The Context Fabric An Infrastructure for Context-Aware Computing Jason I. Hong G r o u p f o r User Interface Research University of California Berkeley.

Slides:



Advertisements
Similar presentations
TU e technische universiteit eindhoven / department of mathematics and computer science Modeling User Input and Hypermedia Dynamics in Hera Databases and.
Advertisements

Context and Context- Aware Computing Omar Khan CS260, Fall 2006.
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California.
Multi-Mode Survey Management An Approach to Addressing its Challenges
Beyond Prototypes: Challenges in Deploying Ubiquitous Systems N. Davies and H. Gellersen IEEE pervasive computing, 2002 Presenter: Min Zhang
Page 1 SIXTH SENSE TECHNOLOGY Presented by: KIRTI AGGARWAL 2K7-MRCE-CS-035.
Management Information Systems, Sixth Edition
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Reference: [1] TeamSpace paper
Ubiquitous Computing Computers everywhere. Agenda Old future videos
Real-Time Systems and the Aware Home Anind K. Dey Ubiquitous Computing Future Computing Environments.
CSE5610 Intelligent Software Systems Semester 1 Enabling Intelligent Systems in Pervasive Computing.
1 Personal Activity Coordinator (PAC) Xia Hong UC Berkeley ISRG retreat 1/11/2000.
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
Context-Aware Computing
Location Privacy Christopher Pride. Readings Location Disclosure to Social Relations: Why, When, and What People Want to Share Location Disclosure to.
Sharena Paripatyadar.  What are the differences?
Confab Tutorial Jason I. Hong Chris Beckmann Jeff Heer Alan Newberger G r o u p f o r User Interface Research University of California Berkeley.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
Databases From A to Boyce Codd. What is a database? It depends on your point of view. For Manovich, a database is a means of structuring information in.
INFORMATION SYSTEMS Overview
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 09. Review Introduction to architectural styles Distributed architectures – Client Server Architecture – Multi-tier.
Submitted by:- Vinay kr. Gupta Computer Sci. & Engg. 4 th year.
Modeling Privacy Control in Context- Aware Systems Jiang et. Al University of California, Berkeley Ubicomp class reading Presented by BURT.
Databases From A to Boyce Codd. What is a database? It depends on your point of view. For Manovich, a database is a means of structuring information in.
CPET 565 Mobile Computing Systems Context-Aware Computing (2) Lecture 11 Hongli Luo Indiana University-Purdue University Fort Wayne.
A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications Adrian A. de Freitas Dey, Anind K., Gregory D.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Software Architecture
CPET 565 Mobile Computing Systems Context-Aware Computing Lecture 10 Hongli Luo Indiana University-Purdue University Fort Wayne.
An Architecture for Privacy-Sensitive Ubiquitous Computing By Jason I-An Hong In MobiSYS ’04: Proceedings of the 2nd international conference on mobile.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Mobile and Location-Based Services Jason I. Hong Product Design and Usability April
The Second Life of a Sensor: Integrating Real-World Experience in Virtual Worlds using Mobile Phones Mirco Musolesi, Emiliano Miluzzo, Nicholas D. Lane,
An Architecture to Support Context-Aware Applications
Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing Xiaodong Jiang Jason I. Hong James A. Landay G r o u p f o r.
Information Dynamics & Interoperability Presented at: NIT 2001 Global Digital Library Development in the New Millennium Beijing, China, May 2001, and DELOS.
Digital Libraries1 David Rashty. Digital Libraries2 “A library is an arsenal of liberty” Anonymous.
Back office integration for better E-government services Crossroads Bank for Social Security Frank Robben General manager Crossroads Bank for Social Security.
The Context Fabric Scalability and Privacy for Context-Aware Computing Jason I. Hong G r o u p f o r User Interface Research University of California Berkeley.
1 Mobile Application Doug Vogel Professor (Chair) of IS City University of Hong Kong.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
1/14/ :59 PM1/14/ :59 PM1/14/ :59 PM Research overview Koen Victor, 12/2007.
SAPIR Search in Audio-Visual Content using P2P Information Retrival For more information visit: Support.
Introduction to HCI Lecture #1.
An Ontology-based Approach to Context Modeling and Reasoning in Pervasive Computing Dejene Ejigu, Marian Scuturici, Lionel Brunie Laboratoire INSA de Lyon,
Feb 12, ECET 581/CPET/ECET 499 Mobile Computing Technologies & Apps Context Aware Computing 3 of 3 Lecture 12 Paul I-Hai Lin, Professor Electrical.
Anywhere, Anytime, Anydevice Interfaces: Tools, Infrastructure, & Applications Summer 2002 BID/HCC Retreat for User Interface Research Group Prof. James.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
The Cricket Location-Support System N. Priyantha, A. Chakraborty, and H. Balakrishnan MIT Lab for Computer Science MOBICOM 2000 Presenter: Kideok Cho
C ONTEXT AWARE SMART PHONE YOGITHA N. & PREETHI G.D. 6 th SEM, B.E.(C.S.E) SIDDAGANGA INSTITUTE OF TECHNOLOGY TUMKUR
5/29/2001Y. D. Wu & M. Liu1 Content Management for Digital Library May 29, 2001.
The Context Fabric: An Infrastructure for Context-Aware Computing Jason I. Hong Group for User Interface Research, Computer Science Division University.
Prof. James A. Landay University of Washington Spring 2008 Web Interface Design, Prototyping, and Implementation Ubicomp Design Pre-Patterns May 29, 2008.
Data Grids, Digital Libraries and Persistent Archives: An Integrated Approach to Publishing, Sharing and Archiving Data. Written By: R. Moore, A. Rajasekar,
A Context Framework for Ambient Intelligence
Is there a meeting in this room right now?
Database Management System (DBMS)
Ambient Intelligence.
DrillSim July 2005.
Presentation transcript:

The Context Fabric An Infrastructure for Context-Aware Computing Jason I. Hong G r o u p f o r User Interface Research University of California Berkeley

Apr Motivation Modern computers are divorced from our reality – Unaware of who, where, and what around them – Leads to mismatch Computers have extremely limited input – Aware of explicit input only – A lot of effort to do simple things (or to remember) Context-Aware Computing – One line of ubiquitous computing research – Making computers more aware of the physical and social situations they are embedded in

Apr Examples of Using Context Context TypesExisting ExamplesHuman Concern Room ActivityAuto Lights On / OffConvenience Personal Identity & Time File SystemsFinding Info Existing ExamplesContext Types Potential ExamplesHuman Concern ActivityFinding Info Identity & TimeSafety Time Location Activity Health Alert Tag Photos History Identity Proximity

Apr A Computational View of Context Context is a strategy for building apps Increasing the number of input channels into the computer – Pushing towards implicit acquisition of data Creating better models – Pushing towards the physical and social Using the input and models in useful ways – Automatically taking actions – Passing on the information to people

Apr Problems with Context-Awareness Scalability – Lots of people, places, things, and sensors – Over long periods of time – Over large geographic distances – Sharing resources (sensors and data) Privacy – Tremendous source of valid criticism – Need architecture and mechanisms to safeguard personal data

Apr Research Goals and Solution Overview Provide network-oriented set of abstractions, mechanisms, and programming model Scalability – Data-oriented, based on information spaces – Decentralized, high availability, with local control Privacy – Provide suite of mechanisms – Based on Fair Information Practices and Information Asymmetry

Apr Architectural Abstractions Information Spaces – Repositories of context data and operators Context Data – Representation for context data Operators – Composable code operating on context data Context Queries / Notifications – Simple API for accessing context – Push / Pull semantics

Apr Emergency Response Scenario Fire or earthquake situation Keep track of the people in a building – Allow building managers to check if a building is clear in the event of an evacuation – Allow firefighters to check where people were Provide reasonable privacy protection – People don't like to be tracked – Emergency situations relatively rare

Apr Emergency Response Scenario Info Spaces + Context Data + Operators Building InfoSpace Carol's InfoSpace Smart Dust User="Carol" Location="525 Soda Hall" Time="Apr 12 1:05PM" Access Control User="Carol" Location="5th floor" Age="37 seconds" Send location info LoggingBlurring User="Carol" Location="in" Age="37 seconds"

Apr Scalability Architecture analogous to web – Information spaces are like web servers – Information spaces contain context data Differences from web architecture – Each device contains an information space (so devices can access context even w/o net access) – Information spaces contain operators for manipulating and protecting context data

Apr Privacy – Fair Information Practices Notice Choice Onward Transfer Access Security Data Integrity Enforcement

Apr Privacy – Information Asymmetry “In all of human history, no government has ever known more about its people than our government knows about us. And in all of human history, no people have ever been anywhere near as free.” (Brin)

Apr A Privacy Design Space Collection AccessSecond Use Detection Avoidance Prevention Minimizing Asymmetry Data Lifecycle Anonymization Pseudonymization P3P Privacy Mirrors Notice, Consent, Feedback Context Support RBAC Legal Social Economic Technology

Apr Privacy Mechanisms Operators Primarily prevention and avoidance, on collection and access Garbage collectionRemove or aggregate old data BlurringIncrease ambiguity Access ControlCheck authorization LoggingDetection FiltersRemove certain data

Apr Context Queries Intentional ambiguity – "Where is Victoria?" – "Restaurant Chez Panisse" -> "Berkeley" -> "CA" – Give different answers depending on requestor Plausible deniability – "Is Adam busy?" – "Yes" or "System not available" according to prefs

Apr Evaluation Still in early-to-mid phases – Currently developing initial implementation Target applications – Suite of Emergency response apps – Augmented word-prediction for communication for disabled people "Metrics" – Types of and effectiveness of apps – Ease of adoption – Robustness

Apr The Ultimate Metric Dude, where's my car?

Jason I. Hong G r o u p f o r User Interface Research University of California Berkeley Context – the circumstances in which an event occurs; a setting; to join; to weave (American Heritage Dictionary) Thanks to: DARPA Expeditions PARC Intel Fellowship NSF ITR Grant

Apr Potential Discussion Points Architecture – Scalability – Availability vs consistency – Context representation Privacy – Philosophical underpinnings – Mechanisms Related Work – ParcTabs, Context Toolkit, EventHeap

Apr Outline  Introduction  Architectural Overview  Related Work and Design Comparison  Conclusion

Apr Functional Requirements Context Acquisition – Getting the data from a variety of sources Context Modeling – Representing the data Context Storage and Dissemination – Storing the data – Making the data available when it is needed Context Usage – Using the data in a program

Apr Context Data Problem: how to represent context data? Entities – Like nouns, people, places, and things Attributes – Like adjectives or properties, key-value pairs Relationships – How one entity relates to another entity Aggregates – Actions, Groups of people

Apr Context Data Name="Location" Value="Room 525" Schema="Building:Room" Metadata= Time=" " Time-to-Live="60sec" Source="SmartDust" Name="Device" Value= Schema="Device" Entity Attribute Relationship

Apr Context Data Physical Context Data – The context data in a specific info space – Ex. My location data might be on PDA and on PC Logical Context Data – Logical perspective on context data – Ex. My location View on Context Data – How others see my context data – Ex. Friend's view on my location vs. Stranger's view

Apr Context Data Physical Logical View My Location on PDA My Location on PC My Location to Strangers My Location to Friends My Location to Family

Apr Emergency Response Scenario Fire or earthquake situation Keep track of the people in a building – Allow building managers to check if a building is clear in the event of an evacuation – Allow firefighters to check where people were Provide reasonable privacy protection – People don't like to be tracked – Emergency situations relatively rare

Apr Functional Requirements Acquisition Modeling Storage / Dissemination Usage

Apr Functional Requirements Acquisition Modeling Storage / Dissemination Usage Scalability and Privacy

Apr Key Architectural Abstractions Information Spaces – Repositories of context data and operators Context Data – Representation for context data Operators – Composable code operating on context data Context Queries / Notifications – Simple query language (like SQL for DB) – Push / Pull semantics

Apr Architectural Sketch Information Spaces

Apr Architectural Sketch Context Data Information Spaces

Apr Architectural Sketch Context Data Information Spaces Operators

Apr Architectural Sketch Context Data Information Spaces Operators Query

Apr Architectural Sketch Context Data Information Spaces Operators Notification (Standing Query)

Apr Information Spaces Problem: where to store context data? Information Spaces analogous to web servers – Have a unique name – Have an owner – Contain multiple (and not necessarily related) pieces of data – Can get / put pieces of data (given security and privacy prefs)

Apr Emergency Response Scenario Information Spaces Building Info Space Jane's Info Space John's Info Space

Apr Emergency Response Scenario Info Spaces + Context Data Building Info Space Jane's Info Space John's Info Space Active Badge Smart Dust

Apr Operators Problem: how to manipulate context data in a reusable manner? Chainable Operators Data-type ConversionEx. Celsius -> Farenheit FusionRefine same data type CompositionMerge different data types Garbage collectionRemove or aggregate old data BlurringIncrease ambiguity Access ControlCheck authorization LoggingDetection FiltersRemove certain data

Apr Emergency Response Scenario Info Spaces + Context Data + Operators Building InfoSpace Jane's InfoSpace Active Badge User="Carol" Location="525 Soda Hall" Time="Apr 12 1:05PM" Access Control User="John" Location="Out" Age="12 hours" Send location info LoggingBlurring

Apr Context Queries Problem: how to use context data?

Apr Context Queries Intentional ambiguity – "Where is Victoria?" – "Restaurant Chez Panisse" -> "Berkeley" -> "CA" – Give different answers depending on requestor Plausible deniability – "Is Adam busy?" – "Yes" or "System not available" according to prefs

Apr Research Goals Scalability – Decentralized information spaces – Distributed context data Privacy – Access control – Blurring – Garbage collection – Intentional ambiguity – Plausible deniability

Apr Current Status Still in early-to-mid phases Currently developing initial implementation Target applications – Suite of Emergency response apps – Augmented word-prediction for communication for disabled people

Apr Outline  Introduction  Architectural Overview  Related Work and Design Comparison  Conclusion

Apr Context Toolkit EventHeap ParcTab infrastructure

Apr Outline  Introduction  Architectural Overview  Related Work and Design Comparison  Conclusion

Apr Research Contributions

Apr Takeaway Points

Jason I. Hong G r o u p f o r User Interface Research University of California Berkeley Context – the circumstances in which an event occurs; a setting; to join; to weave (American Heritage Dictionary) Thanks to: DARPA Expeditions PARC Intel Fellowship NSF ITR Grant

Apr Backup Slides

Apr Existing Examples of Using Context Context TypesExisting ExamplesHuman Concern Room ActivitySmoke AlarmSafetyRoom ActivityAuto Lights On / OffConvenienceObject IdentityBarcode ScannersEfficiency Personal Identity & Time File SystemsFinding InfoTimeCalendar RemindersMemory

Apr Technology Trends Sensors – GPS, Active Bats, Cameras – Smart Dust Recognition algorithms – MSR Radar – Smart Floor footstep force Wireless technologies – Bluetooth, , cell phones Inexpensive mass data storage

Apr Potential Examples of Using Context Existing ExamplesContext Types Potential ExamplesHuman Concern ActivityConvenience ActivityFinding Info IdentityMemory Identity & TimeSafety TimeEfficiency Identity Time Location Proximity Activity History … Health Alert Auto Cell Phone Off In Meetings Service Fleet Dispatching Tag Photos Proximal Reminders

Apr Defining Context Abowd & Dey / Moran & Dourish "Any information that can be used to characterize the situation of an entity, where an entity is a person, place, or object that is considered relevant to the interaction between a user and an application, including the user and the application themselves. Context is typically the location, identity, and state of people, groups, and computational and physical objects." – Abowd and Dey "Context refers to the physical and social situation in which computational devices are embedded" – Moran and Dourish

Apr Defining Context Distributed Cognition Distributed cognition – Need to go beyond physical attributes – Look at “state of digital resources, people’s concepts, task state, social relations, local work culture” (Kirsh context essay) – Model underlying system of states, structures, and relations – Summary: model the key attributes of the whole system, the deep structure (instead of shallow surface structure) from individuals to offices to social structs and work practices

Apr Defining Context Situated Action Situated action – actions are fluid, moment-by-moment, improvised, often unplanned, and highly context-dependent – “the context in which actions take place is what allows people to find it meaningful” (Dourish context essay)

Apr Defining Context Phenomenology Phenomenology – How people experience the world and find meaning within it – Shared meanings, common understandings – How does the meaning of the world reveal itself to us through our actions within it? – Thus, meaning (and hence context) arises from the ways in which we engage with and act within the world

Apr Defining Context My Perspective It's just like defining "information" Shannon treated it from a transmission perspective, made great inroads – And we are still debating the meaning of "information", but now we can do it electronically Treat context from computer perspective – Let designers define context app-by-app

Apr Privacy Privacy is a relatively new concept in society, and is “ultimately a psychological construct, with malleable ties to specific objective conditions” (Grudin) Convenience, Safety, Efficiency Ex. Credit cards and cell phones Open access to online calendars for efficiency and awareness (Palen)

Apr Designing Context-Aware Systems: Minimize Automatic Actions Minimize automatic actions – Cost to benefit via decision theory – Benefit is getting it "right", cost is "wrong" – Factor in likelihood of getting it "right"

Apr Designing Context-Aware Systems: Provide Feedback Provide feedback – What is being captured? – Why did the system do that? Feed-forward – If you do that, then the system will do this Confirmation – The system just did the following action

Apr Designing Context-Aware Systems: Minimize Asymmetry Asymmetry

Apr Designing Context-Aware Systems: Context-Tracking vs Context-Support MIT Cricket beacons out location info – Location-support vs Location-tracking

Apr Vision Context-Aware Computing Today

Apr Vision Context-Aware Computing in the Future January