Mobile and Pervasive Computing - 6 Past, Present and Future Researches of Ubiquitous Computing Presented by: Dr. Adeel Akram University of Engineering.

Slides:



Advertisements
Similar presentations
Lecture 10 Sharing Resources. Basics of File Sharing The core component of any server is its ability to share files. In fact, the Server service in all.
Advertisements

Beyond Prototypes: Challenges in Deploying Ubiquitous Systems N. Davies and H. Gellersen IEEE pervasive computing, 2002 Presenter: Min Zhang
Pervasive Computing: Vision and Challenges
Chapter 5 p. 6 What Is Input? What is input? p. 230 and 232 Fig. 5-1 Next  Input device is any hardware component used to enter data.
1 Automated Testing & Test Tools Apirada Thadadech.
Challenges in Ubiquitous Computing Patrick Malatack.
Ubiquitous Computing Definitions Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical.
1 Ubiquitous Computing CS376 Reading Summary Taemie Kim.
Software Engineering Issues for Ubiquitous Computing Author: Gregory D. Abowd, Georgia Institute of Technology CSCI 599 Week 4 Paper 3 September
HCI Issues in eXtreme Computing James A. Landay Endeavour-DARPA Meeting, 9/21/99.
Ubiquitous Computing Computers everywhere. Agenda Old future videos
Ubiquitous Computing Computers everywhere. Thursday: presentations UCook Team NoName Save the Best for Last Food Networking.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
1 Application Areas Lecture 17 Date: 6 th April. 2 Overview of Lecture Application areas: CSCW Ubiquitous Computing What is ubiquitous computing? Major.
Pervasive Computing: What is it good for? Andrew C. Huang et all Stanford University Presented by Kalpana Banerjee.
Ubiquitous Computing Computers everywhere.
Location Systems for Ubiquitous Computing Jeffrey Hightower and Gaetano Borriello.
We are partners in learning.. Note: Office 365 works best in Internet Explorer V 9 or above. Some features do not work in PWCS’s Chrome Browser or in.
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
Your Interactive Guide to the Digital World Discovering Computers 2012.
©1999 Addison Wesley Longman Slide 1.1 The Challenge of Applying IT Successfully 1.
Open and save files directly from Word, Excel, and PowerPoint No more flash drives or sending yourself documents via Stop manually merging versions.
Alternative Input Devices. Digital Camcorder View recordings on a regular TV or copy them to VHS tape Send MPEG video clips by way of to a mobile.
Design of Handheld Devices
1 Enabling Pervasive Computing Become Truly Pervasive Dr. Joseph Loyall BBN Technologies March 3, 2009 Research Directions in Situational-aware Self-managed.
DCS 891C Research Seminar Summer 2004 July 16, 2004 Richard Harvey
Creating User Interfaces General issues. Classwork/homework: embedded computing project.
Using Tools Mark Grabe. Copyright © Houghton Mifflin Company. All rights reserved.3-2 Tool Definition n An object that allows the user to perform tasks.
The Computer for the 21 st Century Mark Weiser – XEROX PARC Presented By: Mihail Ionescu.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
Ubiquitous Computing Lecture 28.
Operating Systems  A collection of programs that  Coordinates computer usage among users  Manages computer resources  Handle Common Tasks.
11.10 Human Computer Interface www. ICT-Teacher.com.
The ID process Identifying needs and establishing requirements Developing alternative designs that meet those requirements Building interactive versions.
CHAPTER FOUR COMPUTER SOFTWARE.
Fall 2002CS/PSY Pervasive Computing Ubiquitous computing resources Agenda Area overview Four themes Challenges/issues Pervasive/Ubiquitous Computing.
Charting Past, Present, and Future Research in Ubiquitous Computing Gregory D. Abowd and Elizabeth D. Mynatt Georgia Institute of Technology LEE SEMUN.
IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 9.
ISNE 101 Week 8 Dr. Ken Cosh. Next Assignment!  Choose a Movie (Futuristic)  First Come, First Served – different movies – get my approval first! 
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
Pervasive Computing: What is it good for? Andrew C. Huang, Benjamin C. Ling, Shankar Ponnekanti, Armando Fox Stanford University.
A context-aware communication system Natalia Marmasse advisor: Chris Schmandt Speech Interface Group MIT Media Lab.
1 COMPSCI 110 Operating Systems Who - Introductions How - Policies and Administrative Details Why - Objectives and Expectations What - Our Topic: Operating.
Modal Interfaces & Speech User Interfaces Katherine Everitt CSE 490F Section Nov 20 & 21, 2006.
CPET 565 Mobile Computing Systems Context-Aware Computing (2) Lecture 11 Hongli Luo Indiana University-Purdue University Fort Wayne.
1 Chapter 7 Designing for the Human Experience in Smart Environments.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Usability in Pervasive Computing Environment Advance Usability October 18, 2004 Anuj A. Nanavati.
1© 2011 M. SatyanarayananNSF PeCS Workshop January 27, 2011 Achieving Ubiquity through Hardware Virtualization Mahadev Satyanarayanan School of Computer.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
Human-Computer Interaction
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Trends in Embedded Computing The Ubiquitous Computing through Sensor Swarms.
Stefan Marti Speech Interface Group MIT Media Lab.
1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel:
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Ubiquitous Computing Computers everywhere. Wednesday: presentations Ideal Concepts T.H.E. Team Infused Industries CommuniCORP Part 3 DUE!
Page 1 of 45 BIOS & Software | © 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please.
9/30/2001Craig Ganoe Methods Supporting Usability Evaluation of the Collaborative Meeting Place Craig Ganoe Project Description LiNC (Learning.
Using Workflow With Dataforms Tim Borntreger, Director of Client Services.
Challenge/Response Authentication
Ubiquitous Computing and Augmented Realities
Ubiquitous Computing Computers everywhere.
IGE105 – Communication Technology in a Changing World
Pervasive Computing Ubiquitous computing resources
IGE105 – Communication Technology in a Changing World
Communication Technology in a Changing World
Tiffany Ong, Rushali Patel, Colin Dolese, Joseph Lim
Ubiquitous Computing.
Presentation transcript:

Mobile and Pervasive Computing - 6 Past, Present and Future Researches of Ubiquitous Computing Presented by: Dr. Adeel Akram University of Engineering and Technology, Taxila, Pakistan

Computing with natural interfaces  Ubicomp inspires “off-the-desktop” applications  Needs “off-the-desktop” means of interaction  Speech, gestures, writing  More accessible  Easier to use??? 2

Computing with natural interfaces  Error prone interaction  Permit new and numerous mistakes  People do not have perfect recognition  As low as 54%; cursive handwriting 88%; printed handwriting 96.8%  Recognition accuracy == user satisfaction??  Not really: complexity of error recovery dialogues and value-added benefit of any given efforts  Entering a command vs. writing journal entries  Several research areas  Error reduction (about 5-10%)  Error detection  Reusable toolkit for error handling 3

Context aware computing  Current Systems  Generally using position and identification of objects  Still do not provide a complete context  Definition of context is limited  Research areas  Context toolkits  Toolkit for sensing environment  Explicit use of sensed information is up to program  What is context?  How is context represented? 4

What is context?  Who  Currently generally tailored to one user  How important are others in determining our behavior  How could this be captured?  What  Attempt to figure out what is currently happening  Sense environment, use calendar software etc.  Where  Location based information, e.g., GPS  Most explored context information  When  Easily obtained information -- Computer is good at remembering time  Although determining when one event stops and another begins is not easy  Why  Even harder than the “what” question, biometric sensors might help (e.g., body temperature, heart rate, etc) 5

Toward context aware computing  Context representation  Requires universal context schemes or toolkits with standard context representations  Context sensing and fusion  How to make context-aware computing “ubiquitous”?  In practice, there are few truly ubiquitous, single-source context services  E.g., GPS does not work indoors; different indoor localization schemes have different characteristics (e.g., cost, range)  Like sensor fusion, context fusion handles seamless handling of sensing responsibility between boundaries of different context services  Combining multiple context sources can increase the accuracy of context information 6

Automated capture and access  Recording information and data as it occurs  Computers are inherently good at recording, people are not  People freed up to summarize and understand  Most work in academic/ classroom settings  Time stamping lectures, digital whiteboards  Challenges in “capture and access”  Sometime we don’t know we want to capture something until after its already happened  How could the computer know that?  If it captures everything then we need a system of sorting and filtering (access)  Access is a problem because capturing of raw data can be burdensome for sifting through; systems need to recognize important events facilitate access 7

Everyday computing  Continuous interactions (i.e., no clear beginning or end)  Both fundamental activities like communication and long- term endeavors do not have predefined starts and ends; information from past can be recycled  Very different traditional HCI design which assumes “closure” with clear goals like spell checking, dialogue, etc.  Interruption is expected:  People are constantly interrupted  Computer systems must recognize interruption and change state  Also computers must appropriately inform users  Multiple activities operate concurrently:  People multitask and rapidly switch task based on external unpredictable environment  Systems need to adapt to this opportunistic behavior and change accordingly 8

Toward everyday computing  Develop continuously present interface  No current model of continuously present interfaces, even people are not continuously present  Create an interface that doesn’t get annoying (e.g., wearable devices)  Determine what information should require my attention and what should be display peripherally  Connect events in the physical and virtual worlds (e.g., face to face vs. , document, webs)  Modify/fuse existing HCI schemes to efficiently support everyday computing (but evaluation is challenging and laborious) 9

System evaluation challenges  Hard to evaluate Ubicomp Systems  Little publish on ubicomp evaluation  Systems often required to be fully connected leading to systems that are hard to build  Lack of development toolkits make system creation difficult  Systems often need to be integrated into peoples lives which using big clunky prototypes does not lead itself well too  Task/Goal centric approaches don’t work in ubicomp 10

Example Projects  Pervasive computing projects have emerged at major universities and in industry:  Project Aura (Carnegie Mellon University)  Oxygen (Massachusetts Institute of Technology)  Portalano (University of Washington)  Endeavour (University of California at Berkeley)  Place Lab (Intel Research Laboratory at Seattle)  For illustration let us look at Project Aura 11

Example Projects : Project Aura (1)  Aura (Carnegie Mellon University)  Distraction-free (Invisible) Ubiquitous Computing. 12

Example Projects : Project Aura (2)  Moore’s Law Reigns Supreme  Processor density  Processor speed  Memory capacity  Disk capacity  Memory cost ...  Glaring Exception  Human Attention Adam & Eve2000 AD Human Attention 13

Example Projects : Project Aura (3)  Aura Thesis:  The most precious resource in computing is human attention.  Aura Goals:  Reduce user distraction.  Trade-off plentiful resources of Moore’s law for human attention.  Achieve this scalably for mobile users in a failure-prone, variable-resource environment. 14

Example Projects : Project Aura (4) 15  The Airport Scenario  Jane wants to send from the airport before her flight leaves.  She has several large enclosures  She is using a wireless interface  She has many options.  Simply send the  Is there enough bandwidth?  Compress the data first  Will that help enough?  Pay extra to get reserved bandwidth  Are reservations available?  Send the “diff” relative to older file  Are the old versions around?  Walk to a gate with more bandwidth  Where is there enough bandwidth?  How do we choose automatically?

Example Projects : Project Aura (5) 16  The Mobile Task Scenario  Aura saves Scott’s task.  Scott enters office and gets strong authentication and secure access.  Aura restores Scott’s task on desktop machine and uses a large display.  Scott controls application by voice.  Bradley enters room.  Bradley gets weak authentication, Scott’s access changes to insecure.  Aura denies voice access to sensitive application.  Scott has multi-modal control of PowerPoint application.  Aura logs Scott out when he leaves the room.

Other Scenarios of Ubiquitous Computing  Buy drinks by Friday (1)  Take out the last can of soda  Swipe the can’s UPC label, which adds soda to your shopping list  Make a note that you need soda for the guests you are having over this weekend 17

Other Scenarios  Buy drinks by Friday (2)  Approach a local supermarket  AutoPC informs you that you are near a supermarket  Opportunistic reminder: “If it is convenient, stop by to buy drinks.” 18

Other Scenarios  Buy drinks by Friday (3) - Friday rolls around and you have not bought drinks - Deadline-based reminder sent to your pager 19

Other Scenarios  Screen Fridge  Provides:   Video messages  Web surfing  Food management  TV  Radio  Virtual keyboard  Digital cook book  Surveillance camera 20

Other Scenarios  The Active Badge  This harbinger of inch-scale computers contains a small microprocessor and an infrared transmitter.  The badge broadcasts the identity of its wearer and so can trigger automatic doors, automatic telephone forwarding and computer displays customized to each person reading them.  The active badge and other networked tiny computers are called tabs. 21

Other Scenarios  The Active Badge 22

Other Scenarios  Edible computers: The pill-cam  Miniature camera  Diagnostic device  It is swallowed  Try this with an ENIAC computer! 23

Other Scenarios  Artificial Retina  Direct interface with nervous system  Whole new computational paradigm (who’s the computer?) 24

Other Scenarios  Smart Dust  Nano computers that couple:  Sensors  Computing  Communication  Grids of motes (“nano computers”) 25

Questions???

Assignment#3  Write a detailed note on Project Aura highlighting each area of the project as described on the following page: 