scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Pervasive Computing in 2008"


Journal ArticleDOI
TL;DR: The OpenStreetMap project is a knowledge collective that provides user-generated street maps that follow the peer production model that created Wikipedia; its aim is to create a set of map data that's free to use, editable, and licensed under new copyright schemes.
Abstract: The OpenStreetMap project is a knowledge collective that provides user-generated street maps. OSM follows the peer production model that created Wikipedia; its aim is to create a set of map data that's free to use, editable, and licensed under new copyright schemes. A considerable number of contributors edit the world map collaboratively using the OSM technical infrastructure, and a core group, estimated at approximately 40 volunteers, dedicate their time to creating and improving OSM's infrastructure, including maintaining the server, writing the core software that handles the transactions with the server, and creating cartographical outputs. There's also a growing community of software developers who develop software tools to make OSM data available for further use across different application domains, software platforms, and hardware devices. The OSM project's hub is the main OSM Web site.

2,487 citations


Journal ArticleDOI
TL;DR: In this article, a wearable activity recognition system is proposed to recognize human activities from body-worn sensors, which can further open the door to a world of healthcare applications, such as fitness monitoring, eldercare support, long-term preventive and chronic care, and cognitive assistance.
Abstract: Activity-aware systems have inspired novel user interfaces and new applications in smart environments, surveillance, emergency response, and military missions. Systems that recognize human activities from body-worn sensors can further open the door to a world of healthcare applications, such as fitness monitoring, eldercare support, long-term preventive and chronic care, and cognitive assistance. Wearable systems have the advantage of being with the user continuously. So, for example, a fitness application could use real-time activity information to encourage users to perform opportunistic activities. Furthermore, the general public is more likely to accept such activity recognition systems because they are usually easy to turn off or remove.

634 citations


Journal ArticleDOI
TL;DR: In this paper, the authors present a survey of denial-of-service threats and countermeasures considering wireless sensor platforms' resource constraints as well as the denial of sleep attack, which targets a battery-powered device's energy supply.
Abstract: This survey of denial-of-service threats and countermeasures considers wireless sensor platforms' resource constraints as well as the denial-of-sleep attack, which targets a battery-powered device's energy supply. Here, we update the survey of denial-of-service threats with current threats and countermeasures.In particular, we more thoroughly explore the denial-of-sleep attack, which specifically targets the energy-efficient protocols unique to sensor network deployments. We start by exploring such networks' characteristics and then discuss how researchers have adapted general security mechanisms to account for these characteristics.

488 citations


Journal ArticleDOI
TL;DR: In this paper, the authors consider two types of digital traces from Rome, Italy: georeferenced photos made publicly available on the photo-sharing Web site Flickr and aggregate records of wireless network events generated by mobile phone users making calls and sending text messages on the Telecom Italia Mobile (TIM) system.
Abstract: Novel methods and tools are being developed to explore the significance of the new types of user-related spatiotemporal data. This approach helps uncover the presence and movements of tourists from cell phone network data and the georeferenced photos they generate. A city's visitors have many ways of leaving voluntary or involuntary electronic trails: prior to their visits, tourists generate server log entries when they consult digital maps or travel Web sites; during their visit, they leave traces on wireless networks whenever they use their mobile phones; and after their visit, they might add online reviews and photos. Broadly speaking then, there are two types of footprint: active and passive. Passive tracks are left through interaction with an infrastructure, such as a mobile phone network, that produces entries in locational logs; active prints come from the users themselves when they expose locational data in photos, messages, and sensor measurements. In this article, we consider two types of digital traces from Rome, Italy: georeferenced photos made publicly available on the photo-sharing Web site Flickr and aggregate records of wireless network events generated by mobile phone users making calls and sending text messages on the Telecom Italia Mobile (TIM) system.

465 citations


Journal ArticleDOI
TL;DR: The author describes the technology inside the Wii remote, existing interaction techniques, what's involved in creating custom applications, and several projects ranging from multiobject tracking to spatial augmented reality that challenge the way its developers meant it to be used.
Abstract: Since its introduction, the Nintendo Wii remote has become one of the world's most sophisticated and common input devices. Combining its impressive capability with a low cost and high degree of accessibility make it an ideal platform for exploring a variety of interaction research concepts. The author describes the technology inside the Wii remote, existing interaction techniques, what's involved in creating custom applications, and several projects ranging from multiobject tracking to spatial augmented reality that challenge the way its developers meant it to be used.

462 citations


Journal ArticleDOI
TL;DR: The latest IMDs support delivery of telemetry for remote monitoring over long-range, high-bandwidth wireless links, and emerging devices will communicate with other interoperating IMDs.
Abstract: Protecting implantable medical devices against attack without compromising patient health requires balancing security and privacy goals with traditional goals such as safety and utility. Implantable medical devices monitor and treat physiological conditions within the body. These devices - including pacemakers, implantable cardiac defibrillators (ICDs), drug delivery systems, and neurostimulators - can help manage a broad range of ailments, such as cardiac arrhythmia, diabetes, and Parkinson's disease. IMDs' pervasiveness continues to swell, with upward of 25 million US citizens currently reliant on them for life-critical functions. Growth is spurred by geriatric care of the aging baby-boomer generation, and new therapies continually emerge for chronic conditions ranging from pediatric type 1 diabetes to anorgasmia and other sexual dysfunctions. Moreover, the latest IMDs support delivery of telemetry for remote monitoring over long-range, high-bandwidth wireless links, and emerging devices will communicate with other interoperating IMDs.

427 citations


Journal ArticleDOI
TL;DR: A context-aware wearable computing system could support a production or maintenance worker by recognizing the worker's actions and delivering just-in-time information about activities to be performed.
Abstract: A context-aware wearable computing system could support a production or maintenance worker by recognizing the worker's actions and delivering just-in-time information about activities to be performed.

359 citations


Journal ArticleDOI
TL;DR: Six articles in this special issue give innovative examples of gathering and using pervasive user-generated content off the desktop into the everyday world.
Abstract: Pervasive user-generated content takes the traditional idea of user-generated content and expands it off the desktop into our everyday world. The six articles in this special issue give innovative examples of gathering and using such content.

345 citations


Journal ArticleDOI
TL;DR: The panel analyzed how the failure unfolded to set the stage for a major paradigm shift in LBS business and technology and noted the milestones that shaped today's LBSs.
Abstract: Gainesville, Florida, 10 March 2 012. Today, the Mobile Location- Based Services Summit hosted a panel entitled "What Was Wrong with First-Generation Location-Based Services?" The panel chair, Sumi Helal of the University of Florida, invited two world-class experts in LBS history and technology to discuss the topic: Paolo Bellavista of the University of Bologna and Axel Kupper of the University of Munich. The panel discussed the popularity of today's LBSs and analyzed their distinguishing aspects in comparison with first-generation LBSs. The panel was anything but controversial, with all panelists in total agreement on what initially went wrong and why today's LBSs work. They analyzed how the failure unfolded to set the stage for a major paradigm shift in LBS business and technology and noted the milestones that shaped today's LBSs.

265 citations


Journal ArticleDOI
TL;DR: This work aims to capitalize on cutting- edge technologies that capture people's imagination in unusual ways by providing a toolkit that empowers novices to design, engineer, and build their own e-textiles.
Abstract: Electronic textiles, or e-textiles, are an increasingly important part of wearable computing, helping to make pervasive devices truly wearable. These soft, fabric-based computers can function as lovely embodiments of Mark Weiser's vision of ubiquitous computing: providing useful functionality while disappearing discreetly into the fabric of our clothing. E-textiles also give new, expressive materials to fashion designers, textile designers, and artists, and garments stemming from these disciplines usually employ technology in visible and dramatic style. Integrating computer science, electrical engineering, textile design, and fashion design, e-textiles cross unusual boundaries, appeal to a broad spectrum of people, and provide novel opportunities for creative experimentation both in engineering and design. Moreover, e-textiles are cutting- edge technologies that capture people's imagination in unusual ways. (What other emerging pervasive technology has Vogue magazine featured?) Our work aims to capitalize on these unique features by providing a toolkit that empowers novices to design, engineer, and build their own e-textiles.

255 citations


Journal ArticleDOI
TL;DR: Swallowable capsules have been evolving for almost half a century and are now helping uncover GI tract mysteries in diagnostic and therapeutic applications and the history of the technology is reviewed, the state of the art is presented, and ongoing research is described.
Abstract: Annually, over 3 million people in the US alone suffer gastrointestinal (GI) disease serious enough to require hospitalization. In over one-third of these cases, the cause is never found. Despite standard invasive examination techniques, much of the GI tract's inner workings remain a mystery. Procedures exist for examining the esophagus and stomach (gastroscopy) and the colon (colonoscopy), delivering some information at a cost of much distress to the patient. However, the small intestine remains inaccessible. Swallowable capsules have been evolving for almost half a century and are now helping uncover GI tract mysteries in diagnostic and therapeutic applications. Here, we briefly review the history of the technology, present the state of the art, and describe ongoing research.

Journal ArticleDOI
TL;DR: A framework that links opportunistic design for ubiquitous computing to hardware and software practices is introduced and the mashups' epistemic, pragmatic, and intrinsic values for creators and how shopping becomes a central activity are discovered.
Abstract: Opportunistic practices can accelerate and simplify ubiquitous computing systems design. Such practices may include copying and pasting code from online forums into one's own scripts or reappropriating components from consumer electronics for design prototypes. The authors introduce a framework that links opportunistic design for ubiquitous computing to hardware and software practices. They interview 14 professional and hobbyist "mashers"-Web 2.0 programmers, hardware hackers, and designers of interactive ubiquitous computing systems-to learn how designers choose between integration levels. Finally, they discover the mashups' epistemic, pragmatic, and intrinsic values for creators and how shopping becomes a central activity.

Journal ArticleDOI
TL;DR: This general software architecture is designed to support ubiquitous computing's fundamental challenges, helping the community develop and assess middleware and frameworks for this area.
Abstract: This general software architecture is designed to support ubiquitous computing's fundamental challenges, helping the community develop and assess middleware and frameworks for this area.

Journal ArticleDOI
TL;DR: The CRN Toolbox is a tool set specifically optimized for implementing multimodal, distributed activity and context recognition systems running on Posix operating systems, featuring mechanisms for distributed processing and support for mobile and wearable devices.
Abstract: The CRN Toolbox enables fast implementation of activity and context recognition systems, featuring mechanisms for distributed processing and support for mobile and wearable devices. CRN Toolbox is a tool set specifically optimized for implementing multimodal, distributed activity and context recognition systems running on Posix operating systems. Like conventional rapid- prototyping tools, the CRN Toolbox contains a collection of ready-to-use algorithms (signal processing, pattern classification, and so on). Unlike classic event detection in homogeneous sensor networks-for example, DSWare (Data Service Middleware)-it supports complex activity detection from heterogeneous sensors. Its implementation is particularly optimized for mobile devices. This includes the ability to execute algorithms, whether in floating-point or fixed-point arithmetic, without recoding. Moreover, with its mature functionality, the CRN Toolbox isn't likely to suffer from limited user acceptance as the Context toolkit framework did.

Journal ArticleDOI
TL;DR: This article introduces activity-aware computing, which uses activity-based computing to enhance pervasive environments in two ways: to help users associate resources and services with activities, resulting in seamless interaction with those resources and Services, and to enable pervasive environments to automatically infer activities and thus opportunistically offer services that support the user's current goal.
Abstract: In this article, we introduce activity-aware computing, which uses activity-based computing to enhance pervasive environments in two ways: to help users associate resources and services with activities, resulting in seamless interaction with those resources and services, and to enable pervasive environments to automatically infer activities and thus opportunistically offer services that support the user's current goal. Thus, activity-aware applications persuade users to commit themselves to the technology, moving from a paradigm of activity-based ";interaction"; toward one of activity-aware ";engagement"; with a computationally augmented environment. We present a set of tools for developing activity-aware applications, including a computational representation of human activities that we defined using data from a hospital case study we conducted. We also used the data to create an activity recognition approach and a set of design principles for developing activity-aware applications. The mobile activity monitor we designed to create a wearable connection between patients and nurses exemplifies our design principles.

Journal ArticleDOI
TL;DR: The fundamental principle behind the nanogenerator is reviewed, an approach for improving its performance is presented, and some of the challenges the authors face in pushing this technology to reach its potential are discussed.
Abstract: A novel approach converts nanoscale mechanical energy into electric energy for self-powering nanodevices.In our own work, we've used piezoelectric zinc-oxide nanowire (ZnO NW) arrays to demonstrate a novel approach for converting nanoscale mechanical energy into electric energy. Here, we review the fundamental principle behind the nanogenerator, present an approach for improving its performance, and discuss some of the challenges we face in pushing this technology to reach its potential.

Journal ArticleDOI
TL;DR: The role of presence, particularly as enabled by Bluetooth device discovery, as the driver for the system's behavior and its situational awareness is explored.
Abstract: Public digital displays are increasingly pervasive and an important enabling technology for many types of ubiquitous computing scenarios. Not only do they provide a simple and effective way of bringing digital information into our physical world, but their presence could also be a catalyst for situated interaction and the emergence of local user-generated content. This paper explores the role of presence, particularly as enabled by Bluetooth device discovery, as the driver for the system's behavior and its situational awareness.

Journal ArticleDOI
TL;DR: This framework for evaluating security and privacy risks in RFID systems focuses on key application domains, assessing risk levels for each on the basis of RFID-specific criteria.
Abstract: This framework for evaluating security and privacy risks in RFID systems focuses on key application domains, assessing risk levels for each on the basis of RFID-specific criteria.

Journal ArticleDOI
TL;DR: The articles in this special issue focus on context-aware systems designed to recognize activities and report on experiences with activity recognition in real-world applications.
Abstract: The articles in this special issue focus on context-aware systems designed to recognize activities. They present underlying technologies for developing activity-aware systems and report on experiences with activity recognition in real-world applications.

Journal ArticleDOI
TL;DR: An exciting new initiative at Georgia Tech and Bryn Mawr College is using personal robots both to motivate students and to serve as the primary programming platform for the Computer Science 1 curriculum.
Abstract: An exciting new initiative at Georgia Tech and Bryn Mawr College is using personal robots both to motivate students and to serve as the primary programming platform for the Computer Science 1 curriculum. Here, the authors introduce the initiative and outline plans for the future.

Journal ArticleDOI
TL;DR: The authors show that despite cultural and national differences, universal properties exist in a diverse set of traffic networks along with important insight into traffic-related phenomena such as the geographic spread of emergent infectious diseases.
Abstract: In this article, we report on the discovery of statistical regularities, mathematical laws, and universal characteristics underlying multiscale human mobility. Our study is based on the generation of proxy networks for global human travel behavior from pervasive user data collected at the world's largest bill- tracking Web site and trajectories of trackable items (known as travel bugs) recorded at a geocaching Web. From this pervasive data, we extract multiscale human traffic networks for the US and European countries that cover distances of a few to a few thousand kilometers. Proxy networks permit reliable estimates of statistical features such as degree, flux, and traffic weight distributions. The authors show that despite cultural and national differences, universal properties exist in a diverse set of traffic networks along with important insight into traffic-related phenomena such as the geographic spread of emergent infectious diseases.

Journal ArticleDOI
TL;DR: This consortium represents a combination of disciplines to design and fabricate new medical devices and components as well as to test them in laboratories and subsequent clinical trials.
Abstract: Healthy Aims is a 23- million, four-year project, funded under the EU's information society technology sixth framework program to develop intelligent medical implants and diagnostic systems (www.healthyaims.org). The project has 25 partners from 10 countries, including commercial, clinical, and research groups. This consortium represents a combination of disciplines to design and fabricate new medical devices and components as well as to test them in laboratories and subsequent clinical trials. The project focuses on medical implants for nerve stimulation and diagnostic equipment based on strain-gauge technology.

Journal ArticleDOI
TL;DR: This paper highlights five standards, some of which are labeled "device," "sensor," or "transducer," but all of them are equally capable of describing devices.
Abstract: The domain of sensors is still a wild jungle in which nothing is quite standardized. To fix this, we need a device standard to characterize physical and electrical features and constraints, describe necessary data processing and message parsing procedures, and, more importantly, enable automatic device integration into the world of computers we already have. This paper highlights five standards, some of which are labeled "device," "sensor," or "transducer," but all of them are equally capable of describing devices. If sensors are considered as simple or primitive devices, it follows that all five standards are also capable of describing sensors. No distinction between sensors and devices are done here.

Journal ArticleDOI
TL;DR: The organizers from four different workshop series, each focused on this topic, summarize and discuss the main outcomes of these events and set of standard evaluation methods for ubiquitous systems.
Abstract: Recognized evaluation strategies are essential to systematically advance a research field's state of the art. Pervasive and ubiquitous computing need such strategies to mature as a discipline and to enable researchers to objectively assess and compare new techniques' contributions. Researchers have shown that evaluating ubiquitous systems can be difficult, so approaches tend to be subjective, piecemeal, or both. To ensure that the validity and usability of proposed systems won't be compromised, researchers must reach consensus on a set of standard evaluation methods for ubiquitous systems. Otherwise, methods for scientifically testing and presenting state-of-the-art advances will remain unclear. In this article, the organizers from four different workshop series, each focused on this topic, summarize and discuss the main outcomes of these events.

Journal ArticleDOI
TL;DR: A comprehensive definition of location authentication is presented, its main threats in different scenarios are described, and the mechanisms proposed thus far to fulfil this requirement are reviewed.
Abstract: Location authentication is a young security requirement that has recently arisen in ubiquitous computing applications. During the last decade, researchers have proposed several schemes to guarantee this property in different contexts, but more research is needed. To provide a clearer picture of this requirement, the authors present a comprehensive definition of location authentication, describe its main threats in different scenarios, and review the mechanisms proposed thus far to fulfil this requirement.

Journal ArticleDOI
TL;DR: An approach for context-aware and QoS-enabled learning content provisioning and to facilitate knowledge interoperability and sharing is presented, which proposes a knowledge-based semantic recommendation method to acquire the content the user really wants and needs to learn.
Abstract: In this article, the authors present an approach for context-aware and QoS-enabled learning content provisioning, one of the essential elements in ubiquitous learning. The essence of the system is recommending the right content, in the right form, to the right learner, based on a wide range of user context information and QoS requirements. To facilitate knowledge interoperability and sharing, they modeled the learner context, content knowledge, and domain knowledge using ontologies. They first propose a knowledge-based semantic recommendation method to acquire the content the user really wants and needs to learn. Then, a fuzzy logic-based decision-making strategy and an adaptive QoS mapping mechanism determine the appropriate presentation according to user's QoS requirements and device/network capability.

Journal ArticleDOI
Nikolaos Dimakis, John Soldatos, L. Polymenakos, Pascal Fleury1, J. Curin1, Jan Kleindienst1 
TL;DR: Designers must integrate perceptual components from various vendors to develop context-aware applications for smart spaces, and Legacy middleware frameworks facilitate integration of pervasive smart space applications.
Abstract: Perceptual components such as audiovisual processing and multimodal fusion components are integral elements of smart space applications. These components provide information about human actors' identity, location, activities, and sometimes goals through person trackers, person-identification components, and other situation-identification elements. Perceptual components are usually computationally demanding because they often perform real-time processing of vast amounts of data. Legacy middleware frameworks facilitate integration of pervasive smart space applications, yet they make no attempt to standardize perceptual component data and interfaces. To develop context-aware applications for smart spaces, designers must integrate perceptual components from various vendors.

Journal ArticleDOI
TL;DR: The objective and rationale behind urban tapestries, its construction and development and lessons that can be learned from UT are discussed.
Abstract: Urban tapestries (UT) is an exploration into the potential costs and benefits of public authoring, that is, mapping and sharing local knowledge, memories, stories, sensed information, and experiences. It aims to reveal the potential of pervasive computing to create and support relationships that surpass established social and cultural boundaries and enable new practices around place, identity, and community. This paper discusses the objective and rationale behind UT, its construction and development and lessons that can be learned from UT.

Journal ArticleDOI
TL;DR: The object-blog service application automatically converts raw sensor data to environment-generated content (EGC), including texts, graphs, and figures, which facilitates data searching and browsing.
Abstract: The object-blog service application automatically converts raw sensor data to environment-generated content (EGC), including texts, graphs, and figures. This conversion facilitates data searching and browsing. Generated content can serve several purposes, including memory aids, security, and communication media. In object-blog, personified objects automatically post entries to a Weblog about sensor data obtained from sensors attached to the objects. Feedback thus far from participants working with object-blog in an experimental environment has been positive.

Journal ArticleDOI
TL;DR: The results indicate that consumers find convenience and compatibility the most important adoption factors while observability and perceived social prestige are the least important.
Abstract: This research examines various factors affecting consumer adoption of a smart wearable electronics product, specifically an iPod jacket. The results indicate that consumers find convenience and compatibility the most important adoption factors while observability and perceived social prestige are the least important.