Castles A Strategy Game Exploring Mobile Collaborative Adaptive Software Matthew Chalmers, Malcolm Hall, Marek Bell University of Glasgow, UK.

Slides:



Advertisements
Similar presentations
Global MP3 Geoffrey Beers Deborah Ford Mike Quinn Mark Ridao.
Advertisements

Are You Smarter Than a 5 th Grader? 1,000,000 5th Grade BonusGrade 5th Grade BonusGrade 4th Grade 4th Grade Fill-in-the-Blank 4th Grade 4th Grade Fill-in-the-Blank.
WiFi Multi Model Management Swapna Palaniswamy Overall Structure Introduction Use Cases Methods Results Other Outcomes Future Directions Summary.
Understanding ac. What is ac? ac is the next generation WiFi standard 3X faster than n.
Interweaving Mobile Games With Everyday Life Marek Bell, Matthew Chalmers, Louise Barhuus, Malcolm Hall, Scott Sherwood, Paul Tennent, Barry Brown – University.
Richard Yu.  Present view of the world that is: Enhanced by computers Mix real and virtual sensory input  Most common AR is visual Mixed reality virtual.
Toolbox Mirror -Overview Effective Distributed Learning.
Rev BMarch 2004 The ABC Service as a Research Infrastructure Rajesh Mishra Per Johansson Cahit Akin Salih Ergut.
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
Background Info The UK Mirror Service provides mirror copies of data and programs from many sources all over the world. This enables users in the UK to.
Electrical and Computer Engineering PeopleFinder Vitaly Gordievsky Alex Trefonas Scott Richard Matt Beckford Preliminary Design Review.
Chapter 13 Chapter 13: Managing Internet and Network Interoperability.
DAKNET Presented By: rreema.
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
Using Bluetooth on Android Devices to Implement Real-Time Multiplayer Games Brad Boone, Corey Darr, Chris Hayes, Dale Musser, Ph.D. Introduction With the.
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
Internet Basics 1 Internet Basic includes two lessons:  Lesson 1: The Internet  Lesson 2: The World Wide Web.
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
SoNDa Sensor Network for Data Explore! 1. SoNDa Sensor Network for Data Explore! KEYWORDS Wireless Sensors Communication 2.
The Internet & The World Wide Web Notes
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
PRESENTATION BY: SCOTT COREY REPORT BY: A. KHAN, V. SUBBARAJU, A. MISRA, S. SESHAN Mitigating the True Cost of Advertisement- Supported “Free” Mobile Applications.
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
Technische Universität München Context-Aware Recommendations in Decentralized, Item-Based Collaborative Filtering on Mobile Devices Wolfgang Woerndl, Henrik.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
MOBILE CLOUD COMPUTING
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
Giovanni Napolitano 09/11/2007. Since the inception of the iPod video. Podcasts are starting to become the norm now for information sharing. Podcasts.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
1 10 THE INTERNET AND THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE.
Google cloud Vs Apple Cloud Made By: Pooja Dubey (ITSNS)
Eduroam Louis Twomey HEAnet Library Services Day 20 th November 2014.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Location-Based Mobile Games Bryon Jones, Joe Garber, Rondey Smalls
Honeypot and Intrusion Detection System
Lector: Aliyev H.U. Lecture №15: Telecommun ication network software design multimedia services. TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES THE DEPARTMENT.
Module 3: Business Information Systems Chapter 8: Electronic and Mobile Commerce.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
X-Internet COMS E Web-enHanced Information Management Hyun Min Lee
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
CHAPTER TEN AUTHORING.
Introduction to Computers COMP 900 St. Lawrence College Lecture Two: Networking and the Internet.
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
Students: Anurag Anjaria, Charles Hansen, Jin Bai, Mai Kanchanabal Professors: Dr. Edward J. Delp, Dr. Yung-Hsiang Lu CAM 2 Continuous Analysis of Many.
Components of wireless LAN & Its connection to the Internet
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
1 Wi-Fi, Wireless Broadband, Sensor & Personal Area Networks –Standards –Applications Broadband Wireless Access –WiMAX –Adapting 3G for WBA: UMTS.
FriendFinder Location-aware social networking on mobile phones.
Networking Network Classification, by there: 3 Security And Communications software.
DCS230 Centralized or Decentralized Data Transfer Prof. Nalini Venkatasubramanian -Myung Guk Lee -YunHo Huh -Abhinav.
 Internet access is the process that enables individuals and organizations to connect to the Internet using computer terminals, computers, and mobile.
The Internet – Connection Methods 14 The Internet – Connection Methods 14.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
The Internet Industry Week Two.
Mobile &Wireless Computing
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
ICT Communications Lesson 1: Using the Internet and the World Wide Web
Networks and Connecting to the Internet
IzoT™ Routers and Network Interfaces
Course Project Topics for CSE5469
Client/Server and Peer to Peer
Presentation transcript:

Castles A Strategy Game Exploring Mobile Collaborative Adaptive Software Matthew Chalmers, Malcolm Hall, Marek Bell University of Glasgow, UK

Castles And Some Other Seamful Games Matthew Chalmers, Malcolm Hall, Marek Bell University of Glasgow, UK

Background Seamful games as a testbed for ubicomp research ‘Seamfully’ revealing system structure and use Combining histories from multiple people, programs & devices Using wireless networks to share or disseminate information Bandwidth and memory: constraints and possibilities Wired and long-range ‘infrastructure’ wireless networks: slow/costly? Short-range wireless networks, e.g , UWB: fast and free? Substantial memory in mobile devices (backed up by servers online?)

Treasure (a.k.a. Bill) Two teams of players, Blue and Green Each player has PDA GPS Designed for disconnection Server drops coins on each PDA’s map Coin locations often outside network Only receive this info when in network Get close, pickup coins, get back into network, upload, get points Pickpocket: steals another player’s coins Only works when in network area Shield: protection from pickpockets Real-time maps of sampled coverage Based on history of movement

Bandwidth and Memory : hot spots set in cold expanses Cost and ownership are significant constraints too Many apps assume constant access to one network …but perform poorly on mobile devices that are really mobile Peer-to-peer mobile ad hoc networks Rely less on central servers, active Internet connection, particular access points, having a specific static IP address… Issues of transience and security High short-range bandwidth, taking advantage of local storage New possibilities for interaction and gaming

Monopoly Wi-fi hotspots in the city are used as ‘properties’ Players’ PDAs detect and identify wi-fi access points First player to find a property can ‘buy’ it Other players owe rent if they pass by Rent paid in face-to-face meetings between players Information spreads peer-to-peer, between players Small ‘ad hoc’ networks between players’ PDAs Epidemic algorithms for spreading state P2P Rent due, players’ locations, new properties, bids to buy, offers to sell…

Yoshii Feeding (Illegal Version) Some play is indoors/online Home wi-fi used like a (glowing) hotspot for street players Also maps, stats and similar web paraphernalia Most play is out in the street with PDAs Looking for wi-fi hotspots and other players Can auto-connect to net through AP? A Yoshi lives there (and a Yoshi likes fruit) Bring Yoshi its desired fruit to get a game point Can’t connect through the AP? It’s presented as a plantation, to seed and pick fruit from Players can connect to each other directly: MANETs Swapping/stealing fruit, and info on plantations & Yoshis

Yoshii Feeding (Legal Version) Some play is indoors/online Web site shows game score tables Most play is out in the street with PDAs Looking for wi-fi hotspots and other players Open AP? A Yoshi lives there (and a Yoshi likes fruit) Bring Yoshi its desired fruit to get a game point Closed AP? It’s presented as a plantation, to seed and pick fruit from Players can connect to each other directly: MANETs Swapping/stealing fruit, and info on plantations & Yoshis Stripped-down version available at

Castles: First Prototype

Domino Castles’ subsystem for handling assemblies of software components P2P ad hoc recommendations of software modules Dynamic sharing, dependency resolution and integration Recommendation based on patterns of use, and on classes and dependencies But users express utility or contextual relevance in and through their use Designers specify module’s class and class dependencies Social and technical means for security and privacy Transfer done as part of face-to-face game play Also: certification of modules? Sandbox? Showing logs of use?

The Current State of Affairs Legal Yoshi user trial just finished Stripped-down downloadable version just made available Pilot runs of Castles recently done Same base set of 54 components: buildings, adapters and units And also two other buildings, two other adapters, one extra unit Recommendations helped players who had poor setups Full trials of Castles beginning in October Interface and comms improvements, larger component set Video and system logs sync’d for playback in Replayer tool Issues of uniformity of system structure: the cost of winning battles? Building Bluetooth version of Domino infrastructure Links with U. Nottingham, UCL, U. Bristol and Blast Theory

Conclusion Games as a testbed for ubicomp, ubicomp as a testbed for games Exploiting fast comms and storage of mobile devices Seamful exposure of system (infra)structure Past use as a resource for adaptation of system structure and ongoing use Castles: system adaptation as part of a multiplayer game More coarse-grained and accessible than modding code How will players handle dynamics, develop strategies and adapt game play?