Results 1 - 10
of
139
The Interactive Workspaces Project: Experiences with Ubiquitous Computing Rooms
, 2002
"... The interactive workspaces project explores new possibilities for people working together in technology-rich spaces. The project focuses on augmenting a dedicated meeting space with large displays, wireless or multimodal devices, and seamless mobile appliance integration. ..."
Abstract
-
Cited by 376 (12 self)
- Add to MetaCart
The interactive workspaces project explores new possibilities for people working together in technology-rich spaces. The project focuses on augmenting a dedicated meeting space with large displays, wireless or multimodal devices, and seamless mobile appliance integration.
Service discovery in pervasive computing environments
- IEEE Pervasive Computing
, 2005
"... Abstract: Service discovery is an essential task in pervasive computing environments. Simple and efficient service discovery enables heterogeneous and ubiquitous computing devices and services to be easier to use. Service integration uses services as building blocks to achieve complex services. We d ..."
Abstract
-
Cited by 117 (9 self)
- Add to MetaCart
(Show Context)
Abstract: Service discovery is an essential task in pervasive computing environments. Simple and efficient service discovery enables heterogeneous and ubiquitous computing devices and services to be easier to use. Service integration uses services as building blocks to achieve complex services. We describe service discovery and service integration, analyze design issues, and categorize the service discovery protocols. Keywords: Service Discovery, Service Integration, Service Security. In 1991, Mark Weiser coined the term ubiquitous computing, which is also called pervasive computing. In pervasive computing environments, people are surrounded by a variety of computing devices. Those devices communicate with each other and provide information “at a glance ” without our “active attention ” [1]. Presently, PCs, notebooks, cell phones, and Personal Data Assistants (PDAs) surround us. In the near future, additional networked computers, ranging from tiny sensors to extremely dynamic and powerful devices will provide a variety of information and services. It becomes overwhelming to manage these devices, configure different kinds of applications, and dynamically find the available computing services in such pervasive computing environments. Service discovery protocols enable computers to be easier to use. They facilitate interaction between
Moving on from weiser’s vision of calm computing: Engaging ubicomp experiences
- In Ubicomp
, 2006
"... Abstract. A motivation behind much UbiComp research has been to make our lives convenient, comfortable and informed, following in the footsteps of Weiser’s calm computing vision. Three themes that have dominated are context awareness, ambient intelligence and monitoring/tracking. While these avenues ..."
Abstract
-
Cited by 90 (3 self)
- Add to MetaCart
(Show Context)
Abstract. A motivation behind much UbiComp research has been to make our lives convenient, comfortable and informed, following in the footsteps of Weiser’s calm computing vision. Three themes that have dominated are context awareness, ambient intelligence and monitoring/tracking. While these avenues of research have been fruitful their accomplishments do not match up to anything like Weiser’s world. This paper discusses why this is so and argues that is time for a change of direction in the field. An alternative agenda is outlined that focuses on engaging rather than calming people. Humans are very resourceful at exploiting their environments and extending their capabilities using existing strategies and tools. I describe how pervasive technologies can be added to the mix, outlining three areas of practice where there is much potential for professionals and laypeople alike to combine, adapt and use them in creative and constructive ways.
Smart Identification Frameworks for Ubiquitous Computing
- Applications,” Wireless Networks
, 2004
"... Abstract. We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe such technologies and their potential application areas, then give an overview of some of the applications we have develop ..."
Abstract
-
Cited by 66 (1 self)
- Add to MetaCart
(Show Context)
Abstract. We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe such technologies and their potential application areas, then give an overview of some of the applications we have developed. Based on the experience we have gained from developing these systems, we point out design concepts that we have found useful for structuring and implementing such applications. Building upon these concepts, we have created two frameworks based on Jini (i.e., distributed Java objects) and Web Services to support the development of ubiquitous computing applications that make use of smart identification technology. We describe our prototype frameworks, discuss the underlying concepts and present some lessons learned.
Access control for Active Spaces
- In Proceedings of the Annual Computer Security Applications Conference (ACSAC), pages 343–352, Las Vegas, NV
, 2002
"... Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates collaboration between users, and promotes greater levels of interaction between users and devices. An Active Space can be con ..."
Abstract
-
Cited by 55 (4 self)
- Add to MetaCart
(Show Context)
Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates collaboration between users, and promotes greater levels of interaction between users and devices. An Active Space can be configured for different types of applications at different times. We present an access control system that automates the creation and enforcement of access control policies for different configurations of an Active Space. Our system explicitly recognizes different modes of cooperation between groups of users, and the dependence between physical and virtual aspects of security in Active Spaces. Our model provides support for both discretionary and mandatory access control policies, and uses role-based access control techniques for easy administration of users and permissions. We dynamically assign permissions to user roles based on context information. With the help of an example scenario, we show how we can create dynamic protection domains. This allows administrators and application developers the ability to customize access control policies on a need-toprotect basis. We also provide a semi-formal specification and analysis of our model and show how we preserve safety properties in spite of dynamic changes to access control permissions. We also show how our model preserves the principle of least privilege, promotes separation of duty, and prevents rights-amplification. 1.
Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services
- In First International Conference on Pervasive Computing and Communications
, 2003
"... In pervasive computing environments, powerful handheld devices with wireless connections create opportunities for many new nomadic applications. We propose a new service discovery model, called Splendor, supporting nomadic users and services in public environments. Splendor emphasizes security and s ..."
Abstract
-
Cited by 44 (5 self)
- Add to MetaCart
(Show Context)
In pervasive computing environments, powerful handheld devices with wireless connections create opportunities for many new nomadic applications. We propose a new service discovery model, called Splendor, supporting nomadic users and services in public environments. Splendor emphasizes security and supports privacy. Location awareness is integrated for location dependent services discovery and is used to lessen service discovery network infrastructure requirements. We analyze the Splendor system performance and provide our experimental results. 1.
Patch Panel: Enabling Control-Flow Interoperability in Ubicomp Environments
- In Proc. of PerCom 2004
"... Ubiquitous computing environments accrete slowly over time rather than springing into existence all at once. Mechanisms are needed for incremental integration— the problem of how to incrementally add or modify behaviors in existing ubicomp environments. Examples include adding new input modalities a ..."
Abstract
-
Cited by 30 (4 self)
- Add to MetaCart
(Show Context)
Ubiquitous computing environments accrete slowly over time rather than springing into existence all at once. Mechanisms are needed for incremental integration— the problem of how to incrementally add or modify behaviors in existing ubicomp environments. Examples include adding new input modalities and choreographing the behavior of existing independent applications. The iROS Event Heap, via its publish-subscribe coordination mechanism, provides the foundation for interoperation through event intermediation, but does not directly provide facilities for expressing these intermediations. The Patch Panel provides a general facility for retargeting event flow. Intermediations can be expressed as simple event translation mappings or as more complex finitestate machines. We describe an implemented prototype of the Patch Panel, including examples of its use drawn from real life applications in production use in the iRoom ubiquitous computing environment. 1.
A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous Computing Environments
- Computer
, 2002
"... Abstract. We present a unified model of everyday privacy in ubiquitous computing environments, designed to aid system designers and administrators in conceptualizing the end-user privacy experience. The model accounts for the influence of societal-scale forces, contextual factors, and subjective per ..."
Abstract
-
Cited by 27 (1 self)
- Add to MetaCart
(Show Context)
Abstract. We present a unified model of everyday privacy in ubiquitous computing environments, designed to aid system designers and administrators in conceptualizing the end-user privacy experience. The model accounts for the influence of societal-scale forces, contextual factors, and subjective perception on end-user privacy. We identify notice and consent as the fair information practices of greatest everyday utility to users, as they gradually engender the user’s conceptual model of ubicomp privacy. Navigating the regular deluge of personal information collection events in ubicomp requires that notice be minimally intrusive and consent be implicitly granted by a persistent, situation-specific set of user preferences. We extend our model into an interactional metaphor called situational faces, designed to mitigate the complexity of privacy for the end-user. When encountering a situation, a user engages the appropriate face, a metaphorical abstraction of a set of privacy preferences. 1
Criteria, strategies and research issues of context-aware ubiquitous learning
- Educational Technology and Society
"... use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear the full citation on the first page. Copyrights for components of this work owned by others than IFETS must be honoured. Abstracting with credit is permitted. To copy o ..."
Abstract
-
Cited by 25 (5 self)
- Add to MetaCart
(Show Context)
use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear the full citation on the first page. Copyrights for components of this work owned by others than IFETS must be honoured. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from the editors at kinshuk@ieee.org.