scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Pervasive Computing in 2010"


Journal ArticleDOI
TL;DR: This article focused on recognizing simple human activities, which can be exploited to great societal benefits, especially in real-life, human centric applications such as elder care and healthcare.
Abstract: In principle, activity recognition can be exploited to great societal benefits, especially in real-life, human centric applications such as elder care and healthcare. This article focused on recognizing simple human activities. Recognizing complex activities remains a challenging and active area of research and the nature of human activities poses different challenges. Human activity understanding encompasses activity recognition and activity pattern discovery. The first focuses on accurate detection of human activities based on a predefined activity model. An activity pattern discovery researcher builds a pervasive system first and then analyzes the sensor data to discover activity patterns.

679 citations


Journal ArticleDOI
TL;DR: As this overview of products and projects shows, preinstalled location systems, wireless sensor networks, and inertial sensing all have benefits and drawbacks when considering emergency response requirements.
Abstract: As this overview of products and projects shows, preinstalled location systems, wireless sensor networks, and inertial sensing all have benefits and drawbacks when considering emergency response requirements.

209 citations


Journal ArticleDOI
TL;DR: The principle of ubiquitous computing technology standardization is discussed and uID standards currently in development are introduced, to improve the quality of information services provided in ubiquitous computing environments.
Abstract: In ubiquitous computing environments, many tiny computers cooperate, adapting their behaviors according to real-world contexts to provide flexible information services. These information services can't be realized without technology standardization in a broad area. In this article, we discuss the principle of ubiquitous computing technology standardization and introduce uID standards currently in development.

167 citations


Journal ArticleDOI
TL;DR: The potential applications for the further capability to track and analyze eye movements anywhere and anytime calls for new research to develop and understand eye-based interaction in mobile daily life settings.
Abstract: Current research on eye-based interfaces mostly focuses on stationary settings. However, advances in mobile eye-tracking equipment and automated eye-movement analysis now allow for investigating eye movements during natural behavior and promise to bring eye-based interaction into people's everyday lives. Recent developments in mobile eye tracking equipment point the way toward unobtrusive human-computer interfaces that will become pervasively usable in everyday life. The potential applications for the further capability to track and analyze eye movements anywhere and anytime calls for new research to develop and understand eye-based interaction in mobile daily life settings.

165 citations


Journal ArticleDOI
TL;DR: Time to Eat, a mobile-phone-based game, motivates children to practice healthy eating habits by letting them care for a virtual pet whose healthiness determines the game's outcome.
Abstract: It's never been more important to teach youth the importance of healthy eating habits. Time to Eat, a mobile-phone-based game, motivates children to practice healthy eating habits by letting them care for a virtual pet. Players send the pet photos of the food they consume throughout the day; the food's healthiness determines the game's outcome. An examination of the game's design provides insight into the potential of deploying health games on mobile phones.

133 citations


Journal ArticleDOI
TL;DR: The system presented in this article considers user requirements, including novel advances, all in an integral home automation solution suitable for many services, and has been deployed on a prototype house, testing a wide set of domotic services.
Abstract: We've long heard about the wide functionality that home automation technologies offer for improving our lives and securing our houses. However, price and an unstable domotics market have restricted such systems' deployment. Nowadays, companies offer too technology-dependent solutions that don't cover user demands completely. Meanwhile, research works focus on small innovations on specific parts of home automation systems, which don't consider integration and deployment issues to present practical designs. The system presented in this article considers user requirements, including novel advances, all in an integral home automation solution suitable for many services. The architecture's modular nature allows direct adaptation to specific cases using standard domotic technologies, for managing in-house devices, and a proposal of an IP-based network for connecting the main home automation module with other platform elements. A remote security system has been developed, and managing tasks are enabled via in-home control panels and an advanced 3D application for local and remote homeowner access. The system has been deployed on a prototype house, testing a wide set of domotic services. Moreover, the range of indoor pervasive applications has also been extended to e-health, elderly adaptation, greenhouse automation, and energy efficiency.

131 citations


Journal ArticleDOI
TL;DR: In this paper, the authors proposed a method to analyze and categorize wireless access points based on common usage characteristics that reflect real-world, placed-based behaviors and provide an instant survey of building use across the entire campus at a surprisingly fine-grained level.
Abstract: Researchers use eigendecomposition to leverage MIT's Wi-Fi network activity data and analyze to the physical environment. We proposed a method to analyze and categorize wireless access points based on common usage characteristics that reflect real-world, placed-based behaviors. It uses eigendecomposition to study the Wi-Fi network at the Massahusetts Institute of Technology (MIT), correlating data generated as a byproduct of network activity with the physical environment. Our approach provides an instant survey of building use across the entire campus at a surprisingly fine-grained level. The resulting eigenplaces have implications for reseach across a range of wireless technology as well as potential applications in network planning, traffic and tourism management, and even marketing.

124 citations


Journal ArticleDOI
TL;DR: The pervasive application described in this article lets firefighters obtain images of hot spots directly from an unmanned aircraft and receive commands from their manager through a communication network, and studies the quality of this three-layered network in maintaining the application's bandwidth requirements.
Abstract: Forest fires are a challenging problem for many countries. They often cause economical lost and ecological damage, and they can sometimes even cost human lives. Finding hot spots immediately after a fire is an important part of fighting forest fires. The main objective is to obtain a temperature map of the burned area, to locate the most critical embers. This information can help firefighter managers make the correct decisions about ground crew movements. The pervasive application described in this article lets firefighters obtain images of hot spots directly from an unmanned aircraft and receive commands from their manager through a communication network. Every firefighter holds a personal electronic device (PED), which includes a touch screen, Wi-Fi connectivity, a GPS receiver, and temperature sensors. Because terrain conditions such as abrupt ravines, rocks, and dense vegetation can introduce obstacles to connectivity, a balloon with a Wi-Fi device is tethered to every firefighter's truck to improve communication. In addition, a fixed-wing unmanned aircraft augments the number of communication layers to three. This article studies the quality of this three-layered network in maintaining the application's bandwidth requirements.

121 citations


Journal ArticleDOI
TL;DR: Service composition is a natural concept around which to structure pervasive systems and individuate parts of them that are suitable for contingency management, application, storage, and so on.
Abstract: Combining existing services to create new pervasive computing services involves special design considerations, including context awareness, contingency management, device heterogeneity, and user empowerment. Service composition is a natural concept around which to structure pervasive systems and individuate parts of them that are suitable for contingency management, application, storage, and so on. The notion of service composition also provides a natural frame for addressing systemic issues such as performance, usability, and security. In this case, such characteristics aren't determined by a particular service but rather by the software architecture-how services are combined.

116 citations


Journal ArticleDOI
Maria R. Ebling1
TL;DR: This issue's New Products column focuses on connected youth and their families, and the author looks at two iPhone applications to help avoid the "are the authors there yets?" on long car rides and to help record memories of the places you'll visit this summer.
Abstract: This issue's New Products column focuses on connected youth and their families. The author looks at two iPhone applications to help avoid the "are we there yets?" on long car rides and to help record memories of the places you'll visit this summer. The first application is effectively a reverse karaoke application: you sing; it accompanies. The second application creates panoramic images from sequences of individual images. The author then discusses three new devices—the Alex eReader; an Intel power management device; and the Microsoft Kin, a mobile phone that's connected to major social-networking sites.

107 citations


Journal ArticleDOI
TL;DR: OneBusAway provides real-time arrival information to more than 7,000 Seattle-area bus riders' mobile devices everyday to significantly enhance the usability of public transit systems.
Abstract: Real-time arrival information can significantly enhance the usability of public transit systems. OneBusAway provides such information to more than 7,000 Seattle-area bus riders' mobile devices everyday.

Journal ArticleDOI
TL;DR: This special issue showcases papers that describe recent research that addresses the challenges of location sensing more robust, accurate, deployable, secure, and developer-friendly.
Abstract: Today, location information is in the hands of the masses. The success of location in pervasive computing has exposed new challenges and opportunities for researchers including making location sensing more robust, accurate, deployable, secure, and developer-friendly. This special issue showcases papers that describe recent research that addresses these challenges.

Journal ArticleDOI
TL;DR: Monsters & Gold, a context-aware, user-adaptive mobile fitness game, runs on mobile phones to motivate and train users in jogging outdoors to encourage users to speed up or slow down.
Abstract: Mobile phones can persuade users to adopt healthy behaviors such as regular exercise. Monsters & Gold, a context-aware, user-adaptive mobile fitness game, runs on mobile phones to motivate and train users in jogging outdoors. The game dynamically presents virtual monsters, gold, and other items-according to factors such as users' heart rate, age, and exercise phase-to encourage users to speed up or slow down. A first evaluation led to an improved game design; a subsequent evaluation confirmed beneficial effects on training and motivation.

Journal ArticleDOI
TL;DR: The authors detail the alignment prediction approach-a time-series-estimation technique applicable to both numeric and nonnumeric data-and compare it to four other prediction approaches to determine context-prediction accuracy in ubiquitous computing environments.
Abstract: The authors detail the alignment prediction approach-a time-series-estimation technique applicable to both numeric and nonnumeric data-and compare it to four other prediction approaches to determine context-prediction accuracy in ubiquitous computing environments.

Journal ArticleDOI
TL;DR: The authors compare their proposed system to memory-based collaborative methods in which user similarity is based on the ratings of previously rated items to recommend scattered, pervasive context-embedded networked objects.
Abstract: The Internet of Things (IoT) concept promises a world of networked and interconnected devices that provides relevant content to users. Recommender systems can find relevant content for users in IoT environments, offering a user-adapted personalized experience. Collaboration-based recommenders in IoT environments rely on user-to-object, space-time interaction patterns. This extension of that idea takes into account user location and interaction time to recommend scattered, pervasive context-embedded networked objects. The authors compare their proposed system to memory-based collaborative methods in which user similarity is based on the ratings of previously rated items. Their proof-of-concept implementation was used in a real-world scenario involving 15 students interacting with 75 objects at Carlos III University of Madrid.

Journal ArticleDOI
TL;DR: The SymPA (Symbian protocol analyzer) tool correlates traffic information, radio-access-technology measurements, and location data to help developers evaluate mobile applications in the field.
Abstract: The SymPA (Symbian protocol analyzer) tool correlates traffic information, radio-access-technology measurements, and location data to help developers evaluate mobile applications in the field.

Journal ArticleDOI
TL;DR: In this article, a wearable tag for pervasive sensing applications consists of a custom integrated circuit, an antenna for radio frequency energy harvesting, and sensors for monitoring physiological parameters, and generates an alarm when it suspects a patient emergency.
Abstract: A new tag for pervasive sensing applications consists of a custom integrated circuit, an antenna for radio frequency energy harvesting, and sensors for monitoring physiological parameters. This paper presents a wearable tag design that can monitor multiple signals. The tag generates an alarm when it suspects a patient emergency. To quickly cover a large portion of the population at risk, we kept the tag affordable (less than US$2 each when manufactured in volume), disposable, small, and easy to use. Such tags would be useful for hospitals, facilities for infants and the elderly, and ordinary homes to detect and alert caregivers to possible problems including SCA and SIDS.

Journal ArticleDOI
TL;DR: Presto provides decoupled constructs to decompose the physical-virtual link's complexity, it simplified smart workflow development for pervasive and interactive system designers with an increasing number of digital services in users' surroundings.
Abstract: Day-to-day mobile devices are becoming an important part of our lives. The design of systems that help users in their day-to-day activities must align with their world vision. Because Presto provides decoupled constructs to decompose the physical-virtual link's complexity, it simplified smart workflow development for pervasive and interactive system designers. With an increasing number of digital services in users' surroundings, they appreciate simplicity. Our future work will address context-based workflow presentation that's less disruptive for users.

Journal ArticleDOI
TL;DR: Using tags' unique IDs, a semantic database, and RF perception via actuated antennas, this paper shows how a robot can reliably interact with people and manipulate labeled objects.
Abstract: Passive UHF RFID tags are well matched to robots' needs. Unlike lowfrequency (LF) and high-frequency (HF) RFID tags, passive UHF RFID tags are readable from across a room, enabling a mobile robot to efficiently discover and locate them. Using tags' unique IDs, a semantic database, and RF perception via actuated antennas, this paper shows how a robot can reliably interact with people and manipulate labeled objects.

Journal ArticleDOI
TL;DR: To increase crowd evacuation efficiency in emergency situations, the authors developed a wearable computer, LifeBelt, to guide individuals from emergency situations to escape.
Abstract: To increase crowd evacuation efficiency in emergency situations, the authors developed a wearable computer, LifeBelt, to guide individuals from emergency situations to escape. The LifeBelt collects position and orientation information about individuals from embedded sensors, shares this information with a background emergency coordination system, receives an individualized optimized escape strategy, and guides the individual via vibro-tactile stimulation, indicating direction and distance to the recommended exit. Simulation models indicate that the number of successful evacuations per unit time improve significantly using the LifeBelt technology.

Journal ArticleDOI
TL;DR: This article reports on the International Conference on Automotive User Interfaces and Interactive Vehicular Applications, wherein participants shared presentations on topics such as aesthetics, user interaction and distraction, safety, and driver monitoring.
Abstract: Cars offer an interesting but challenging microcosm for pervasive computing research and, in particular, for interaction with pervasive computing systems. Increasingly, researchers are looking at interactive applications in the car and investigating human-car interaction from a computer science—rather than an ergonomics or mechanical engineering—perspective. This article reports on the International Conference on Automotive User Interfaces and Interactive Vehicular Applications, wherein participants shared presentations on topics such as aesthetics, user interaction and distraction, safety, and driver monitoring.

Journal ArticleDOI
TL;DR: Attitudes, perceptions, and concerns regarding electronic recording encountered in daily activities are described and data gathered from interviews grounded in real experiences are presented that form the basis of a discussion for how people develop mental models about the intent and uses of a broad scope of recording technologies embedded in the world.
Abstract: Electronic recording and surveillance systems are arguably some of the most pervasive technologies in the world today. Despite this rapid proliferation and their study by many researchers, there is still work to be done in understanding how people reason about these technologies when they encounter them. In this article, the authors describe attitudes, perceptions, and concerns regarding electronic recording encountered in daily activities. They present data gathered from interviews grounded in real experiences that form the basis of a discussion for how people develop mental models about the intent and uses of a broad scope of recording technologies embedded in the world. Individual constructions of reality about current recording systems, including the people, places, and activities that surround them, provide insight into how design, technology, and policy can work together to provide appropriate information about the existence and uses of recording devices. These insights can lead to usable systems that allow individual users to make informed personal decisions.

Journal ArticleDOI
Roy Want1
TL;DR: This column provides a synopsis of the iPhone and describes key features that have allowed it to redefine what it means to be a modern smart device, put in the context of pervasive computing.
Abstract: This column provides a synopsis of the iPhone and describes key features that have allowed it to redefine what it means to be a modern smart device. In particular, the description is put in the context of pervasive computing, and the author presents a review of his top five iPhone apps. These highlight how the App Store has allowed programmers to test and distribute many concepts originating from pervasive computing research.

Journal ArticleDOI
TL;DR: The authors constructed LOC8, a programming framework for exploring location data's multifaceted representations and uses, so developers can construct complex queries by combining basic queries and additional contextual information.
Abstract: Location is a core concept in most pervasive systems-and one that's surprisingly hard to deal with flexibly. Using a location model supporting a range of expressive representations for spaces, spatial relationships, and positioning systems, the authors constructed LOC8, a programming framework for exploring location data's multifaceted representations and uses. With LOC8, developers can construct complex queries by combining basic queries and additional contextual information.

Journal ArticleDOI
TL;DR: A kitchen that intelligently senses cooking activities and provides realtime nutritional information helps facilitate healthy cooking by letting family cooks make informed decisions and creates opportunities to embed pervasive computing in a smart kitchen to facilitatehealthy cooking.
Abstract: The paper discusses a kitchen that intelligently senses cooking activities and provides realtime nutritional information helps facilitate healthy cooking by letting family cooks make informed decisions. It creates opportunities to embed pervasive computing in a smart kitchen to facilitate healthy cooking.

Journal ArticleDOI
Seiichiro Matsumoto1
TL;DR: Echonet is a de jure home network standard ratified by the IEC and the ISO for control and monitor sensors, household appliances, and equipment that offers many unique features such as media-independent control systems, interoperability in a multiple vendor environment, compatibility with long-term ecosystem construction, and secure communication to protect personal information.
Abstract: Echonet is a de jure home network standard ratified by the IEC and the ISO for control and monitor sensors, household appliances, and equipment. Its small footprint offers many unique features such as media-independent control systems, interoperability in a multiple vendor environment, compatibility with long-term ecosystem construction, and secure communication to protect personal information.

Journal ArticleDOI
TL;DR: The physical and social cues on which the authors rely during collaboration can vanish in the digital realm, so inSpace focuses on physical-digital codesign, leveraging an approach grounded in social behavior patterns.
Abstract: The physical and social cues on which we rely during collaboration can vanish in the digital realm. inSpace focuses on physical-digital codesign, leveraging an approach grounded in social behavior patterns.

Journal ArticleDOI
Maria R. Ebling1, Ramón Cáceres
TL;DR: The authors look at some labeling technologies, especially 2D bar codes, and talk about their adoption around the world and applications of 2D labels in print media as well as popular applications of 1D bar code that support price comparisons on mobile phones.
Abstract: This column focuses on labeling the real world. The authors look at some labeling technologies, especially 2D bar codes, and talk about their adoption around the world. They also discuss applications of 2D labels in print media as well as popular applications of 1D bar codes that support price comparisons on mobile phones.

Journal ArticleDOI
TL;DR: Novel technologies for nurturing a person's contacts use mobile phones to recommend new friends or track a friendship's health, and can also help people monitor their own emotions.
Abstract: Novel technologies for nurturing a person's contacts use mobile phones to recommend new friends or track a friendship's health. Such monitoring can also help people monitor their own emotions.

Journal ArticleDOI
TL;DR: Teachers, researchers, and designers must work together to increase understanding of the youth experience with pervasive computing technologies and provide greater access to these systems and applications in the formal schooling context.
Abstract: For research on pervasive computing technologies and youth to be truly significant, we must ask why mobile devices and social media applications are much less pervasive in the classroom than in other parts of youth life. Mobile devices and social media have considerable potential for learning, from both the individual-skills and socialization perspectives. However, acceptable-use policies have limited the use of mobile devices on school campuses as a response to the risks schools face in dealing with disruptive or harmful speech. Certain perceived risks and observed problems with regard to youth online underlie educators' attitudes toward pervasive technologies in formal learning settings. Educators, researchers, and designers must work together to increase understanding of the youth experience with pervasive computing technologies and provide greater access to these systems and applications in the formal schooling context.