Download presentation
Presentation is loading. Please wait.
Published byHarry Ball Modified over 9 years ago
1
UBICOMP SYSTEMS: TOPICS & CHALLENGES
2
New computing model Heterogeneous devices Interaction: Many-to-many Possibly implicit, invisible, through natural interactions Networking: Wireless Ad-hoc
3
Example: ABC Bardram, J.E., and Christensen, H.B., 2007, Pervasive computing support for hospitals: An overview of the activity-based computing project. IEEE Pervasive Computing 6(1): 44-51Pervasive computing support for hospitals: An overview of the activity-based computing project
4
Ubicomp systems research Some core challenges: Resource impoverished devices (resource-aware computing) Execution environments: Volatile Heterogeneous Fluctuating Invisible computing Security and privacy
5
Resource impoverished devices Energy: Consumption Foraging
6
Reducing consumption Example: FSI current wave meter: FSI Sleep/wake f[Hz] ↓
7
Power for wireless comm Example: in-network processing
8
Foraging Power Cyber
9
Volatile execution environments Volatility: Devices come and go Communication structure changes Service discovery
10
Heterogeneous execution environments Ubicomp application: may span several devices Patchwork of technologies: Bell, G., Dourish, P., 2006, Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision. Personal Ubiquitous ComputingYesterday’s tomorrows: notes on ubiquitous computing’s dominant vision Better in the future? Is messiness the norm? Heterogeneous hardware – fundamental!
11
Fluctuating execution environments PC: static Ubicomp devices: Multiple devices Mobile Distributed applications
12
Fluctuating execution environments Research focus areas: Context-aware computing: User, others present, temperature, light, etc… UCF Chapter 8 Location (location-based computing) A type of context! UCF Chapter 7 LoCA: http://loca2009.context-aware.org/http://loca2009.context-aware.org/ Integration ABC Project54
13
Integration Example: Project54Project54 Kun, A.L., Miller, W.T., Lenharth, W. H., 2004, Computers in Police Cruisers. IEEE Pervasive Computing 3(4): 34-41 Computers in Police Cruisers
14
Invisible computing Computers for Weiser’s Sal: Physically invisible – hidden Mentally invisible – not centers of attention How to handle errors, notifications, upgrades? Some ideas in Friday A. et al., 2005, Guidelines and open issues in systems support for Ubicomp: reflections on UbiSys 2003 and 2004. Personal Ubiquitous ComputingGuidelines and open issues in systems support for Ubicomp: reflections on UbiSys 2003 and 2004
15
Security and privacy Security = confidentiality, integrity, authenticity of information Privacy = ability to reveal oneself selectively UCF Chapter 3
16
Security and privacy - issues Trust Assumptions from conventional protocols Security based on location and context Privacy challenges E.g. sensors Security challenges
17
Sensors, privacy: Minority Report
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.