Sensor data Knowledge Synthesis Conflict analysis Verification Situations Composition input output Complex Situations Basic Situations Refined Situations Reasoning Process

10 UCS’04 - Verification Layer - the ReaGine Prototype Load Monitor Reasoning Engine Cleaner KB Data Assimilator Data Inserter Monito r Stability Analyzer MQMQ MQMQ Senso Sensor Event Router Algorithms Library Monito r Same run with added uncertainty Experimental run Experiment deployment architecture

11 New Paper – Synthesising Sensor Data for Context-Aware Applications Introduces a new sensor fusion technique: –Built over a general context model –Consider intuitions relevant to context-aware computing –Provides a different perspective to model knowledge & uncertainty e2 e3 e4 e5 e6 e7 e8 e9 situation1 situation2 situation3 situation4 e1 eventssituationssensor fusion Relating events to situations Dempster-Shafer starting point Context Spaces starting point

12 New Paper – Synthesising Sensor Data for Context-Aware Applications for If < C then = 0; for where I. II. III. where = = IV. where and Built over the context spaces model Based on multi-attribute utility theory and probability theory Considers intuitions from human perception for context reasoning

13 New Paper – Algorithm Characteristics   B B A A attribute nameserialimportance (1-5)optionalweight User RFID Y Location14No User RFID X Location14No User PDA Y Location13Yes User PDA X Location13Yes MR Light Level14No MR Light Level24No MR Noise Level12.5No MR Motion Detected12.5No MR Projector Active14Yes MR Microphone Active14Yes Examples of factors covered by algorithm: Individual significance of events The importance of a complete match Degree of trust in evidence accuracy Changing significance of match rejection

14 Use Synthesis process to reason about and distinguish between: User presenting User attending another’s presentation User in a meeting Context Attributes: User notebook’s keyboard activity User notebook active presentation processes Light level in room User position (by tracing his mobile devices) New Paper – Smart Room Experiment

15 New Paper – Experiment Deployment & Design Motes Interface Service Positioning Engine Service Hook user activity Identify presentation act. Synthesis Process Data Interpretation   Positioning Engine Notebook Location Light sensors Notebook Inferred Location

16 New Paper – Sensor Technology Ekahau Positioning Engine: Berkeley Motes:

17 New Paper – Results Synthesis results in differentiating between situations         Time (in min.) 15min 30min45min U. Presenting U. in Presentation U. in Meeting          U. in Presentation U. Presenting U. in Meeting        U. in Presentation U. Presenting U. in Meeting Unpredictable user behavior SynthesisDempster-Shafer