scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Pervasive Computing in 2004"


Journal Article•DOI•
TL;DR: The proposed CodeBlue integrates sensor nodes and other wireless devices into a disaster response setting and provides facilities for ad hoc network formation, resource naming and discovery, security, and in-network aggregation of sensor-produced data.
Abstract: Sensor networks, a new class of devices has the potential to revolutionize the capture, processing, and communication of critical data for use by first responders. CodeBlue integrates sensor nodes and other wireless devices into a disaster response setting and provides facilities for ad hoc network formation, resource naming and discovery, security, and in-network aggregation of sensor-produced data. We designed CodeBlue for rapidly changing, critical care environments. To test it, we developed two wireless vital sign monitors and a PDA-based triage application for first responders. Additionally, we developed MoteTrack, a robust radio frequency (RF)-based localization system, which lets rescuers determine their location within a building and track patients. Although much of our work on CodeBlue is preliminary, our initial experience with medical care sensor networks raised many exciting opportunities and challenges.

1,067 citations


Journal Article•DOI•
TL;DR: A smart sensor query-processing architecture using database technology can facilitate deployment of sensor networks and discuss about query processing in sensor networks.
Abstract: Smart sensors are small wireless computing devices that sense information such as light and humidity at extremely high resolutions. A smart sensor query-processing architecture using database technology can facilitate deployment of sensor networks. Smart-sensor technology enables a broad range of ubiquitous computing applications. Their low cost, small size, and untethered nature lets them sense information at previously unobtainable resolutions. We discuss about query processing in sensor networks.

953 citations


Journal Article•DOI•
TL;DR: The key observation is that the sequence of objects a person uses while performing an ADL robustly characterizes both the ADL's identity and the quality of its execution.
Abstract: A key aspect of pervasive computing is using computers and sensor networks to effectively and unobtrusively infer users' behavior in their environment. This includes inferring which activity users are performing, how they're performing it, and its current stage. Recognizing and recording activities of daily living is a significant problem in elder care. A new paradigm for ADL inferencing leverages radio-frequency-identification technology, data mining, and a probabilistic inference engine to recognize ADLs, based on the objects people use. We propose an approach that addresses these challenges and shows promise in automating some types of ADL monitoring. Our key observation is that the sequence of objects a person uses while performing an ADL robustly characterizes both the ADL's identity and the quality of its execution. So, we have developed Proactive Activity Toolkit (PROACT).

887 citations


Journal Article•DOI•
Jenna Burrell1, Tim Brooke1, Richard Beckwith1•
TL;DR: In this paper, the authors studied the structure of the needs and priorities of people working in a vineyard to gain a better understanding of the potential for sensor networks in agriculture, and discussed an extended study of vineyard workers and their work practices to assess the potential of sensor network systems to aid work in this environment.
Abstract: Using ethnographic research methods, the authors studied the structure of the needs and priorities of people working in a vineyard to gain a better understanding of the potential for sensor networks in agriculture. We discuss an extended study of vineyard workers and their work practices to assess the potential for sensor network systems to aid work in this environment. The major purpose is to find new directions and new topics that pervasive computing and sensor networks might address in designing technologies to support a broader range of users and activities.

506 citations


Journal Article•DOI•
TL;DR: An intelligent fall detector based on a low-cost array of infrared detectors that could significantly enhance the functionality and effectiveness of existing monitoring systems and community alarm systems is developed.
Abstract: Falls are a major health hazard for the elderly and a major obstacle to independent living. The estimated incidence of falls for both institutionalized and independent persons aged over 75 is at least 30 percent per year. In the SIMBAD (Smart Inactivity Monitor using Array-Based Detectors) project, we've developed an intelligent fall detector based on a low-cost array of infrared detectors. A field trial and user research indicate that SIMBAD could significantly enhance the functionality and effectiveness of existing monitoring systems and community alarm systems.

425 citations


Journal Article•DOI•
TL;DR: This work proposes an ontology-based context model that leverages Semantic Web technology and OWL (Web Ontology Language) and proposes a service-oriented context-aware middleware (SOCAM) architecture, including a set of independent services that perform context discovery, acquisition, and interpretation.
Abstract: Applications and services must adapt to changing contexts in dynamic environments. However, building context-aware applications is still complex and time-consuming due to inadequate infrastructure support. We propose a context-aware infrastructure for building and rapidly prototyping such applications in a smart-home environment. This OSGi-based infrastructure manages context-aware services reliably and securely and efficiently supports context acquisition, discovery, and reasoning. A formal, ontology-based context model enables semantic context representation, reasoning, and knowledge sharing. We propose an ontology-based context model that leverages Semantic Web technology and OWL (Web Ontology Language). OWL is an ontology markup language that enables context sharing and context reasoning. Based on our context model, we also propose a service-oriented context-aware middleware (SOCAM) architecture, including a set of independent services that perform context discovery, acquisition, and interpretation.

363 citations


Journal Article•DOI•
TL;DR: Semantic Space is a pervasive computing infrastructure that exploits semantic Web technologies to support explicit representation, expressive querying, and flexible reasoning of contexts in smart spaces.
Abstract: Semantic Space is a pervasive computing infrastructure that exploits semantic Web technologies to support explicit representation, expressive querying, and flexible reasoning of contexts in smart spaces.

350 citations


Journal Article•DOI•
TL;DR: A prototype pervasive computing infrastructure, Gaia, allows applications and services to reason about uncertainty using mechanisms such as probabilistic logic, fuzzy logic, and Bayesian networks.
Abstract: Context-aware systems can't always identify the current context precisely, so they need support for handling uncertainty. A prototype pervasive computing infrastructure, Gaia, allows applications and services to reason about uncertainty using mechanisms such as probabilistic logic, fuzzy logic, and Bayesian networks.

348 citations


Journal Article•DOI•
TL;DR: An adaptive offloading system that includes two key parts: a distributed offloading platform and an offloading inference engine to deliver pervasive services without modifying the application or degrading its fidelity is proposed.
Abstract: Delivering a complex application on a resource-constrained mobile device is challenging. An adaptive offloading system enables dynamic partitioning of the application and efficient offloading of part of its execution to a nearby surrogate. To deliver pervasive services without modifying the application or degrading its fidelity, we propose an adaptive offloading system that includes two key parts: a distributed offloading platform and an offloading inference engine. There are two important decision-making problems for adaptive offloading: adaptive offloading triggering and efficient application partitioning.

292 citations


Journal Article•DOI•
TL;DR: The component technologies required to deploy a networked-robot system that can augment human firefighters and first responders, significantly enhancing their firefighting capabilities are described.
Abstract: The need to collect, integrate, and communicate information effectively in emergency response scenarios exceeds the state of the art in information technology. This emergency response problem provides an interesting and important test bed for studying networks of distributed mobile robots and sensors. Here, we describe the component technologies required to deploy a networked-robot system that can augment human firefighters and first responders, significantly enhancing their firefighting capabilities. In a burning building at a firefighting training facility, we deployed a network of stationary Mote sensors, mobile robots with cameras, and stationary radio tags to test their ability to guide firefighters to targets and warn them of potential dangers. Our long-term vision is a physical network that can sense, move, compute, and reason, letting network users (firefighters and first responders) Google for physical information - that is, information about the location and properties of physical objects in the real world.

258 citations


Journal Article•DOI•
TL;DR: The Aware Home Research initiative hopes to help older adults "age in place" by creating devices that can assist with daily tasks, offer memory support, and monitor daily activities, and understanding user needs and attitudes is essential to deploying this technology.
Abstract: Although computing technology has made inroads into home environments, it has yet to instigate a major shift in the design of homes or home activities. The convergence of television and the Internet is lagging behind expectations, and the combination of desktop computers, entertainment consoles, televisions, and cell phones has yet to form a cohesive whole. One possible reason for this lag in progress is that these technologies don't address a coherent need -they merely augment current entertainment and communication practices. We base our research on the premise that the next revolution of technology in the home will arise from devices that help older adults maintain their independence. A coherent suite of technologies will eventually let older adults be proactive about their own healthcare, will aid them in daily activities and help them learn new skills, will create new avenues for social communication, and will help ensure their safety and well being. The Aware Home Research initiative hopes to help older adults "age in place" by creating devices that can assist with daily tasks, offer memory support, and monitor daily activities. However, understanding user needs and attitudes is essential to deploying this technology.

Journal Article•DOI•
TL;DR: Computer-supported coordinated care uses technology to aid the network of people who support an elder living at home and proposes that it is a meaningful focus for the pervasive computing, CSCW, and human-computer interaction communities.
Abstract: Computer-supported coordinated care uses technology to aid the network of people who support an elder living at home. CSCC supports improved communication among individuals and a balanced distribution of responsibilities to allow the elder to live at home despite increasing care needs. The problem of coordinating the care of elders living at home hasn't been well defined or explored. We focus on using technology to aid the elder's entire support network. To distinguish this space from the broader research issues of computer-supported cooperative work, we call it computer-supported coordinated care and propose that it is a meaningful focus for the pervasive computing, CSCW, and human-computer interaction (HCI) communities.

Journal Article•DOI•
TL;DR: This work presents a taxonomy of attacks against mobile phones that shows known as well as potential attacks, and describes viruses, worms, and trojans specifically designed for the mobile environment.
Abstract: Understanding existing threats against mobile phones helps us better protect our information and prepare for future dangers. Mobile phones have evolved from their roots as analog walkie-talkies to full-scale Internet-enabled computers. Today, mobile phone handsets are arguably the dominant computer form factor consumers purchase. But having such powerful networked computers leads to a new class of malware: viruses, worms, and trojans specifically designed for the mobile environment. Merely enumerating known attacks doesn't help us understand all possible threats. Instead, we present a taxonomy of attacks against mobile phones that shows known as well as potential attacks.

Journal Article•DOI•
TL;DR: This paper proposes a widely accepted framework for user evaluations of ubiquitous applications and hopes to help researchers compare results, create ubiquitous computing design guidelines, develop effective discount evaluation techniques, understand the appropriateness of different evaluation techniques and develop a more complete structure so they can avoid overlooking key areas of evaluation.
Abstract: Although they routinely evaluate pervasive or ubiquitous computing applications, researchers have difficulty comparing results rigorously and quantitatively. The lack of a widely accepted framework for user evaluations of ubiquitous applications hampers their efforts. By proposing such a framework, we hope to help researchers compare results, create ubiquitous computing design guidelines, develop effective discount evaluation techniques, understand the appropriateness of different evaluation techniques, and develop a more complete structure so they can avoid overlooking key areas of evaluation.

Journal Article•DOI•
Robert Grimm1•
TL;DR: The metrics for designing and evaluating pervasive computing systems are illustrated and the performance measurements are done using Sun's Java Hotspot virtual machine.
Abstract: A new architecture, one.world, provides an integrated, comprehensive framework for building pervasive applications. It targets applications that automatically adapt to highly dynamic computing environments, and it includes services that make it easier for developers to manage constant change. We illustrate the metrics for designing and evaluating pervasive computing systems. The performance measurements are done using Sun's Java Hotspot virtual machine.

Journal Article•DOI•
TL;DR: This work addresses the need to create embedded interactive systems that disappear from the foreground to become secondary to the physical objects with which people interact during everyday activities.
Abstract: Exploring novel ubiquitous computing systems and applications inevitably requires prototyping physical components. Smart-Its are hardware and software components that augment physical objects with embedded processing and interaction to address this need. Our work, which uses small computing devices called Smart-Its, addresses the need to create embedded interactive systems that disappear from the foreground to become secondary to the physical objects with which people interact during everyday activities. Such systems create new design challenges related to prototyping with embedded technologies and require careful consideration of the physical design context.

Journal Article•DOI•
TL;DR: This work focuses on the problem of coordinating autonomous agent's movements in a distributed environment and can take inspiration from the laws of physics.
Abstract: As computing becomes increasingly pervasive, autonomous computers are going to be embedded in everyday objects in our physical environment. In such scenarios, mobility itself will be pervasive. Mobile users, mobile devices, computer-enabled vehicles, and mobile software components will define a dynamic, networked world in which a large set of autonomous components will interact with each other to orchestrate their activities. We focus on the problem of coordinating autonomous agent's movements in a distributed environment. Orchestrating mobile autonomous agents can take inspiration from the laws of physics. Agent's movements could be driven by locally perceived computational force fields, or cofields, generated by the agents themselves and propagated through an embedded infrastructure.

Journal Article•DOI•
TL;DR: The Arrhythmia monitoring system as mentioned in this paper collects real-time electrocardiogram signals from a mobile or homebound patient, and combines them with GPS location data, and transmits this information to a remote station for display and monitoring.
Abstract: We have developed and benchmarked real-time collection methods that exploit digital, packet-switched telephony services available in metropolitan areas. The Arrhythmia monitoring system collects real-time electrocardiogram signals from a mobile or homebound patient, and combines them with GPS location data, and transmits this information to a remote station for display and monitoring.

Journal Article•DOI•
TL;DR: CareMedia project analyzes video information by automatically tracking people, helping to efficiently label individuals, and characterizing selected activities and actions in a skilled-nursing facility.
Abstract: Pervasive activity monitoring in a skilled-nursing facility helps capture a continuous audio and video record. The CareMedia project analyzes this video information by automatically tracking people, helping to efficiently label individuals, and characterizing selected activities and actions.

Journal Article•DOI•
P. Schramm, E. Naroska, P. Resch, J. Platte, H. Linde, G. Stromberg, Thomas Sturm1 •
TL;DR: Shaman, an extendable Java-based service gateway for networked sensor systems, integrates small network-attached sensor-actuator modules (SAMs) into heterogeneous, high-level networking communities.
Abstract: An emerging area in ubiquitous computing is networked sensor systems. The typical approach is to connect sensor-actuator devices using classic network infrastructures at a low level. These networks can serve as infrastructures to dynamically integrate, sensors and actuators into complex interactive systems while providing convenient services and interfaces to users. A prominent scenario for ubiquitous computing and ad hoc networking is an in-house environment using smart sensor system. Shaman, an extendable Java-based service gateway for networked sensor systems, integrates small network-attached sensor-actuator modules (SAMs) into heterogeneous, high-level networking communities. The system unburdens its connected SAMs by transferring functionality from the SAMs to the gateway.

Journal Article•DOI•
TL;DR: A health-monitoring application and its simulation environment is discussed and a new environment for testing and evaluating system- and network-related issues in location-based applications is established.
Abstract: Complex and expensive testing and evaluation can inhibit cost-effective development of ubiquitous computing applications. A new environment for testing and evaluating system- and network-related issues in location-based applications strives to evaluate these applications prior to deployment. We discuss a health-monitoring application and its simulation environment.

Journal Article•DOI•
TL;DR: In culturally embedded computing, a new emphasis is placed on examining how the technology is emblematic of its cultural context, and five projects explore alternatives to traditional human-computer interaction design.
Abstract: In culturally embedded computing, we begin by examining how the technology is emblematic of its cultural context. Culturally embedded computing explicitly situates embedded computing in society, individual experience, culture, and history. Based on this new emphasis, five projects explore alternatives to traditional human-computer interaction design. Designing and building these new technologies requires more than simply building and understanding hardware and software. It also requires analyzing and incorporating the stories, meanings, and social networks that these devices engage.

Journal Article•DOI•
W.C. Mann1•
TL;DR: The oldest people - those over age 80 - represent the greatest challenge in providing health-related services and identifying ways to assist them in maintaining independence.
Abstract: Now that science and technology have contributed to our living longer, the world's population is aging dramatically. The oldest people - those over age 80 - represent the greatest challenge in providing health-related services and identifying ways to assist them in maintaining independence. The US National Institutes on Health's National Center on medical rehabilitation research studies mechanisms, modalities, and devices that improve, restore, or replace lost, underdeveloped, or deteriorating function. The NCMRR's model for viewing research and development in technology and aging comprises five levels of intervention (or research and development) with each level focusing on a different area. The cellular level focuses on pathophysiology, the organ level on impairment, the action level on functional limitation, the task-role level on disability, and the social-limitations level on barriers resulting from attitudes and policies.

Journal Article•DOI•
TL;DR: Biosignals can serve for passive health monitoring for the elderly who want to remain at home but need some level of support as they age and directly manipulate computer interfaces to give people with limited peripheral mobility some control over their environment.
Abstract: We examine efforts to harness biosignals to enable enhanced computer interfaces. In particular, biosignals can serve for passive health monitoring for the elderly who want to remain at home but need some level of support as they age. Such devices can directly manipulate computer interfaces to give people with limited peripheral mobility some control over their environment. In contrast to the biosignal interfaces based on voluntary peripheral nerve signals, we also discuss about the brain-to-computer interfaces (BCI).

Journal Article•DOI•
TL;DR: The Project54 system integrates electronic devices, and its speech-based user interface lets officers operate them without taking their eyes off the road.
Abstract: A typical police cruiser is filled with electronic devices, displays, and inputs, all competing for the officer's attention. The Project54 system integrates those devices, and its speech-based user interface lets officers operate them without taking their eyes off the road.

Journal Article•DOI•
TL;DR: In this paper, the authors present a cooperative tracking task using CCL and demonstrate some of the concepts involved in using a multi-robot task, and discuss CCL's ability to be a programming language as well as a modeling tool, which lets us directly simulate or execute CCL models.
Abstract: Expressing a cooperative control system requires combining tools from control theory and distributed computation. After reviewing several possible formalisms appropriate for the job, the authors settle on the computation and control language and illustrate its main features and advantages using a cooperative tracking task. We demonstrate some of the concepts involved in using a multirobot task. We also discuss CCL's ability to be a programming language as well as a modeling tool, which lets us directly simulate or execute CCL models.

Journal Article•DOI•
TL;DR: The Gust of Presence conceptual design as mentioned in this paper helps families keep in touch, rather than just exchange information, by letting members be a part of each other's daily routines, which lets them have the little encounters that are ordinary to members who live together yet are greatly missed by members living apart.
Abstract: The Gust of Presence conceptual design lets parents and children who live apart reconnect in a more friendship-based relationship. With two Gustbowls, parents and children can communicate in a simple way that requires little effort and could subtly become a part of their daily routines. Gustbowl is designed to promote and support informal, unobtrusive interactions in families whose members live apart. The Gustbowl helps families keep in touch, rather than just exchange information, by letting members be a part of each other's daily routines. This lets them have the little encounters that are ordinary to members who live together yet are greatly missed by members who live apart. We describe how the Delft design team created the Gustbowl from user studies by developing the concept for and field-testing an experiential prototype.

Journal Article•DOI•
TL;DR: This work suggests that grid technologies will make an ideal starting point for developing future infrastructure support for ubiquitous computing, facilitating the deployment of ubiquitous computing technologies.
Abstract: In contrast to many scientific disciplines embracing the vision of a uniform global distributed infrastructure to support their activities, ubiquitous computing is currently characterized by an extremely diverse set of infrastructure platforms. Such heterogeneity makes conducting large-scale wide-area experiments extremely difficult - most researchers choose instead to construct their own ubiquitous computing environment within which they can run their experiments. This heterogeneity makes the basic vision of ubiquitous computing difficult to realize because interworking between components at different sites isn't possible. One suggestion is that grid technologies will make an ideal starting point for developing future infrastructure support for ubiquitous computing, facilitating the deployment of ubiquitous computing technologies.

Journal Article•DOI•
TL;DR: A group of investigators at the Atlanta Veterans Affairs Rehabilitation Research and Development Center and the author designed cyber crumbs to support successful aging with progressive vision loss and provides support for independent travel and an in situ awareness of elements in the surroundings.
Abstract: Two-thirds of the people who have lost their vision are over the age of 65. Rehabilitation strategies and assistive technologies must be designed to meet the changing needs of this older and aging population. At this age, they might also have a diminished interest in learning new skills and might find it difficult or impossible to learn braille. With peripheral neuropathy, they lose the sense of touch, and so the ability to use braille, raised letters, and other tactile-based technologies. These age-related factors profoundly impact the design strategies employed in developing successful assistive technology. A group of investigators at the Atlanta Veterans Affairs Rehabilitation Research and Development Center and the author designed cyber crumbs to support successful aging with progressive vision loss. Cyber crumbs - the electronic equivalent of a trail of bread crumbs - provides support for independent travel and an in situ awareness of elements in the surroundings.

Journal Article•DOI•
TL;DR: Because the tension facing manufacturers appears to be in deciding the battery-weight and battery-performance tradeoffs, the solution seems to lie in finding ways to increase a mobile device's battery lifetime.
Abstract: Consumers expect their mobile devices to be small and light, have a decent battery lifetime, and still be powerful enough to run all their desired applications. The need to satisfy such consumer demands has driven mobile-device manufacturers to make products (such as PDAs and cell phones) that match these needs. However, this inevitably requires tradeoffs. Building smaller, lighter devices requires sacrificing the device's battery capacity because battery technology is still fairly dense and heavy, and contributes most of a mobile device's size and weight. But, mobile devices with the required resources to run useful desktop applications need additional battery power to run those resources for a reasonable length of time. Because the tension facing manufacturers appears to be in deciding the battery-weight and battery-performance tradeoffs, the solution seems to lie in finding ways to increase a mobile device's battery lifetime.