A Human-centric framework for universal access Canadian Undergraduate Software Engineering Conference March 7-9, 2002 Jacob Slonim Dalhousie.

Slides:



Advertisements
Similar presentations
Welcome to Middleware Joseph Amrithraj
Advertisements

4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
8.
02/12/00 E-Business Architecture
CS 501: Software Engineering Fall 2000 Lecture 16 System Architecture III Distributed Objects.
ATSN 2009 Towards an Extensible Agent-based Middleware for Sensor Networks and RFID Systems Dirk Bade University of Hamburg, Germany.
Internet Resources Discovery (IRD) IBM DB2 Digital Library Thanks to Zvika Michnik and Avital Greenberg.
Tools and Services for the Long Term Preservation and Access of Digital Archives Joseph JaJa, Mike Smorul, and Sangchul Song Institute for Advanced Computer.
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
Policy-based Accounting: Accounting Issues Georg Carle, Sebastian Zander, Tanja Zseby GMD FOKUS - German National Research Center for Information Technology.
The Architecture of Transaction Processing Systems
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6.
Chapter 9: Moving to Design
Business Intelligence Dr. Mahdi Esmaeili 1. Technical Infrastructure Evaluation Hardware Network Middleware Database Management Systems Tools and Standards.
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
Knowledge Portals and Knowledge Management Tools
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Abstraction and Control of Transport Networks (ACTN) BoF
Agent-based E-travel Agency Agent Systems Laboratory Oklahoma State University
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
By N.Gopinath AP/CSE. Why a Data Warehouse Application – Business Perspectives  There are several reasons why organizations consider Data Warehousing.
Chapter 9 Elements of Systems Design
1 Autonomic Computing An Introduction Guenter Kickinger.
Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University.
1 10 THE INTERNET AND THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE.
Quality Attributes of Web Software Applications – Jeff Offutt By Julia Erdman SE 510 October 8, 2003.
Chapter 13 – Network Security
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
© 2007 Tom Beckman Features:  Are autonomous software entities that act as a user’s assistant to perform discrete tasks, simplifying or completely automating.
Trends Information Systems and Management. Trends Disruptive versus Sustaining Wireless IT Focus for organizations IRM –Strategic vs. –Operational CIO.
Module 7: Fundamentals of Administering Windows Server 2008.
Database Application Security Models Database Application Security Models 1.
CS480 Computer Science Seminar Introduction to Microsoft Solutions Framework (MSF)
Dr. Mohamed Osman Hegazi 1 Database Systems Concepts Database Systems Concepts Course Outlines: Introduction to Databases and DBMS. Database System Concepts.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
NAVEEN AGENT BASED SOFTWARE DEVELOPMENT. WHAT IS AN AGENT? A computer system capable of flexible, autonomous (problem-solving) action, situated in dynamic,
C5- IT Infrastructure and Emerging Technologies. Input – Process - Output 2 A computer  Takes data as input  Processes it  Outputs information CPU.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
ECI – electronic Commerce Infrastructure “ An application to the Shares Market ” Demetris Zeinalipour ( Melinos Kyriacou
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
SYSTEMSDESIGNANALYSIS 1 Chapter 21 Implementation Jerry Post Copyright © 1997.
Developing GRID Applications GRACE Project
Cyberinfrastructure Overview of Demos Townsville, AU 28 – 31 March 2006 CREON/GLEON.
5/29/2001Y. D. Wu & M. Liu1 Content Management for Digital Library May 29, 2001.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
ACGT Architecture and Grid Infrastructure Juliusz Pukacki ‏ EGEE Conference Budapest, 4 October 2007.
9 Systems Analysis and Design in a Changing World, Fifth Edition.
Towards a High Performance Extensible Grid Architecture Klaus Krauter Muthucumaru Maheswaran {krauter,
Distributed Systems Architectures Chapter 12. Objectives  To explain the advantages and disadvantages of different distributed systems architectures.
Data and database administration
Joseph JaJa, Mike Smorul, and Sangchul Song
Software Design and Architecture
Chapter 18 MobileApp Design
Introduction to Cloud Computing
System And Application Software
MANAGING DATA RESOURCES
IT INFRASTRUCTURES Business-Driven Technologies
THREE TIER MOBILE COMPUTING ARCHITECTURE
DAT381 Team Development with SQL Server 2005
Copyright 2005 Prentice- Hall, Inc.
Presentation transcript:

A Human-centric framework for universal access Canadian Undergraduate Software Engineering Conference March 7-9, 2002 Jacob Slonim Dalhousie University, Halifax, Canada

Overview - Historical perspective - Future trends - Accessibility problems - Human-centric architecture - Functionality of components - Example interactions - Conclusion

History (’70s) Centralized paradigm –Systems developed by computer scientists for computer scientists –Resource limitations caused much of the complexity in systems to be pushed out to the end users –Computers used by computing professionals

History (’80s) Centralized paradigm -> Client-Server paradigm –Driven by reduced cost of computing and the resulting increase in client machine capabilities –Middleware introduced as a layer of abstraction to reduce complexity for applications programmers dealing with heterogeneous distributed systems –Computers used for business process automation

History (’90s) Shift in type of individual accessing systems –Personal computers proliferate –Widespread Internet access from work and home –Roll-out of infrastructure based on reduced hardware and networking costs –Complexity of systems slows roll-out for some sectors of society

Today Growing disparity between technological “haves” and “have nots” (Digital Divide) “New economy” must be more inclusive How can we make Electronic Commerce as accessible as the telephone?

Evolutionary approach to development Hardware is replaced over time –Advances in hardware take replacement approach while maintaining backwards compatibility. Software evolves over time –Many systems in use today are four decades old –Replacement of legacy systems infeasible

Client-Server -> Peer-to-Peer –Anticipated shift driven by issues of scalability in client-server systems and by the reduced cost of networking Technology Push -> Technology Pull –Allow domain experts to apply technology to problems without the intervention of computing professionals Computing-Centric -> Human-Centric –Personalization required to increase accessibility –Complexity of interaction must match user’s capabilities Future…

Personalization For our purposes, personalization means more than just customizing the look and feel of a web site interface or accessibility techniques such as translating from text to speech Instead, personalization implies a system focused on the end user’s needs, preferences, abilities, and computing context at all times, and the customization of all interactions with the user in a way that reduces complexity for the end user.

Types of Complexity Interaction complexity – the degree to which the steps to be taken during an interaction are intuitively tailored to the end user Information overload – too much data relayed to the end user due to insufficient filtering Mental model complexity – the end user’s mental model of the system’s underlying states can be overly complex

Bridging the Gap Need personalized systems to increase accessibility Stuck with legacy computing-centric systems Introduce a layer of abstraction to bridge the gap

Human-Centric Layer Applications Middleware Layer Legacy Systems Layer Physical Layer Domain-specific extensions and tools End User High-level Architecture CORBA IBM DB2 SUN Ultra-30

PersonalizationSecurityInteraction Configuration Human-Centric Layer Profiling Static Dynamic Agents Predictive Modeling Policy Access Control Privacy Authentication Device Configuration Management Multimodal Coordination Sensors … … … … Domain-specific extensions Application Wrappers Middleware Services Content Management

Personalization Profiling Static Dynamic Data that remains constant or changes periodically Stored in a database in as fine a granularity as possible Information subject to rapid change, derived from user interactions, datamining, interactions with other modules of the human-centric layer and with domain experts Agents Predictive Modeling Domain-specific agents that operate for the end user Tools to dynamically learn personalization information

Security Policy Access Control Privacy Authentication Rule-based system configurable by end user, with domain- specific management policies provided by domain experts Fine to coarse grained access control mechanisms to restrict and allow access to personalization information Mechanisms to ensure privacy is not violated based on security policy rules (e.g., datamining to protect against query-based attacks on privacy) Configuration of authentication methods for allowing multiple levels of access, including GPS and biometric authentication techniques

Interaction Configuration Device Configuration Management Multimodal Coordination Sensors Content Management Manages internal model of end user operating environment(s) Dynamic coordination of multimodal interactions Provisions for content equivalencies and dynamic filtering and translation between content formats based on environmental and personalization information and domain- specific criteria Sensor drivers and tools for managing sensory data

Domain-specific extensions For each domain - a schema developed by multi-disciplinary teams of experts in consultation with database administrators - domain-specific views of static profile data - tools that allow domain experts to create domain- specific workflows - workflows will raise exceptions when required fields are not present, causing the interface configuration component to initiate user interactions that populate the missing fields - interactions will be tailored to the end user’s abilities and computing environment based on personalization information

Example – privacy with videophones The end user’s telephone is equipped with a video screen and video camera. The phone rings, and the user answers. - The interaction configuration component consults the personalization information and security policy to determine, based on the caller ID, whether to activate the video camera or open only an audio channel

Example – Medical domain with heart sensor The end user has sensors monitoring their heart-rate. - The interaction configuration component manages the sensory data as it is collected. - A domain-specific workflow is triggered by a rapid sequence of beats indicative of heart palipitations. -The workflow, configured by the physician, takes appropriate action. This could involve - querying the user - calling the physician - analyzing stored sensory data for the past few minutes - dialing 911

Conclusion We are trying to create an environment that is –accessible (removes interaction complexity) –“technology pull” (configured by domain experts) –trusted (guarantees personal privacy) –adaptive adapts to changes in user’s needs supports multimodal interactions learns personalization information over time –peer-to-peer (ultimate flexibility for configuration) - human-centric