A Survey of Context-Aware Mobile Computing Research Guanling Chen and David Kotz Dartmouth Computer Science Technical Report, 2000.

Slides:



Advertisements
Similar presentations
The Cricket Compass for Context-Aware Mobile Applications Nissanka B. Priyantha.
Advertisements

Martin Wagner and Gudrun Klinker Augmented Reality Group Institut für Informatik Technische Universität München December 19, 2003.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
XProtect® Expert 2013 Product presentation
Sensor Networking Research Team Context Aware Technology Jae Doo Huh
Chapter 19: Network Management Business Data Communications, 4e.
Data - Information - Knowledge
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Brent Dingle Marco A. Morales Texas A&M University, Spring 2002
1 Location Information Management and Moving Object Databases “Moving Object Databases: Issues and Solutions” Ouri, Bo, Sam and Liqin.
Location Systems for Ubiquitous Computing Jeffrey Hightower and Gaetano Borriello.
CSE5610 Intelligent Software Systems Semester 1 Enabling Intelligent Systems in Pervasive Computing.
ISIS Katrinebjerg i n t e r a c t i v e s p a c e s. n e t 1 Frank Allan Hansen, Representing Context in Hypermedia Data Models International.
THE SECOND LIFE OF A SENSOR: INTEGRATING REAL-WORLD EXPERIENCE IN VIRTUAL WORLDS USING MOBILE PHONES Sherrin George & Reena Rajan.
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
The chapter will address the following questions:
A Survey on Context-aware System Authors: Matthias Baldauf, Schahram Dustdar, and Florian Rosenberg Haifeng Xu Nov. 19, 2013.
There is more to Context than Location Albrecht Schmidt, Michael Beigl, and Hans-W. Gellersen Telecooperation Office (TecO), University of Karlsruhe, Elsevier,
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
The Gaia System Spring 2004: Gaia Larry Rudolph Not Invented Here Lots of Pervasive Computing Projects Carnegie Mellon Univ. U. Washington Georgia.
6-1 DATABASE FUNDAMENTALS Information is everywhere in an organization Information is stored in databases –Database – maintains information about various.
CS 580 chapter 4 paradigms.
Security Tracking and Advising for Taxi Customers Group Member Tanapol Euaungkanakul Chayanin Mukviboonchai Thanachit Viriyayanyongsuk.
Campus Tour COMP 523 Final Presentation Justin, Paul, Florian.
An Overview of MPEG-21 Cory McKay. Introduction Built on top of MPEG-4 and MPEG-7 standards Much more than just an audiovisual standard Meant to be a.
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
Context-Aware Applications. Introduction r Context-aware is ware applications can discover and take advantage of contextual information such as m User.
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
Distributed Systems: Concepts and Design Chapter 1 Pages
Campus Tour COMP 523 Midterm Presentation Justin, Paul, Florian.
CPET 565 Mobile Computing Systems Context-Aware Computing (2) Lecture 11 Hongli Luo Indiana University-Purdue University Fort Wayne.
A Pervasive Architectural Framework for Providing Remote Medical Treatment Author:D. Vassis, P. Belsis, C.Skourlas,G.Pantziou 1.
1.file. 2.database. 3.entity. 4.record. 5.attribute. When working with a database, a group of related fields comprises a(n)…
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Personalization for Location-Based E-Learning Rui Zhou and Klaus Rechert Communication Systems, Dept. of Computer Science The University of Freiburg, Germany.
CPET 565 Mobile Computing Systems Context-Aware Computing Lecture 10 Hongli Luo Indiana University-Purdue University Fort Wayne.
Lesson Overview 3.1 Components of the DBMS 3.1 Components of the DBMS 3.2 Components of The Database Application 3.2 Components of The Database Application.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Principles of Context aware systems Presented by: Rajesh Gangam Usable Security.
The Second Life of a Sensor: Integrating Real-World Experience in Virtual Worlds using Mobile Phones Mirco Musolesi, Emiliano Miluzzo, Nicholas D. Lane,
Human Tracking System Using DFP in Wireless Environment 3 rd - Review Batch-09 Project Guide Project Members Mrs.G.Sharmila V.Karunya ( ) AP/CSE.
An Architecture to Support Context-Aware Applications
Rover Technology Enabling Scalable Location Aware Computing ( Wireless ) Myoung – Seo Kim Super Computing Lab
The Gator Tech Smart House: A Programmable Pervasive Space Real/Research Application In Pervasive Computing Lee Hae Dong, ICU CSE.
Architecture for Context-Aware Services in Gaia Anand Ranganathan.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Feb 12, ECET 581/CPET/ECET 499 Mobile Computing Technologies & Apps Context Aware Computing 3 of 3 Lecture 12 Paul I-Hai Lin, Professor Electrical.
Chapter 2 Database Environment.
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
Gaia An Infrastructure for Active Spaces Prof. Klara Nahrstedt Prof. David Kriegman Prof. Dennis Mickunas
A Study of Context-Awareness: The Context Fusion Network, The Context Fabric Presented by Sangkeun Lee IDS Lab., Seoul National University Solar:
C ONTEXT AWARE SMART PHONE YOGITHA N. & PREETHI G.D. 6 th SEM, B.E.(C.S.E) SIDDAGANGA INSTITUTE OF TECHNOLOGY TUMKUR
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
The Context Fabric: An Infrastructure for Context-Aware Computing Jason I. Hong Group for User Interface Research, Computer Science Division University.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Dept. of Computer & Information Science, Korea University Part I Surveys of Context-aware Systems 임영희 DB & Mining Lab.
Context-Aware Middleware for Resource Management in the Wireless Internet US Lab 신현정.
 Background  Introduction  Purpose  Basic rover services  Physical architecture of Rover System  Server operation  Logical Architecture of A Rover.
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
WHY VIDEO SURVELLIANCE
Context-Aware Computing
Location Information Services
An Overview of MPEG-21 Cory McKay.
Chapter 2 Database Environment.
How to Build Smart Appliances?
WHY VIDEO SURVELLIANCE
Presentation transcript:

A Survey of Context-Aware Mobile Computing Research Guanling Chen and David Kotz Dartmouth Computer Science Technical Report, 2000

Outline  Introduction  Definition of Context  Context-Aware Computing  Context-Aware Application  Sensing Context  Modeling Context Information  System Infrastructure  Security and Privacy  Summary 2/22

Introduction  Users can move around with devices at hand and access information anytime, anywhere –Portable computers and wireless communications –Computers are shrinking and the bandwidth of wireless keep increasing  Context-aware computing is a mobile computing paradigm  Applications can discover and take advantage of contextual information 3/22

Definition of Context (1/2)  General Definition (Merriam-Webster’s Collegiate Dictionary) –The interrelated conditions in which something exists or occurs  Three categories defined by Schilit –Computing context  Network connectivity, communication cost, communication bandwidth, nearby resource –User context  User profile, location, social situation –Physical context  Lighting, noise, traffic condition, temperature –Time context  Time of a day, week, month and season of the year 4/22

Definition of Context (2/2)  Schmidt et al –Knowledge about the user’s and IT device’s state, including surroundings, situation, and to a less extent, location  Dey –Any information that can be used to characterize the situation of an entity. An entity is a person, place, or object that is considered relevant to the interaction between a user and an application, including the user and applications themselves  Context in mobile computing has two different aspects –Context is the set of environmental states and setting that either determines an application’s behavior or in which an application event occurs and is interesting to the user 5/22

Context-aware Computing (1/2)  Four categories defined by Schilit –Proximate selection  A user-interface technique where the objects located nearby are emphasized or otherwise made easier to choose –Automatic contextual reconfiguration  A process of adding new components, removing existing components, or altering the connections between components due to context changes –Contextual information and commands  Which can produce different results according to the context in which they are issued –Context-triggered actions  Simple IF-THEN rules used to specify how context-aware systems should adapt 6/22

Context-aware Computing (2/2)  How a mobile application can take advantage of context –Active context awareness  An application automatically adapts to discovered context, by changing the application’s behavior –Passive context awareness  An application presents the new or updated context to an interested user  An application makes the context persistent for the user to retrieve later 7/22

Context-aware Application (1/4)  Examples of Context-aware Application –Call Forwarding –Teleporting –Active Map –Mobisaic Web Browser –Shopping Assistant –Cyberguide –Conference Assistant –Fieldwork –Office Assistant –…… 8/22

Context-aware Application (2/4)  Call forwarding –Passive context  None –Active context  User’s location –Description  Based on active badge system, the location context is presented to the receptionist  The location context becomes active to help automatically forward the phone calls to the destination user’s nearest phone  People want to express more control over depending on their current context 9/22

Context-aware Application (3/4)  Shopping Assistant –Passive context  None –Active context  Customer’s location within the store –Description  The device can guide the shoppers through the store (provide details of items, help locate items, point out items on sale, do a comparative price analysis …)  There is a privacy concern since the store maintains the customer profiles  Customers are divided into two classes (regular customers, store customers) 10/22

Context-aware Application (4/4)  Conference Assistant –Passive context  Current activity(presentation) –Active context  Attendee’s location, current time, schedule of presentation –Description  The assistant examines a variety of context information to help conference attendees  When the user enters a presentation room, the conference assistant automatically displays related information (the name of presenter, the title of the presentation …)  Audio and video equipment automatically record the contents of the conference 11/22

Sensing the context (1/5)  To be able to use context in application, we need a mechanism –To sense the current context –To deliver it to the application  Sensing the Location  Sensing Low-level Contexts Beyond Location  Sensing High-level Contexts  Sensing Contexts Changes 12/22

Sensing the context (2/5) Sensing the Location  Outdoors –GPS (Global Positioning System)  Indoors –GPS doesn’t work indoor  Signal strength is too low to penetrate most building –Developed a new tracking systems  Ultrasonic signal, Radio signals, Footstep force profile of a person, Camera  Issues –No uniform way to track locations with fine granularity that works both indoors and outdoors –Sensed data may have uncertainty due to environmental noise or sensor error –Context sensed from different sensors may conflict to each other 13/22

 Other contexts and possible approaches to sense them –Time  Obtain easily from the build-in clock of the computer –Nearby objects  Querying the location database –Network bandwidth  Using API provided by a system module –Other low-level contexts  Light level (using photodiode), Tilt and vibration (using two accelerometers), Sound ( using microphone), temperature, pressure, CO gas  Concern –Adding sensors to the mobile device will in turn reduce user’s mobility and may require user’s cooperation Sensing the context (3/5) Sensing Low-level Contexts Beyond Location 14/22

 We are also interested in high-level context information –Such as user’s current activity  Some approaches to sense complex social contexts –Machine vision  Based on camera technology and image processing –Consult the user’s calendar  To find out what the user is supposed to do at certain time –AI techniques  To recognize complex context by combining several simple low-level sensors  It is extremely hard to recognize user’s emotional context Sensing the context (4/5) Sensing High-level Contexts Beyond Location 15/22

 The context source monitor polls the current context and sends the changes to some context service –The context service is responsible to deliver the context changes to the clients who have subscribed to the related context changes  Different context has different properties –Example  Location of a person and location of a printer –Polling rates are chosen based on people’s experience and assumptions Sensing the context (5/5) Sensing Contexts Changes 16/22

Modeling Context Information (1/2)  Most research of modeling context focuses on location information  Purpose of Location Modeling –To handle object mobility –To facilitate location-related queries  Location Model –Symbolic model  Representing location as abstract symbols –Geometric model  Representing location as coordinates 17/22

Modeling Context Information (2/2)  Data structures –Key-value pairs  Key : Environmental variable, Value : actual context data –Tagged encoding  Based on SGML(Standard Generic Markup Language)  When contextual constrains in tag are met, will be triggered –Object-oriented model  Contextual information is embedded as the states of the object  Object provides methods to access and modify the states –Logic-based model  Expresses the existing contextual information in a domain-centralized database using an entity-relationship data model 18/22

System Infrastructure (1/2)  It is necessary to decouple the application and the actual context sensing part –Large development overhead –To generalize the system to other applications  A middleware layer –To separate the low-level sensor from high-level application –Collect raw sensor information –Translate raw information to an application-understandable format –Disseminate it to interested applications 19/22

System Infrastructure (2/2)  Centralized Architecture –Use a centralized context server for each user  Use RPC to communicate –Usually have scalability problem  Distributed Architecture –Allows context be held at several places to avoid potential bottleneck –No central server is needed –Members can still maintain privacy –Increasing of computation and communication 20/22

Security and Privacy  There are two key problems in context-aware system security –Ensuring the accuracy of location information and identities –Establishing secret communications  Perfect privacy guarantees are in general hard and expensive  User should be able to have the control over their contextual information and over who may gain access to it –The system architecture needs to provide trade-offs between privacy guarantees and both functionality and efficiency –It is difficult to be specific about all context information 21/22

Summary  Surveyed the literature in this area  Research of accurately discovering context, efficiently disseminating contextual information, and making use of the available context, are still at the early stages  Context awareness is a key factor for new applications in the area of ubiquitous computing 22/22