1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel: 042-866-6127.

Slides:



Advertisements
Similar presentations
Context-Aware User Interfaces. Gent, 21 maart 2005 Context-Aware User Interfaces Context-Aware User Interfaces is a requirement for all defined scenarios.
Advertisements

Source “Pervasive Computing: Vision and Challenges” M. Satyanarayanan, Carnegie Mellon University IEEE Personal Communications, pp , August 2001.
Pervasive Computing: Vision and Challenges
Pervasive Computing 通訊所 鄭筱親. Outline  Introduction  Context Awareness  Recent Research  Future and Conclusion.
Microprocessor Dr. Rabie A. Ramadan Al-Azhar University Lecture 1.
Peter Kropf Ubiquitous Computing - Hiver 2006/20071 Peter Kropf Université de Neuchâtel Institut d’informatique
CS 6910 – Pervasive Computing Section 0.A: Introduction to Pervasive Computing Dr. Leszek Lilien Department of Computer Science Western Michigan University.
Context Awareness System and Service SCENE JS Lee 1 An Energy-Aware Framework for Dynamic Software Management in Mobile Computing Systems.
Ubiquitous Computing Definitions Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical.
CENG577 Advanced Services in Communications Pervasive Computing Ahmet Volkan Gürel Project Mentor: Assoc.Prof.Hal û k Gümüşkaya Department of Computer.
Mobile and Pervasive Computing - 7 Projects for Groups
MIT Project Oxygen. Vision  “…computation has centered about machines, not people”.  “In the future, computation will be human-centered. It will be.
Component-Based Software Engineering Oxygen Paul Krause.
A Context Framework for Ambient Intelligence. Context servers Motivation interoperable Machine processable Security & privacy.
Ubiquitous Computing The death of PC?. Ubiquitous Computing ubiquitous = Being or seeming to be everywhere at the same time; omnipresent. Mark Weiser,
Think. Learn. Succeed. Aura: An Architectural Framework for User Mobility in Ubiquitous Computing Environments Presented by: Ashirvad Naik April 20, 2010.
Ubiquitous Computing Computers everywhere. Agenda Old future videos
Patrik Werle Gregory D. Abowd The Future Computing Environments (FCE) Group, Georgia Institute of Technology Ubiquitous Computing: Research.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Smart Space & Oxygen CIS 640 Project By Usa Sammpun
Mobile and Pervasive Computing Overview Material taken from: “Fundamental Challenges in Mobile Computing” and “Pervasive Computing: Vision and Challenges”
What is adaptive web technology?  There is an increasingly large demand for software systems which are able to operate effectively in dynamic environments.
New Technologies Are Surfacing Everyday. l Some will have a dramatic affect on the business environment. l Others will totally change the way you live.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
Smart Home Technologies CSE 4392 / CSE 5392 Spring 2006 Manfred Huber
Challenges in Ubiquitous Computing and Networking Management Jong T. Park Kyungpook National University Korea APNOMS 2003 DEP, Fukuoka,
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
Ch 1. Mobile Adaptive Computing Myungchul Kim
MOBILE CLOUD COMPUTING
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
A Calendar Oriented Service for Smart Home Author : Yuan-Chih Yu, Shing-chem D. You, Dwen-Ren Tsai Sourse : Sixth International Networked Computing and.
Some Computer Science Issues in Ubiquitous Computing Presenter : Junghee-Han Mark Weiser Communications of the ACM, July 1993.
ISNE 101 Week 8 Dr. Ken Cosh. Next Assignment!  Choose a Movie (Futuristic)  First Come, First Served – different movies – get my approval first! 
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
A context-aware communication system Natalia Marmasse advisor: Chris Schmandt Speech Interface Group MIT Media Lab.
Pervasive software interoperability for the Operating Room of the Future May 10, 2005.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Recent Advancement In Pervasive Computing RACIT-2011 Shalu Gupta PRESENTED BY Shivani Sharma DEPARTMENT OF.
1© 2011 M. SatyanarayananNSF PeCS Workshop January 27, 2011 Achieving Ubiquity through Hardware Virtualization Mahadev Satyanarayanan School of Computer.
Mobile Middleware for Energy-Awareness Wei Li
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Trends in Embedded Computing The Ubiquitous Computing through Sensor Swarms.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Semantic Gadgets Pervasive Computing Meets the Semantic Web Reza Zakeri Sharif University of Technology.
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
Agents that Reduce Work and Information Overload and Beyond Intelligent Interfaces Presented by Maulik Oza Department of Information and Computer Science.
MUC course – Final examination Stephane Dupin, February 2 nd 2010.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Pervasive Computing Parts of the slides are extracted from those of Profs. Mark Weiser, Deborah Estrin, Akbar Sayeed, Jack Stankovic, Mani Srivastava,
Introduction to Pervasive Computing
Ubiquitous Computing Computers everywhere. Wednesday: presentations Ideal Concepts T.H.E. Team Infused Industries CommuniCORP Part 3 DUE!
Ambient Intelligence: Everyday Living Aid System for Elders
LECTURER: NGUY Ễ N ANH TU Ấ N (TUAN NGUYEN) TUTORS: TÔN TH Ị KIM LOAN TR Ầ N H Ồ NG NGHI {TUANNA, LOANTTK, Developing Applications.
WOSS 04 1 Task-based Self-adaptation David Garlan Bradley Schmerl Joao Sousa Vahe Poladian Carnegie Mellon University WOSS’04.
Gaia Ubiquitous Computing Directions Roy Campbell University of Illinois at Urbana-Champaign.
Mobile Networks & Computing Mobile computing : Some Definitions 1 NYANZI A CCNP,CCNAI,CCNA, A+, MIT-SANA, MBA_IT.
Networking Applications
Pemrosesan Data Tersebar
Ambient Intelligence -by Internal Guide: M.Preethi(10C91A0563)
Ambient Intelligence.
Adaptive and Collaborative eLearning Architectures
Project Oxygen… Shashwat Shriparv
NWC604COM Ubiquitous Computing
Pervasive Computing Happening?
Abhishek Bhola Bharati Vidyapeeth University, College of Engineering
Central Topic: EMBEDDED SYSTEM
TDT49 Mobile Information Systems, Jørgen Birkeland
Presentation transcript:

1 Pervasive Computing: Vision and Challenges Myungchul Kim Tel:

2 IEEE Personal Comm., August –The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it. –Mark Weiser’s 1991 paper: ubiquitous computing or pervasive computing: create environments saturated with computing and communication capability and gracefully integrated with human users. –HW: handheld and wearable computers, wireless LANs and devices to sense and control appliances –SW: Aura (CMU), Endeavor (UC Berkeley), Oxygen (MIT), Portalano (U of W) Related Fields –Distributed systems -> mobile computing -> pervasive computing

3 –Distributed systems PC and LAN From the mid-1970s through the early 1990s –Mobile computing Laptop and wireless LAN Unpredictable variation in network quality, lowered trust and robustness of mobile elements, limitations on local resources imposed by weight and size constraints, and concern for battery power consumption –Pervasive computing Effective use of smart spaces –Embedding computing infra in building infra -> smart space –The fusion of these worlds enables sensing and control of one world by the other –Ex: automatic adjustment of heating, cooling, and lighting levels in a room based on an occupant’s electronic profile Invisibility –Minimal user distraction

4 Localized scalability –Intensive interactions between a user’s personal computing space and his/her surroundings -> severe bandwidth, energy, and distraction implications for a wireless mobile users –Achieve scalability by severely reducing interactions between distant entities “death of distance” Masking uneven conditioning –Huge differences in the “smartness” of different environments –Ex: a system that is capable of disconnected operation is able to mask the absence of wireless coverage in its environment –Reduced invisibility

5

6 Example scenarios – Aura observes that at the current bandwidth Jane won’t be able to finish sending her documents before her flight departs. Consulting the airport’s network weather service and flight schedules service, Aura discovers that wireless bandwidth is excellent at nearby gates for half and hour. A dialog box pops up on Jane’s screen suggesting that she go to Gate 15, which is only three minutes away. It also asks her to prioritize her e- mail, so that the most critical messages are transmitted first. Jane accepts Aura’s advice and walks to Gate 15. She watches CNN on the TV there until Aura informs her that it is close to being done with her messages, and that she can start walking back. The last message is transmitted during her walk, and she is back at Gate 23 in time for her boarding call.

7

8 –Missing capabilities Scenario 1 –Proactivity –Combining knowledge from different layers of the system –Smart space Scenario 2 –The ability to move execution state effortlessly across diverse platforms –Self-tuning: e.g. editing on the handheld using speech input rather than keyboard and mouse –Proactivity –Smart spaces: location tracking and online calendar services The hardware and software technologies are all here today Seamless integration of component technologies into a system: architecture, component synthesis, and system- level engineering

9 Drilling down

10 –User intent User intent -> proactivity

11 –Cyber foraging Dynamically augment the computing resources of a wireless mobile computer by exploiting wired hardware infra Surrogate of mobile computers

12

13 –Adaptation strategy Significant mismatch between the supply and demand of a resource Strategies –A client can guide application, e.g., reducing the fidelity of an application –A client can ask the environment to guarantee a certain level of a resource –A client can suggest a corrective action to the user

14

15 –High-level energy management Energy-aware memory management Energy-aware adaptation of applications –Client thickness Thick vs thin The min acceptable thickness of a client is determined by the worst-case environmental conditions under which the application must run satisfactorily. Speech recognition in Odyssey –Context awareness Physical location, physiological state, emotional state, personal history, daily behavioral patterns, schedules, personal calendars, address books, contact lists, to-do lists, … –Balancing proactivity and transparency E.g., caching

16 –Privacy and trust Location tracking, smart spaces, user of surrogate monitor user actions, user’s movement, behavior patterns, habits, … –Impact on Layering Conclusion –Human-computer interaction –Software agents –Expert systems and artificial intelligence