Wearable Computing Meets Ubiquitous Computing Reaping the best of both worlds Bradley J. Rhodes, Nelson Minar and Josh Weaver MIT Media Lab, E15-305 20.

Slides:



Advertisements
Similar presentations
Nazim Kasumzade Public Treasury Agency Baku, Azerbaijan 02 October 2013.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Social Media Presented by: Keystone Computer Concepts.
Introduction to Research Concepts using the Card Probability Study Chapter 1 Thomas and Nelson.
Caroline Rougier, Jean Meunier, Alain St-Arnaud, and Jacqueline Rousseau IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 21, NO. 5,
Initiating Partner Notification on the Internet Wednesday, March 10 10:00-11:45 Andrew Delicata Former Lead DIS Howard Brown Health Center PCRS Coordinator.
Fire Kills Fight fire with proper prevention My Life Monday Fire is a serious threat. It may be rare in an office environment but it is important to be.
Peer-to-Peer is Not Always Decentralized …when Centralization is Good Nelson Minar
Self Expression, the Internet, and Risk Taking By Josh and E.J.
Abe Stein Singapore-MIT GAMBIT Game Lab Massachusetts Institute of Technology Cambridge, MA.
Types of attachment including insecure and secure attachments SPECIFICATION: Outline the characteristics of secure and insecure attachment, including the.
SANTA ROSA DISTRICT SCHOOLS , Internet, and Social Media Acceptable Use and Risk Policy 1.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
Emerging Tech Expo Social Networking November 18, 2009.
PROBLEM BEING ATTEMPTED Privacy -Enhancing Personalized Web Search Based on:  User's Existing Private Data Browsing History s Recent Documents 
Lack of Security in Hotspots/Wi Fi Areas Yin Wai ISM 158 4/27/10.
Co delat? What do we do?. Scores on Midterm < = < y < = < y < = < y < = < y < = 802 > 802.
Caching OGSI Grid Service Data to Allow Disconnected State Retrieval Alastair Hampshire University of Nottingham.
Wireless “ESP”: Using Sensors to Develop Better Network Protocols Hari Balakrishnan Lenin Ravindranath, Calvin Newport, Sam Madden M.I.T. CSAIL.
Keeping Ubiquitous Computing To Yourself: Privacy Protection in UbiComp Karim Adam Computing Research Centre The Open University.
Never share your passwords. Even with your significant other or your BFF! Yes, with parents. Especially if they ask. If someone in the lab was watching.
Sharena Paripatyadar.  What are the differences?
From The Princeton Review’s English and Reading Workout for the ACT and Cracking the Code ACT READING TEST STRATEGIES.
DCS 891C Research Seminar Summer 2004 July 16, 2004 Richard Harvey
TC2-Computer Literacy Mr. Sencer February 4, 2010.
By Nature Teknowledgy Presenters: Angel Morgan Anthony Morgan.
Daena J. Goldsmith, Professor & Chair Rhetoric & Media Studies Teaching with Social Media.
Future of Local Audit: Arrangements for smaller bodies SLCC Larger Councils Conference 20 April 2012.
Using Common Sense Reasoning to Create Intelligent Mobile Applications Software Agents Group MIT Media Lab.
ST01 - Introduction 1 Introduction Lecturer: Smilen Dimitrov Sensors Technology – MED4.
Waseda Univ Nakajima Lab Interaction Group Computer-supported knowledge sharing in co-located environments Yasufumi Hirakawa, Harumi Mase, Eiji Tokunaga.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Fall UI Design and Implementation1 Lecture 20: HCI Research Topics.
What is a smart classroom? Smart classroom general equipments. Examples for smart classroom’s specific tools. What are the advantages of smart classrooms?
Feature Interactions in Policy-Driven Privacy Management George Yee Larry Korba Network Computing Group Institute for Information Technology National Research.
EGEE is a project funded by the European Union under contract IST Risks of being on the Grid: the BioMedical challenge Yannick Legré CNRS/IN2P3.
Roman Numerals Northern Computer Lab. The Roman Numeral System is based on 7 different symbols. This system was developed in ancient Rome.
computer
Introduction to Digital Citizenship Topic Think of a time where you posted something online where it has had a positive or negative effect on your life.
Agents of Socialization. Agents of Socialization are… People and groups that influence our self concept, emotions, attitudes and behavior Major agents.
Google Glass Jermaine Rodney. What is Google Glass?  Google Glass is a wearable computer with an optical head-mounted display (OHMD) that is being developed.
 List three things that someone with PICA behavior might seek out to swallow.  Discuss each of the parts of a comprehensive assessment.  Describe what.
Raskar, Camera Culture, MIT Media Lab Camera Culture Ramesh Raskar Camera Culture MIT Media Lab Ramesh Raskar.
Project Management. Introduction  Project management process goes alongside the system development process Process management process made up of three.
Privacy Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
Always wear an apron or protective clothes when working with chemicals.
2000 SEMINAR ON REINSURANCE PITFALLS IN FITTING LOSS DISTRIBUTIONS CLIVE L. KEATINGE.
Using Predict a Count ROOM 11 Year 1 & 2 Renmark Junior Primary 2007.
1 Expectations Versus Size James Hurt Cincinnati Model Investment Club.
Introduction to Research Concepts using the Card Probability Study Chapter 1 Thomas and Nelson.
What Would You Do? The Risks of Behavior on the Internet.
Welcome to BSN 2006 J. Paradiso, MIT Media Lab BSN2006 co-chair.
EMPLOYEE WELLNESS PROGRAM MANUAL TULALIP TRIBE 2016.
Simple Harmonic Motion 1 st year physics laboratories University of Ottawa PHY 1124/1322
When Things Start to Think By Neil Gershenfeld Alex Sullivan.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
THE CURRENT GLOBAL ICT ENVIRONMENT
What does your digital footprint say about you?
Information Security and Travel-related Security
Cyber Self-Defense Lesson Plan
تحليل الحساسية Sensitive Analysis.
بعض النقاط التي تؤخذ في الحسبان عند تقييم الاستثمارات الزراعية
© University of Cambridge
Maintaining Unmaintainable Systems
Around the room Orders of operations.
№96 сонли умумий ўрта мактабининг ўқитувчиси Эшанкулова феруза
Similarities Differences
USN Introduction Computer Engineering Sejin Oh.
Chapter 10.
Shumin Guo, Keke Chen Data Intensive Analysis and Computing (DIAC) Lab
Presentation transcript:

Wearable Computing Meets Ubiquitous Computing Reaping the best of both worlds Bradley J. Rhodes, Nelson Minar and Josh Weaver MIT Media Lab, E Ames St. Cambridge, MA {rhodes | minar |

Introduction Problems with ubiquitous computing Wearable computing to the rescue (?) Problems with wearable computing

Introduction Ubiquitous computing and wearable computing are often applied in very similar applications. We then attempt to demonstrate that the failing of both ubiquitous and wearable computing can be alleviated by the development of systems that properly mix the two.

Problems with ubiquitous computing 1.Privacy issues: Probably the most important problem is that ubiquitous computing environments pose serious privacy risks. 2.Difficulty with personalized information: The second problem is that it is often difficult to maintain personalization of ubiquitous computing system.

Wearable computing to the rescue (?) The wearable perspective suggests that instead of putting sensors and cameras in the room, put them on the person. wearable always travels with the wearer, personal profiles never need to be transfered to a new environment. Furthermore, wearable computers are an inherently more private location for sensitive data because it never needs to leave the person.

Problems with wearable computing Wearable systems are well suited to providing privacy and personalizations, but they tend to lack in other areas: 1. Localized information 2. Localized control 3. Resource management

Wearable Computing 例子 Kickbee twitter