scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Charting past, present, and future research in ubiquitous computing

TL;DR: Everyday computing is proposed, a new area of applications research, focussed on scaling interaction with respect to time, just as pushing the availiability of computing away from the traditional desktop fundamentally changes the relationship between humans and computers.
Abstract: The proliferation of computing into the physical world promises more than the ubiquitous availability of computing infrastructure; it suggest new paradigms of interaction inspired by constant access to information and computational capabilities. For the past decade, application-driven research on abiquitous computing (ubicomp) has pushed three interaction themes:natural interfaces, context-aware applications,andautomated capture and access. To chart a course for future research in ubiquitous computing, we review the accomplishments of these efforts and point to remaining research challenges. Research in ubiquitious computing implicitly requires addressing some notion of scale, whether in the number and type of devices, the physical space of distributed computing, or the number of people using a system. We posit a new area of applications research, everyday computing, focussed on scaling interaction with respect to time. Just as pushing the availiability of computing away from the traditional desktop fundamentally changes the relationship between humans and computers, providing continuous interaction moves computing from a localized tool to a constant companion. Designing for continous interaction requires addressing interruption and reumption of intreaction, representing passages of time and providing associative storage models. Inherent in all of these interaction themes are difficult issues in the social implications of ubiquitous computing and the challenges of evaluating> ubiquitious computing research. Although cumulative experience points to lessons in privacy, security, visibility, and control, there are no simple guidelines for steering research efforts. Akin to any efforts involving new technologies, evaluation strategies form a spectrum from technology feasibility efforts to long-term use studies—but a user-centric perspective is always possible and necessary

Summary (2 min read)

Introduction

  • Key words: archival description, provenance, fonds, series, Records in Contexts Izvleček: ARHIVSKO GRADIVO V KONTEKSTIH.
  • Drugi del prispevka podaja nekaj vpogledav v nov konceptualni model arhivskega popisovanja, kot ga predlaga Mednarodni arhivski svet, imenovan Arhivsko gradivo v kontekstu.
  • When someone opens scopeArchiv1, as a tool for archival description, (s)he is first surprised by the rich modules and elements expected to be implied by this activity.
  • Moreover, at the bottom of the screen, there is a large collection of tabs, which offers new possibilities of characterizing a certain unit of description, with new properties and relationships.

1 THE FOUR ICA STANDARDS

  • As it is well-known, the International Council of Archives supported and adopted, until now, four descriptive standards.
  • The standard was elaborated in order to cover the Principle 8 from Statement of Principles…, “especially in view of the increasing complexity of administrative structures, an explanation of the context in which the material was created is an important aspect of archival description”.
  • Also, in order to expand the description of context, the International Standard for Description of Functions (ISDF)3 was elaborated in 2008.
  • Based on my observations, the ICA standards recorded different stages of adoption.
  • A close scrutiny of the standards revealed many inconsistencies in definitions, elements of description and the way standards should work together (ICA/CBPS, 2012a, pp. 3- 15).

2 A BROADER VIEW OVER ARCHIVAL WORD

  • The view over the archival description universe, as seen through the lens of the four standards, was subject to some criticisms and suggestion for improvement, from minor issues to the strategic perspectives5.
  • Even more, the above cited statement about ICA intentions was received with reluctance, since it did not seem to be radical enough6.
  • The fact is that, despite a rather rich literature on the topic, beyond some positions, reflecting parochial views or some personal dissatisfactions, the evolution of archival discipline and the cultural and technical environment really raises some issues, making a case for improvement of the four standards.
  • In the following lines, I shall review some considerations raised about the provenance, archival entities, hierarchy or multilevel description—all grounding an improved perspective over archival description, as proposed by EGAD.

3 CREATION ENVIRONMENT: PROVENANCE AND ORIGINAL ORDER

  • Established since the second half of the 19th century as the basis of archival science, the Principle of Provenance (PoP) still seems today to be the main feature of archival approach (Yeo, 2010, p. 91; Mazikana, 1990), individualising archival science among other discipline in cultural or information area (Popovici B.-F. , 2007).
  • 10 ”…archives do not just happen but they are consciously shaped and sometimes distorted by archivists, the creators of records and other individuals and institutions” (Cox, 2004, p. 12).
  • That is, the “archive” will be poorer that the true scene (read ‘wall’), lacking exactly the networked input that is the essence of the social network.

4 REPRESENTATION ENVIRONMENT: HIERARCHIES AND LEVELS

  • “By default”, ISAD(G) assumes that relationships between units of description are hierarchical.
  • Today there are more technical possibilities and more needs of networked descriptions, as to make room for an ISAD(G) improvement.
  • Into account the moment in time when the Statement of Principles was adopted (1992), one can notice the IT experience in Archives was still limited (Horsman, 2002, p. 16; Eastwood, 1990, pp. 10-11), both in development and technologies, and this led to a rather simple view of “what computers can do for creating finding aids”16.
  • Somehow fuzzy, but still present, there are other criteria than provenance and original order in making a description.
  • And, despite the fact they are pertinent in ISAD(G) mind-set, it has to be noticed, if relationships among archival entities would be more flexible, it would mean that each entity should be self-sufficient, meaning, furthermore, information would be in a certain amount, repetitive20.

5 ARCHIVAL DESCRIPTIVE ENTITIES

  • At the beginning of ICA standards development of, ISAD(G) was the central element, implying that the archival description should focus on records, the true archival objects.
  • “What appears to be needed—noted G. Yeo—is a richer framework that does not require us to impose a single set of boundaries (…).
  • Each archival entity is characterised by a set of properties, some specific, some shared.
  • Activity is “a transaction or set of interrelated transactions employed in realizing the objective or objectives of a Function.

7 CONCLUSIONS

  • I dare to say it will be the four standards and much more.
  • It will allow a greater possibility of exploitation of the rich network of relations between entities, accommodating various perspectives, from pertinence to provenance, from official to participatory descriptions.
  • Well, I would say that scopeArchiv is a fake representation of ISAD(G) and ISAAR(CPF).
  • Therefore, nothing to be scared of: RiC will be ISAD(G) and much more.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: This paper surveys context awareness from an IoT perspective and addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT.
Abstract: As we are moving towards the Internet of Things (IoT), the number of sensors deployed around the world is growing at a rapid pace. Market research has shown a significant growth of sensor deployments over the past decade and has predicted a significant increment of the growth rate in the future. These sensors continuously generate enormous amounts of data. However, in order to add value to raw sensor data we need to understand it. Collection, modelling, reasoning, and distribution of context in relation to sensor data plays critical role in this challenge. Context-aware computing has proven to be successful in understanding sensor data. In this paper, we survey context awareness from an IoT perspective. We present the necessary background by introducing the IoT paradigm and context-aware fundamentals at the beginning. Then we provide an in-depth analysis of context life cycle. We evaluate a subset of projects (50) which represent the majority of research and commercial solutions proposed in the field of context-aware computing conducted over the last decade (2001-2011) based on our own taxonomy. Finally, based on our evaluation, we highlight the lessons to be learnt from the past and some possible directions for future research. The survey addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT. Our goal is not only to analyse, compare and consolidate past research work but also to appreciate their findings and discuss their applicability towards the IoT.

2,542 citations


Cites background from "Charting past, present, and future ..."

  • ...Abowd and Mynatt [78] identified the five W’s (Who, What, Where, When, Why) as the minimum information that is necessary to understand context....

    [...]

  • ...Therefore, in order to continuously track the positioning regardless of indoor or outdoor, sensor data fusion is essential [78]....

    [...]

Journal ArticleDOI
TL;DR: The field of AR is described, including a brief definition and development history, the enabling technologies and their characteristics, and some known limitations regarding human factors in the use of AR systems that developers will need to overcome.
Abstract: We are on the verge of ubiquitously adopting Augmented Reality (AR) technologies to enhance our percep- tion and help us see, hear, and feel our environments in new and enriched ways. AR will support us in fields such as education, maintenance, design and reconnaissance, to name but a few. This paper describes the field of AR, including a brief definition and development history, the enabling technologies and their characteristics. It surveys the state of the art by reviewing some recent applications of AR technology as well as some known limitations regarding human factors in the use of AR systems that developers will need to overcome.

1,526 citations


Cites background from "Charting past, present, and future ..."

  • ...ubiquitous (anytime-anywhere) computing [162] of a more natural kind [13] or even human-machine symbiosis as Licklider [99] already envisioned in the 1950‟s....

    [...]

Book
20 Oct 2001
TL;DR: Usability Engineering: Scenario-Based Development of Human-Computer Interaction as discussed by the authors focuses on the realities of product development, showing how user interaction scenarios can make usability practices an integral part of interactive system development.
Abstract: Usability Engineering: Scenario-Based Development of Human-Computer Interaction is a radical departure from traditional books that emphasize theory and address experts. This book focuses on the realities of product development, showing how user interaction scenarios can make usability practices an integral part of interactive system development. As you'll learn, usability engineering is not the application of inflexible rules; it's a process of analysis, prototyping, and problem solving in which you evaluate tradeoffs, make reasoned decisions, and maximize the overall value of your product.

1,170 citations

Proceedings ArticleDOI
30 Sep 2001
TL;DR: Six principles for guiding system design are developed, based on a set of fair information practices common in most privacy legislation in use today: notice, choice and consent, proximity and locality, anonymity and pseudonymity, security, and access and recourse.
Abstract: This paper tries to serve as an introductory reading to privacy issues in the field of ubiquitous computing. It develops six principles for guiding system design, based on a set of fair information practices common in most privacy legislation in use today: notice, choice and consent, proximity and locality, anonymity and pseudonymity, security, and access and recourse. A brief look at the history of privacy protection, its legal status, and its expected utility is provided as a background.

926 citations


Cites background or methods from "Charting past, present, and future ..."

  • ...A simple solution along similar lines was used in the Classroom 2000 project at Georgia Tech, where classroom recordings would focus on the teacher and his replies, while voices and faces of students where deliberately of low quality [2]....

    [...]

  • ...While some ubiquitous computing research projects explicitly address privacy [2, 12], so far solutions in the field have been ad-hoc and specific to the systems at hand....

    [...]

Book
31 Dec 2005
TL;DR: The "Encyclopedia of Human Computer Interaction" is the most thorough and definitive source providing coverage of everything related to the field of human computer interaction (HCI).
Abstract: The "Encyclopedia of Human Computer Interaction" is the most thorough and definitive source providing coverage of everything related to the field of human computer interaction (HCI). This encyclopedia covers a wide range of HCI related topics such as concepts, design, usability, evaluation, innovations, and applications of HCI in organizations around the globe. Hundreds of contributors and advisors from around the world have conferred their expertise to this publication, making this encyclopedia a single source of authoritative and contemporary research in field of human computer interaction. The "Encyclopedia of Human Computer Interaction" also includes coverage of real life experiences and cases of HCI and the lessons learned helping readers to learn extensively about this important field of study.

795 citations

References
More filters
Journal ArticleDOI
TL;DR: Consider writing, perhaps the first information technology: The ability to capture a symbolic representation of spoken language for long-term storage freed information from the limits of individual memory.
Abstract: Specialized elements of hardware and software, connected by wires, radio waves and infrared, will soon be so ubiquitous that no-one will notice their presence.

9,073 citations


"Charting past, present, and future ..." refers background in this paper

  • ...INTRODUCTION Weiser introduced the area of ubiquitous computing (ubicomp) and put forth a vision of people and environments augmented with computational resources that provide information and services when and where desired [Weiser 1991]....

    [...]

  • ...Weiser defined the notion of scale as a broad space of computational devices [Weiser 1991]....

    [...]

  • ...Weiser defined the notion of scale as a broad space of computa­tional devices [Weiser 1991]....

    [...]

  • ...Weiser introduced the area of ubiquitous computing (ubicomp) and put forth a vision of people and environments augmented with computational resources that provide information and services when and where desired [Weiser 1991]....

    [...]

Book
01 Jan 1997
TL;DR: Key issues in affective computing, " computing that relates to, arises from, or influences emotions", are presented and new applications are presented for computer-assisted learning, perceptual information retrieval, arts and entertainment, and human health and interaction.
Abstract: Computers are beginning to acquire the ability to express and recognize affect, and may soon be given the ability to " have emotions. " The essential role of emotion in both human cognition and perception, as demonstrated by recent neurological studies, indicates that affective computers should not only provide better performance in assisting humans, but also might enhance computers' abilities to make decisions. This paper presents and discusses key issues in " affective computing, " computing that relates to, arises from, or influences emotions. Models are suggested for computer recognition of human emotion, and new applications are presented for computer-assisted learning, perceptual information retrieval, arts and entertainment, and human health and interaction. Affective computing, coupled with new wear-able computers, will also provide the ability to gather new data necessary for advances in emotion and cog-nition theory. Nothing in life is to be feared. It is only to be understood. – Marie Curie Emotions have a stigma in science; they are believed to be inherently non-scientific. Scientific principles are derived from rational thought, logical arguments, testable hypotheses, and repeatable experiments. There is room alongside science for " non-interfering " emotions such as those involved in curiosity, frustration, and the pleasure of discovery. In fact, much scientific research has been prompted by fear. Nonetheless, the role of emotions is marginalized at best. Why bring " emotion " or " affect " into any of the deliberate tools of science? Moreover, shouldn't it be completely avoided when considering properties to design into computers? After all, computers control significant parts of our lives – the phone system, the stock market, nuclear power plants, jet landings, and more. Who wants a computer to be able to " feel angry " at them? To feel contempt for any living thing? In this essay I will submit for discussion a set of ideas on what I call " affective computing, " computing that relates to, arises from, or influences emotions. This will need some further clarification which I shall attempt below. I should say up front that I am not proposing the pursuit of computerized cingulotomies 1 or even into the business of building " emotional computers ". 1 The making of small wounds in the ridge of the limbic system known as the cingulate gyrus, a surgical procedure to aid severely depressed patients. Nor will I propose answers to the difficult and intriguing questions , " …

5,700 citations


"Charting past, present, and future ..." refers background in this paper

  • ...Sensing other forms of contextual information that could give an indication of a person’s affective state [Picard 1997], such as body temperature, heart rate, and galvanic skin response, may be a useful place to start....

    [...]

  • ...Sensing other forms of contextual information that could give an indication of a person s affec­tive state [Picard 1997], such as body temperature, heart rate, and galvanic skin response, may be a useful place to start....

    [...]

Journal Article
TL;DR: In this article, the authors propose that specialized elements of hardware and software, connected by wires, radio waves and infrared, will soon be so ubiquitous that no-one will notice their presence.
Abstract: Specialized elements of hardware and software, connected by wires, radio waves and infrared, will soon be so ubiquitous that no-one will notice their presence

5,041 citations

Journal ArticleDOI
TL;DR: A novel system for the location of people in an office environment is described, where members of staff wear badges that transmit signals providing information about their location to a centralized location service, through a network of sensors.
Abstract: A novel system for the location of people in an office environment is described. Members of staff wear badges that transmit signals providing information about their location to a centralized location service, through a network of sensors. The paper also examines alternative location techniques, system design issues and applications, particularly relating to telephone call routing. Location systems raise concerns about the privacy of an individual and these issues are also addressed.

4,315 citations

Proceedings ArticleDOI
27 Mar 1997
TL;DR: Tangible Bits allows users to "grasp & manipulate" bits in the center of users’ attention by coupling the bits with everyday physical objects and architectural surfaces and ambient media for background awareness.
Abstract: This paper presents our vision of Human Computer Interaction (HCI): "Tangible Bits." Tangible Bits allows users to "grasp & manipulate" bits in the center of users’ attention by coupling the bits with everyday physical objects and architectural surfaces. Tangible Bits also enables users to be aware of background bits at the periphery of human perception using ambient display media such as light, sound, airflow, and water movement in an augmented space. The goal of Tangible Bits is to bridge the gaps between both cyberspace and the physical environment, as well as the foreground and background of human activities. This paper describes three key concepts of Tangible Bits: interactive surfaces; the coupling of bits with graspable physical objects; and ambient media for background awareness. We illustrate these concepts with three prototype systems ‐ the metaDESK, transBOARD and ambientROOM ‐ to identify underlying research issues.

3,885 citations


"Charting past, present, and future ..." refers background in this paper

  • ...More recently, researchers have suggested techniques for using objects in the physical world to manipulate electronic artifacts, creating so-called grasp­able [Fitzmaurice et al. 1995] or tangible user interfaces [Ishii and Ullmer 1997]....

    [...]

  • ...Ishii s work in tangible media explores using natural inter­faces to support communication and background awareness [Ishii and Ullmer 1997]....

    [...]

Frequently Asked Questions (10)
Q1. What contributions have the authors mentioned in the paper "Charting past, present, and future research in ubiquitous computing" ?

To chart a course for future research in ubiquitous computing, the authors review the accomplishments of these efforts and point to remaining research challenges. 

Commercial streaming products, such as RealNetworks G2/SMILy and Microsoft’s MediaPlayer/ASFy, are emerging standards to allow for powerful synchronization of programmer-defined media streams. 

—Associative models of information are needed: Hierarchical models of information are a good match for well-defined tasks, while models of information for activities are principally associative, since information is often reused on multiple occasions, from multiple perspectives. 

The two systems, PhoneSlave and Xcapture, treated audio as uninterpreted data and were successful using simple techniques to provide informative overviews of live conversations. 

When recognition errors occur, the initial reaction of system designers is to try to eliminate them, e.g., by improving recognition accuracy. 

As computing becomes more ubiquitously available, it is imperative that the tools offered reflect their role in longer-term activities. 

Mynatt et al. [1998] point to the common design challenge of creating a believable experience with context-aware interfaces noting that the responsiveness of the interface is key to the person associating additional displays with their movements in the physical world. 

Van Buskirk and LaLomia [1995] found that a reduction of 5–10% in the absolute error rate is necessary before the majority of people will even notice a difference in a speech recognition system. 

Although versioning is not a new problem to computer scientists, there are numerous challenges in providing an intuitive interface to multiple versions of captured material, especially when some of the material is already time-based such as audio and video. 

The emergence of low-cost capture hardware, such as the CrossPady and the mimioy from Virtual Ink, will lead more researchers to work in this area.