Pervasive Computing: What is it good for? Andrew C. Huang, Benjamin C. Ling, Shankar Ponnekanti, Armando Fox Stanford University.

Slides:



Advertisements
Similar presentations
Business process engineering: an overview The goal of business process engineering (BPE) is to define architectures that will enable a business to use.
Advertisements

Annual Conference of ITA ACITA 2009 Realising Management and Composition of Self-Managed Cells in Body Area Networks Alberto Schaeffer-Filho, Emil Lupu,
Ch:8 Design Concepts S.W Design should have following quality attribute: Functionality Usability Reliability Performance Supportability (extensibility,
Component Oriented Programming 1 Chapter 2 Theory of Components.
Database Systems: Design, Implementation, and Management Tenth Edition
© 2010 Bennett, McRobb and Farmer1 Use Case Description Supplementary material to support Bennett, McRobb and Farmer: Object Oriented Systems Analysis.
FIU Chapter 7: Input/Output Jerome Crooks Panyawat Chiamprasert
Rule Based Systems Michael J. Watts
Conquering Complex and Changing Systems Object-Oriented Software Engineering TJSS System Design Lecture 12 Päivi Ovaska.
© 2005 Prentice Hall7-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
Software Requirements
1 STRUCTURE CHARTS Elements and Definitions. 2 Software System Design translates SRS into a ===> software system architecture: –system’s static structure.
Architectural Support for Operating Systems. Announcements Most office hours are finalized Assignments up every Wednesday, due next week CS 415 section.
Pervasive Computing: What is it good for? Andrew C. Huang et all Stanford University Presented by Kalpana Banerjee.
CS 290C: Formal Models for Web Software Lecture 6: Model Driven Development for Web Software with WebML Instructor: Tevfik Bultan.
Dr. Kalpakis CMSC 461, Database Management Systems Introduction.
Data: A collection of raw facts and figures. It may consist of numbers, characters, symbols or pictures. Information: Organized and processed form of.
From Desktop to Wearable to Testing Belgium Testing Days 2015 Alfonso Nocella, Maveryx.
Fundamentals of Python: From First Programs Through Data Structures
FPR Presentation Team Frij
Presented by Tao HUANG Lingzhi XU. Context Mobile devices need exploit variety of connectivity options as they travel. Operating systems manage wireless.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
Architectural Design.
Chapter 10 Architectural Design
Introduction to the Enterprise Library. Sounds familiar? Writing a component to encapsulate data access Building a component that allows you to log errors.
THE NEXT STEP IN WEB SERVICES By Francisco Curbera,… Memtimin MAHMUT 2012.
Aurora: A Conceptual Model for Web-content Adaptation to Support the Universal Accessibility of Web-based Services Anita W. Huang, Neel Sundaresan Presented.
INTERNET DATA FLOW Created by David Whitchurch for ISDS 4120 Louisiana State University.
Introduction: Databases and Database Users
Database Systems: Design, Implementation, and Management Ninth Edition
M1G Introduction to Database Development 6. Building Applications.
Android - Project Green basket Android Application * Let's you do your grocery shopping location based. * Let's you decide to go to the closest grocery.
Lecture 9: Chapter 9 Architectural Design
GEOREMINDERS ANDROID APPLICATION BY: ADRIENNE KECK.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
User Datagram Protocol (UDP) Chapter 11. Know TCP/IP transfers datagrams around Forwarded based on destination’s IP address Forwarded based on destination’s.
Distributed Information Retrieval Using a Multi-Agent System and The Role of Logic Programming.
1 Welcome to CSC 301 Web Programming Charles Frank.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
1 Geospatial and Business Intelligence Jean-Sébastien Turcotte Executive VP San Francisco - April 2007 Streamlining web mapping applications.
Internetworking Concept and Architectural Model
Internetworking Concept and Architectural Model Chapter 3.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
Lesson Overview 3.1 Components of the DBMS 3.1 Components of the DBMS 3.2 Components of The Database Application 3.2 Components of The Database Application.
Database Systems DBMS Environment Data Abstraction.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
ITGS Networks. ITGS Networks and components –Server computers normally have a higher specification than regular desktop computers because they must deal.
Elmasri and Navathe, Fundamentals of Database Systems, Fourth Edition Copyright © 2004 Pearson Education, Inc. Slide 2-1 Data Models Data Model: A set.
Example: object diagram for Scheduler, v What is wrong with this diagram? Seems like a lot of similarity between Task and UnplannedTask Can use.
Software Design: Principles, Process, and Concepts Getting Started with Design.
An Architecture to Support Context-Aware Applications
Department of Industrial Engineering Sharif University of Technology Session# 7.
USER DOCUMENTATION Zaheer Shaikh Noshaba Bakht Eric Tse Mayyapan Ramaswamy.
Full and Para Virtualization
1 The Hotspot Menu. 2 The Hotspot Menu Hotspot The GD eSeries Hotspot application is a captive portal solution that can be run over a wireless (or wired)
Chapter 9 Web Application Design. Objectives Describe the MVC design pattern as used with Web applications Explain the role and responsibilities of each.
UDP: User Datagram Protocol Chapter 12. Introduction Multiple application programs can execute simultaneously on a given computer and can send and receive.
Layers Architecture Pattern Source: Pattern-Oriented Software Architecture, Vol. 1, Buschmann, et al.
COMPUTER NETWORKS CS610 Lecture-22 Hammad Khalid Khan.
Information Technology Part 2. Part2-2 Next Three Chapters Copyright © 2016 Pearson Education, Inc. Chapter 4 discusses hardware, software, and mobile.
Dr. Ir. Yeffry Handoko Putra
Chapter 2 Database System Concepts and Architecture
Software Design and Architecture
Distribution and components
CHAPTER 2 CREATING AN ARCHITECTURAL DESIGN.
Data and Computer Communications by William Stallings Eighth Edition
Tiers vs. Layers.
Single Page Architecture (SPA)
Presentation transcript:

Pervasive Computing: What is it good for? Andrew C. Huang, Benjamin C. Ling, Shankar Ponnekanti, Armando Fox Stanford University

MobiDE - Seattle, WA August 20, 1999 “Buy drinks by Friday” - Take out the last can of soda - Swipe the can’s UPC label, which adds soda to your shopping list - Make a note that you need soda for the guests you are having over this weekend

MobiDE - Seattle, WA August 20, 1999 “Buy drinks by Friday” - Approach a local supermarket - AutoPC informs you that you are near a supermarket - Opportunistic reminder: “If it is convenient, stop by to buy drinks.”

MobiDE - Seattle, WA August 20, 1999 “Buy drinks by Friday” - Friday rolls around and you have not bought drinks - Also informs you that drinks are on sale - Deadline-based reminder sent to your pager

MobiDE - Seattle, WA August 20, 1999 “Buy drinks by Friday”

MobiDE - Seattle, WA August 20, 1999 What do we do with all this information? We are constantly receiving information The problem: –Information is only received once or twice –It is not received when and where we need it A possible solution: –Place information into the context in which it will be most useful –Devices accept and/or deliver information

MobiDE - Seattle, WA August 20, 1999 Rome manages the information The devices are available What is missing is the software framework Rome is an architecture that addresses the information management problem –Incorporates pervasive computing devices into the system as information managers –Introduces an abstraction to describe context- sensitive information

MobiDE - Seattle, WA August 20, 1999 Incorporating devices into the network Enables communication among devices Gives devices access to Internet services –Unwieldy datasets (e.g., UPC database) –Rapidly-changing data (e.g., product pricing) –Computationally intensive (e.g., mapping) Must deal with device heterogeneity –Limitations: connectivity, computation, UI, etc. –Devices have a permanent representative

MobiDE - Seattle, WA August 20, 1999 Describing context- sensitive information A trigger is a piece of data bundled with contextual information –Conceptually, it is an action that is taken when a certain condition is satisfied Condition: (location  R)  (t  T 1 )  (t  T 2 ) Data: “You are passing a grocery store at R. You might want to buy drinks for Friday.” Note: similar to database triggers –Difference: trigger management is decentralized

MobiDE - Seattle, WA August 20, 1999 Rome Architecture Frontend: handles the entering of triggers into the system Unit Manager: acts as a permanent representative of a device Trigger Manager: accepts, stores, and forwards triggers

MobiDE - Seattle, WA August 20, 1999 Rome Architecture Trigger Acceptor: accepts triggers from the Unit Manager Trigger Handler: evaluates trigger conditions and executes appropriate data handlers

MobiDE - Seattle, WA August 20, 1999 Rome Architecture GPS- enbaled AutoPC Bar-code scanner

MobiDE - Seattle, WA August 20, 1999 Open Questions Trigger consistency –Deleting triggers once a high-level task is accomplished User interface and semantic translation –Translating high-level requests into triggers Multiple users –Sharing the system in the public infrastructure –Adding a trigger to be seen by another user

MobiDE - Seattle, WA August 20, 1999 Summary Information management applications are a natural target for pervasive computing Rome provides an extensible framework and some basic building blocks –Communication –Leveraging Internet services –Triggers abstraction

Andrew C. Huang, Benjamin C. Ling, Shankar Ponnekanti, Armando Fox