Download presentation
Presentation is loading. Please wait.
Published byCecelia Crafford Modified over 10 years ago
1
Nymity (and other made up words) Dan Cutting July 2003
2
Overview Background reading Nymity (identity management) Conceptual locations Adhocracy Augmented Reality (AR) Schedule and research directions.
3
Background reading Intelligent Environment (IE) Stick-e’s (University of Kent at Canterbury) Stick-e’s (University of Kent at Canterbury) GLOSS/HearSay (University of St Andrews) GLOSS/HearSay (University of St Andrews) Taxonomy of location systems (University of Washington) Taxonomy of location systems (University of Washington) Identity management Roger Clarke’s work on nymity Roger Clarke’s work on nymity Augmented Reality (AR) MagicBook / ARToolkit (HIT labs). MagicBook / ARToolkit (HIT labs).
4
Nymity BACKGROUND IEs need information from people using them, e.g. Cinema needs age for R-rated films. IDEA Only show what’s required, e.g. Cinema doesn’t need name Person controls level of anonymity: simple, unobtrusive. MOTIVATION Privacy (‘Big Brother’).
5
Nymity APPROACH Nyms - sets of information related to an entity Entities can have multiple nyms Anonymity verinymity.
6
Nymity RESEARCH Reduce probability of entity discovery Constraints processing by classification of nym fields Constraints processing by classification of nym fields Identity fusion. Identity fusion. Identity fusion Constraints
7
Conceptual locations BACKGROUND Location holds much context Where you are, who you’re with what you’re doing. IDEA ‘Location’ as point in abstract space E.g. ‘location’ on web Need model and distance metric Also map between physical and conceptual locations.
8
Conceptual locations MOTIVATION Can link people who are ‘close’ More context for IE. APPLICATION User downloading a Monet painting is ‘close’ to person viewing the real painting in a gallery Web user could ask gallery visitor to take close ups of certain parts.
9
Conceptual locations APPROACH Where do we get models and metrics? Different domains, different needs Graph theory, social sciences. SAMPLE MODEL / METRIC Hierarchical ontology of Yahoo! Monet Picasso = 6.
10
Adhocracy BACKGROUND Three classes of IE: 1. Client-Server 2. Peer-Peer 3. Hybrid - some centralised infrastructure but communication is peer-peer.IDEA Data associated with physical locations without fixed storage infrastructure Use mobile, ad hoc nodes for storage.
11
Adhocracy MOTIVATION Decentralised, hard to control / censor Tag places with ‘virtual graffiti’ E.g. Tag shops with poor service E.g. Tag shops with poor service Freedom of speech!
12
Adhocracy This fountain is boring! - Jamie
13
Adhocracy APPROACH Common PDAs / phones Wireless data sharing (Bluetooth, WiFi) Transient storage in devices when passing through physical location Replicate, encrypt and distribute graffiti Location sensed in many ways - sensor fusion.
14
Adhocracy CONSTRAINTS Requires critical mass of users, graffiti vanishes at night! Susceptible to jamming. APPLICATIONS Wiki-style content management, Slashdot-style moderation, access reinforcement Abstract objects (‘The Matrix’ movie) multiple physical cinemas.
15
AR phone BACKGROUND Virtual objects in real world Fiducial markers position virtual objects Inaccessible (viewed through expensive glasses) Clumsy (viewed with computer and web cam).
17
Practical use of AR
18
AR phone IDEA Use common mobile device as a view port. MOTIVATION Increase accessibility Reduce clumsiness.
19
AR phone APPROACH Smart-phones (e.g. Ericsson P800) Camera Camera Large screen Large screen Bluetooth Bluetooth Too slow for video processing. Too slow for video processing. Offload AR to server with Bluetooth.
20
AR phone BluetoothCamera Display Find fiducial marker Augment image
21
AR phone APPLICATION Allan Richards’ usability study - real time gaze analysis (http://eyeresponse.com).
22
Schedule Submitted nymity paper for UbiComp Doctoral Colloquium Adhocracy UbiComp workshop paper with Aaron and David Symonds Visiting HIT labs in August with AR phone Short paper on AR phone for OZCHI 2003 Nymity paper with Aaron and John Zic for IEEE Internet Computing Exploring broad areas, focusing on overlaps.
23
Questions? Dan Cutting dcutting@it.usyd.edu.au G61B Laboratory
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.