scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Pervasive Computing in 2002"


Journal ArticleDOI
TL;DR: Gaia exports services to query, access, and use existing resources and context, and provides a framework to develop user-centric, resource-aware, multidevice, context-sensitive, and mobile applications.
Abstract: The paper discusses the Gaia metaoperating system which extends the reach of traditional operating systems to manage ubiquitous computing habitats and living spaces as integrated programmable environments. Gaia exports services to query, access, and use existing resources and context, and provides a framework to develop user-centric, resource-aware, multidevice, context-sensitive, and mobile applications.

1,178 citations


Journal ArticleDOI
TL;DR: This article addresses the challenges and opportunities of instrumenting the physical world with pervasive networks of sensor-rich, embedded computation with a taxonomy of emerging systems and outlines the enabling technological developments.
Abstract: This article addresses the challenges and opportunities of instrumenting the physical world with pervasive networks of sensor-rich, embedded computation. The authors present a taxonomy of emerging systems and outline the enabling technological developments.

907 citations


Journal ArticleDOI
TL;DR: Aura aims to minimize distractions on a user's attention, creating an environment that adapts to the user's context and needs, specifically intended for pervasive computing environments involving wireless communication, wearable or handheld computers, and smart spaces.
Abstract: The most precious resource in a computer system is no longer its processor, memory, disk, or network, but rather human attention. Aura aims to minimize distractions on a user's attention, creating an environment that adapts to the user's context and needs. Aura is specifically intended for pervasive computing environments involving wireless communication, wearable or handheld computers, and smart spaces. Human attention is an especially scarce resource in such environments, because the user is often preoccupied with walking, driving, or other real-world interactions. In addition, mobile computing poses difficult challenges such as intermittent and variable-bandwidth connectivity, concern for battery life, and the client resource constraints that weight and size considerations impose. To accomplish its ambitious goals, research in Aura spans every system level: from the hardware, through the operating system, to applications and end users. Underlying this diversity of concerns, Aura applies two broad concepts. First, it uses proactivity, which is a system layer's ability to anticipate requests from a higher layer. In today's systems, each layer merely reacts to the layer above it. Second, Aura is self-tuning: layers adapt by observing the demands made on them and adjusting their performance and resource usage characteristics accordingly. Currently, system-layer behavior is relatively static. Both of these techniques will help lower demand for human attention.

899 citations


Journal ArticleDOI
TL;DR: The Interactive Workspaces project explores new possibilities for people working together in technology-rich spaces with large displays, wireless or multimodal devices, and seamless mobile appliance integration.
Abstract: The Interactive Workspaces project explores new possibilities for people working together in technology-rich spaces. The project focuses on augmenting a dedicated meeting space with large displays, wireless or multimodal devices, and seamless mobile appliance integration.

855 citations


Journal ArticleDOI
TL;DR: Using measured acceleration and angular velocity data gathered through inexpensive, wearable sensors, this dead-reckoning method can determine a user's location, detect transitions between preselected locations, and recognize and classify sitting, standing, and walking behaviors.
Abstract: Using measured acceleration and angular velocity data gathered through inexpensive, wearable sensors, this dead-reckoning method can determine a user's location, detect transitions between preselected locations, and recognize and classify sitting, standing, and walking behaviors. Experiments demonstrate the proposed method's effectiveness.

581 citations


Journal ArticleDOI
TL;DR: An interdisciplinary team is developing technologies and design strategies that use context-aware sensing to empower people by presenting information at precisely the right time and place.
Abstract: An interdisciplinary team is developing technologies and design strategies that use context-aware sensing to empower people by presenting information at precisely the right time and place. The team is designing a living laboratory to study technology that motivates behavior change in context.

421 citations


Journal ArticleDOI
TL;DR: Reconfigurable Context-Sensitive Middleware facilitates the development and runtime operations of context-sensitive pervasive computing software.
Abstract: Context-sensitive applications need data from sensors, devices, and user actions, and might need ad hoc communication support to dynamically discover new devices and engage in spontaneous information exchange. Reconfigurable Context-Sensitive Middleware facilitates the development and runtime operations of context-sensitive pervasive computing software.

416 citations


Journal ArticleDOI
TL;DR: The authors focus on physical interaction, general application features and theories of design and evaluation for this new mode of human-computer interaction.
Abstract: To address M. Weiser's (ibid., p. 19-25) human-centered vision of ubiquitous computing, the authors focus on physical interaction, general application features and theories of design and evaluation for this new mode of human-computer interaction.

371 citations


Journal ArticleDOI
TL;DR: In this article, the authors identify two key characteristics of ubiquitous computing systems: physical integration and spontaneous interoperation, and examine how these properties affect the design of ubiquitous Computing software and discuss future directions.
Abstract: The authors identify two key characteristics of ubiquitous computing systems: physical integration and spontaneous interoperation. They examine how these properties affect the design of ubiquitous computing software and discuss future directions.

353 citations


Journal ArticleDOI
TL;DR: Specialized elements of hardware and software, connected by wires, radio waves and infrared, will soon be so ubiquitous that no-one will notice their presence.
Abstract: Specialized elements of hardware and software, connected by wires, radio waves and infrared, will soon be so ubiquitous that no-one will notice their presence.

306 citations


Journal ArticleDOI
TL;DR: The Elite Care Information Technology Group has deployed a system with many elements of pervasive computing, including portable and wearable devices and wireless networking, to create intelligent and responsive work and living spaces for the elderly in a residential setting.
Abstract: The Elite Care Information Technology Group has deployed a system with many elements of pervasive computing, including portable and wearable devices and wireless networking, to create intelligent and responsive work and living spaces for the elderly in a residential setting. Elite Care based the setting's layout on an apartment complex rather than a hospital with its hallways and rooms. By using a social care model that has the staff making house calls rather than doctors making rounds, the residents continue to live as normally as they can. In this scheme, pervasive sensors and staff assist residents in maintaining their independence, offering assistance as necessary and using the pervasive sensors to monitor vital signs and health indicators. Elite Care has harnessed the technology in direct and important ways to construct a more humane and human world for its residents and staff.

Journal ArticleDOI
TL;DR: This quality-of-service-aware decision engine automatically negotiates for the appropriate adaptation decision for synthesizing an optimal content version for mobile devices.
Abstract: Building a good content adaptation service for mobile devices poses many challenges. To meet these challenges, this quality-of-service-aware decision engine automatically negotiates for the appropriate adaptation decision for synthesizing an optimal content version.

Journal ArticleDOI
TL;DR: The Exploratorium in San Francisco offers a unique and challenging environment for testing ubiquitous systems and an important design consideration is how users switch between virtual and physical interactions.
Abstract: Museums are excellent locations for testing ubiquitous systems; the Exploratorium in San Francisco offers a unique and challenging environment for just such a system. An important design consideration is how users switch between virtual and physical interactions.

Journal ArticleDOI
TL;DR: The authors describe the technical and social changes of the 1990s that directly affected ubiquitous computing then and articulate current technical and sociological challenges to inspire researchers in the field.
Abstract: The authors discuss the problems in creating the next generation of widely deployed ubiquitous computing systems and articulate current technical and sociological challenges to inspire researchers in the field. They discuss significant research challenges that have yet to be addressed. Central to documenting these challenges is recognizing the context within which we are operating, so they first describe the technical and social changes of the 1990s that directly affected ubiquitous computing then.

Journal ArticleDOI
TL;DR: Location-dependent information services have great promise for mobile and pervasive computing environments as discussed by the authors and can provide local and nonlocal news, weather, and traffic reports as well as directory services.
Abstract: Location-dependent information services have great promise for mobile and pervasive computing environments. They can provide local and nonlocal news, weather, and traffic reports as well as directory services. Before they can be implemented on a large scale, however, several research issues must be addressed.

Journal ArticleDOI
TL;DR: By informing users about the other person's context and tagging potentially ambiguous chat messages, ConChat explores how context can improve electronic communication by reducing semantic conflicts.
Abstract: ConChat is a context-aware chat program that enriches electronic communication by providing contextual information and resolving potential semantic conflicts between users.ConChat uses contextual information to improve electronic communication. Using contextual cues, users can infer during a conversation what the other person is doing and what is happening in his or her immediate surroundings. For example, if a user learns that the other person is talking with somebody else or is involved in some urgent activity, he or she knows to expect a slower response. Conversely, if the user learns that the other person is sitting in a meeting directly related to the conversation, he or she then knows to respond more quickly. Also, by informing users about the other person's context and tagging potentially ambiguous chat messages, ConChat explores how context can improve electronic communication by reducing semantic conflicts.


Journal ArticleDOI
TL;DR: A theoretical model for privacy control in context-aware systems based on a core abstraction of information spaces based on Ravi Sandhu's four-layer OM-AM (objectives, models, architectures, and mechanisms) idea is described.
Abstract: Significant complexity issues challenge designers of context-aware systems with privacy control. Information spaces provide a way to organize information, resources, and services around important privacy-relevant contextual factors. In this article, we describe a theoretical model for privacy control in context-aware systems based on a core abstraction of information spaces. We have previously focused on deriving socially based privacy objectives in pervasive computing environments. Building on Ravi Sandhu's four-layer OM-AM (objectives, models, architectures, and mechanisms) idea, we aim to use information spaces to construct a model for privacy control that supports our socially based privacy objectives. We also discuss how we can introduce decentralization, a desirable property for many pervasive computing systems, into our information space model, using unified privacy tagging.

Journal ArticleDOI
Sumi Helal1
TL;DR: Why service discovery as the topic of the hour goes beyond the need for plug-and-play solutions or support for the SOHO (small office/home office) user.
Abstract: For the past five years, competing industries and standards developers have been hotly pursuing automatic configuration, now coined the broader term service discovery. Jini, Universal Plug and Play (UPnP), Salutation, and Service Location Protocol are among the front-runners in this new race. However, choosing service discovery as the topic of the hour goes beyond the need for plug-and-play solutions or support for the SOHO (small office/home office) user. Service discovery's potential in mobile and pervasive computing environments motivated my choice.

Journal ArticleDOI
TL;DR: The Kimura system augments and integrates independent tools into a pervasive computing system that monitors a user's interactions with the computer, an electronic whiteboard, and a variety of networked peripheral devices and data sources.
Abstract: The Kimura system augments and integrates independent tools into a pervasive computing system that monitors a user's interactions with the computer, an electronic whiteboard, and a variety of networked peripheral devices and data sources.

Journal ArticleDOI
TL;DR: Although handheld guides have been proposed as a way to enhance visitors' experience of museums and exhibitions, the authors describe user studies that actually test the theory in a real-world setting.
Abstract: Although handheld guides have been proposed as a way to enhance visitors' experience of museums and exhibitions, the authors describe user studies that actually test the theory in a real-world setting.

Journal ArticleDOI
TL;DR: In M. Weiser's vision of ubiquitous computing, computers will disappear from conscious thought, and from a hardware perspective, the authors examine how far the authors've succeeded in implementing this vision and how far it has to go.
Abstract: In M. Weiser's (ibid., pp. 19-25) vision of ubiquitous computing, computers will disappear from conscious thought. From a hardware perspective, the authors examine how far we've succeeded in implementing this vision and how far we have to go.

Journal ArticleDOI
TL;DR: Advances in mobile telecommunications and device miniaturization call for providing both standard and novel location- and context-dependent Internet services to mobile clients.
Abstract: Advances in mobile telecommunications and device miniaturization call for providing both standard and novel location- and context-dependent Internet services to mobile clients. Mobile agents are dynamic, asynchronous, and autonomous, making the MA programming paradigm suitable for developing novel middleware for mobility-enabled services.

Journal ArticleDOI
TL;DR: In 1989, the US Army envisioned a small wearable computer to assist soldiers with battlefield tasks that has since grown from preliminary prototypes and a demonstration Soldier's Computer into the current Land Warrior program and proposals for future systems.
Abstract: In 1989, the US Army envisioned a small wearable computer to assist soldiers with battlefield tasks. The concept has since grown from preliminary prototypes and a demonstration Soldier's Computer into the current Land Warrior program and proposals for future systems.

Journal ArticleDOI
TL;DR: Labscape is a smart environment designed to improve the experience of people who work in a cell biology laboratory by making information available where it is needed and by collecting and organizing data where and when it is created into a formal representation that others can understand and process.
Abstract: Labscape is a smart environment that we designed to improve the experience of people who work in a cell biology laboratory. Our goal in creating it was to simplify, laboratory work by making information available where it is needed and by collecting and organizing data where and when it is created into a formal representation that others can understand and process. By helping biologists produce a more complete record of their work with less effort, Labscape is designed to foster improved collaboration in conjunction with increased individual efficiency and satisfaction. A user-driven system, although technologically conservative, embraces a central goal of ubiquitous computing: to enhance the ability to perform domain tasks through fluid interaction with computational resources. Smart environments could soon replace the pen and paper commonly used in the laboratory setting.

Journal ArticleDOI
TL;DR: The explosive growth of pervasive computing in medicine has begun to produce many useful applications, systems, and tools, but these need additional integration, security, and standards work, especially to protect confidential medical records data, to realize their full potential.
Abstract: The explosive growth of pervasive computing in medicine has begun to produce many useful applications, systems, and tools. The legal environment in which these tools must operate is rapidly evolving, so procedures must be developed to effectively comply with the law and regulations now in preparation. As in the PC's early days, many isolated tools are emerging that have great potential. But these need additional integration, security, and standards work, especially to protect confidential medical records data, to realize their full potential while protecting the organizations and end users that employ them.

Journal ArticleDOI
TL;DR: This issue presents five invited articles by the AEICs and coauthors, each examining the state of the art in one of the five areas of pervasive computing mentioned earlier, and crisply characterizes the relevance of its area to Mark Weiser's vision.
Abstract: We dedicate this first issue, "Reaching for Weiser's Vision," to Mark Weiser. We begin with his original 1991 article - reprinted in the print edition only - with the permission of Scientific American. We then present five invited articles by the AEICs and coauthors, each examining the state of the art in one of the five areas of pervasive computing mentioned earlier. Each article begins by crisply characterizing the relevance of its area to Weiser's vision. It then summarizes recent advances and asking if they suggest any refocusing of Weiser?s vision. Finally, the article looks out into the future and identifies the challenges ahead in its area. This issue also includes pieces in the four departments, each providing a thought-provoking report or perspective on an aspect of pervasive computing.

Journal ArticleDOI
TL;DR: Two crucial building blocks of this environment are Sylph, a sensor middleware infrastructure, and iBadge, a lightweight sensor-instrumented badge worn by students and teachers, which deliver observations wirelessly to a wired infrastructure for analysis and storage.
Abstract: Continuing progress in microelectronics has allowed the embedding of sensing, processing, and wireless communications capabilities in familiar physical objects. This enables the creation of smart environments, where communication and computation technologies facilitate interactions between people and their surroundings, instead of just person-to-person or person-to-server communication. In a collaborative project underway at the University of California, Los Angeles, called Smart Kindergarten (SmartKG), we are exploring these technologies in a sensor-instrumented environment for early childhood education. Spatially dense but unobtrusive sensors continuously capture interactions among students, teachers, and common classroom objects. The sensors deliver observations wirelessly to a wired infrastructure for analysis and storage. Two crucial building blocks of this environment are Sylph, a sensor middleware infrastructure, and iBadge, a lightweight sensor-instrumented badge worn by students and teachers.

Journal ArticleDOI
TL;DR: The Guest Editors provide a brief summary of the articles included in tis Special Issue of IEEE Pervasive Computing and IEEE Wireless Communications.
Abstract: When teh Guest Editors originally proposed this special issue topic to the IEEE, it was targeted for the Personal Communications magazine. Since that original proposal, IEEE Pervasive Computing came into existence and Personal Communications was renamed IEEE Wireless Communications. The editorial boards decided to spread the special issue across both magazines. We received a total of 24 submissions, and 12 were accepted (seven in IEEE Pervasive Computing and five in the Oct. 2002 IEEE Wireless Communications). The Guest Editors provide a brief summary of the articles included in tis Special Issue.

Journal ArticleDOI
TL;DR: To address mobile-application design challenges, the authors created four user interface models that map problem-solving capabilities to application requirements.
Abstract: To effectively integrate wearable computers into ubiquitous computing environments, we must address several important challenges. How do we develop social and cognitive application models? How do we integrate input from multiple sensors and map them to users' social and cognitive states? How do we anticipate user needs? How do we interact with users? To address mobile-application design challenges, the authors created four user interface models that map problem-solving capabilities to application requirements.