Nothing Special   »   [go: up one dir, main page]

Ubiquitous Computing

Download as pdf or txt
Download as pdf or txt
You are on page 1of 37

INTRODUCTION

In an era defined by rapid technological advancement, our world is undergoing a


profound transformation. Imagine a reality where computing power seamlessly
blends into the fabric of our everyday lives, where digital technology becomes an
invisible, indispensable companion, enhancing our efficiency, convenience, and
overall well-being. This vision, often referred to as "Ubiquitous Computing" or
"Ubicomp," is not a distant future; it is our present reality, and it promises to shape
our future in unprecedented ways.
The word “ubiquitous” can be defined as “existing or being everywhere at the
same time,” “constantly encountered,” and “widespread.” When applying this
concept to technology, the term ubiquitous implies that technology is everywhere
and we use it all the time. Because of the pervasiveness of these technologies, we
tend to use them without thinking about the tool. Instead, we focus on the task at
hand, making the technology effectively invisible to the user. Ubiquitous
technology is often wireless, mobile, and networked, making its users more
connected to the world around them and the people in it.
Ubiquitous Computing represents a paradigm shift in how we interact with and
harness the potential of computing technology. It is a concept that transcends
traditional computing environments and extends the reach of computation beyond
conventional computing devices, such as desktop computers or smartphones.
Instead, it envisions a world where computing power is embedded in the very
fabric of our environment, seamlessly integrated into everyday objects, and
responsive to our needs and desires.
At its core, Ubiquitous Computing is guided by a set of fundamental principles
that prioritize invisibility, context-awareness, and scalability. It envisions a world
where technology fades into the background, allowing individuals to focus on
their tasks and goals rather than the tools themselves. It leverages contextual
information to provide tailored and adaptive services, making technology work
for us rather than the other way around. And it scales gracefully to accommodate
an ever-expanding array of devices and services, creating a dynamic ecosystem
that evolves with our needs.
Throughout this seminar, we will delve into the historical roots of Ubiquitous
Computing, exploring the visionary ideas of pioneers such as Mark Weiser, who
foresaw a world where "the most profound technologies are those that disappear."
We will examine the foundational technologies that underpin Ubicomp, from the
Internet of Things (IoT) and sensor networks to wireless communication
protocols, and understand how these elements converge to create a seamless and
interconnected computing environment.
Furthermore, we will explore the myriad applications of Ubiquitous Computing
across various domains, from healthcare and transportation to smart homes and
retail. By examining real-world examples and case studies, we will gain insights
into how Ubicomp is already transforming industries and improving our quality
of life.
However, as with any transformative technology, Ubiquitous Computing also
brings forth its share of challenges and concerns. Privacy, security, and ethical
considerations loom large in this landscape, and it is imperative that we address
these issues as we chart the course for Ubicomp's future.
As we navigate this seminar, we invite you to embark on a journey into the heart
of Ubiquitous Computing—a world where technology quietly and effectively
serves as our digital ally, enriching our lives in ways previously unimaginable.
Together, we will explore its promises, its potential, and its perils, all with the aim
of understanding how Ubiquitous Computing is reshaping the way we live, work,
and connect in our increasingly digitalized world.

WHAT IS UBIQUITOUS COMPUTING?


ubiquitous computing is the method of enhancing computing use by making many
devices (services) available throughout the physical environment, but making
them effectively invisible to the user. Computers become a useful but invisible
force, assisting the user in meeting his needs without getting lost in the way. tries
to construct a universal computing environment (UCE) that conceals (hides)
• computing instruments
• devices
• resources
• technology
many embedded, wearable, handheld devices communicate transparently to
provide different services to the users based on requirements. these devices
mostly have low power and shortrange wireless communication capabilities.
devices utilize multiple on-board sensors to gather information about surrounding
environments.
CHARACTERISTICS OF UBIQUITOUS COMPUTING
1. Invisibility: Ubicomp aims to make computing technology nearly invisible
in the user's experience. It seeks to integrate computational capabilities into
the environment to the point where users are no longer aware of their
interaction with technology. In this paradigm, technology recedes into the
background, allowing users to focus on their tasks and activities without
distraction.
2. Context Awareness: Ubicomp systems are designed to be context-aware,
meaning they can sense and respond to changes in their environment or user
behaviour. Context encompasses factors such as location, time, user
preferences, and environmental conditions. By understanding context,
Ubicomp systems can adapt and provide relevant services in real-time.
3. Interconnectedness: Ubicomp environments consist of interconnected
devices, sensors, and services that communicate and collaborate seamlessly.
This interconnectedness enables a holistic computing experience, where data
and functionality can flow seamlessly between devices and systems. It
fosters an ecosystem where individual components work together to enhance
the overall user experience
4. Scalability: Ubicomp systems are highly scalable, capable of
accommodating an ever-expanding array of interconnected devices and
services. They can grow and adapt to incorporate new innovations, allowing
for continuous expansion and evolution as technology advances.
5. Enhanced User Experience: The primary objective of Ubicomp is to
improve the user experience by simplifying tasks, increasing convenience,
and optimizing efficiency. Ubicomp technologies are intended to enhance the
quality of life by seamlessly integrating into daily routines and making
technology more intuitive and user-centric.
6. Natural User Interfaces: Ubicomp promotes the use of natural and intuitive
user interfaces. These interfaces aim to make interacting with technology as
effortless and human-centric as possible. Voice commands, gesture
recognition, and touch interfaces are examples of natural user interfaces that
enable users to interact with Ubicomp systems in ways that feel intuitive and
familiar.
7. Data-Centric: Data plays a central role in Ubicomp. Sensors and devices
collect vast amounts of data about the environment and user interactions.
This data is processed, analyzed, and used to make informed decisions and
provide personalized services. Data privacy and security are critical
considerations in Ubicomp implementations.
8. Distributed Computing: Ubicomp relies on distributed computing models.
Computation and processing occur not only on local devices but also in the
cloud. This distribution of computing resources enables Ubicomp systems to
leverage the power of cloud infrastructure for data storage, analysis, and
remote management.
9. Human-Centered Design: Ubicomp prioritizes human-centered design
principles. It places the user's needs and preferences at the forefront of
system development. User-centric design ensures that technology seamlessly
integrates into people's lives while addressing their specific requirements and
concerns.
10.Permanency: The information remains unless the user purposely remove it.
user can never lose their work.
11.Accessibility: The information is always available whenever the user need
to use it. System access via ubiquitous computing technologies
12.Immediacy: information can be retrieved immediately by the user .thus it
saves users time and resources .ubicomp makes information sharing and
getting an easy task.

HISTORY
History of ubiquitous computing
The term Ubiquitous Computing was coined and introduced by the late Mark
Weiser (1952 -1999). He worked at the Xerox Palo Alto Research Center (PARC,
now an inde- pendent organization). PARC was more or less the birthplace of
many developments that marked the PC era, such as the mouse, windows-based
user interfaces and the desktop metaphor (note that Xerox STAR preceded the
Apple Lisa, which again preceded Microsoft Windows), laser printers, many
concepts of computer supported cooperative work (CSCW) and media spaces,
and much more. This success is contributed (among other reasons) to the fact that
PARC man- aged to integrate technology research and humanities research
(computer science and human factors in particular) in a truly interdisciplinary
way.
Weiser concentrated so much on user aspects that quite a number of his first
prototypes were mere mock ups: during corresponding user studies, users had to
imagine the technology side of the devices investigated and focus on use cases,
ideal form factors and desired features, integration into a pretend intelligent
environment, etc.
MARK WEISERS THREE KEY DEVICES
These complementary UC devices were prototyped at his lab; investigated in the
context of PARCs typical creative, team-oriented setting, all three were thought
as electronic replacements for the common analog information appliances.
Xerox Pad:
The Xerox Pad can be considered to be the prototype and father of present PDAs,
introduced even before the Apple Newton appeared in 1993. The initial concept
was that of an electronic equivalent to inch-size information bearers, namely
PostIt Notes: easy to create and to stick almost every- where, available in large
quantities. As the PDA analogy suggests, the prototypes had a lot more
functionality than PostIt Notes but were also a lot more expensive and
cumbersome to handle by design (not only due to short and mid-term technology
limitations).

fig: XEROX PAD

Xerox ’Tab’:
The Xerox Tab can be considered to be the prototype and father of present Tablet
PCs. The analogy from the traditional world was that of a foot-size information
bearer, namely a notebook or notepad. One may infer from the rather stalling
market penetration of Tablet PCs that technology is still not ready for mass market
Tabs today, but one may also expect to find a pen centric, foot size handheld
computer to become very successful any time soon. An interesting facet of the
original Tab concept was the idea that Tabs would in the future lay around for free
use pretty much as one finds paper notebooks today, e.g. as part of the
complementary stationery offered to meeting participants.
fig: XEROX TAB

Xerox Liveboard’:
The Xerox Liveboard was the prototype of present electronic whiteboards. A
PARC spinoff com- pany designed and marketed such boards, and today many
companies like Calgary based Smart- Technologies Inc. still sell such devices.
Liveboards represented the yard-size information bearers in the family of
cooperating devices for cooperating people. In contrast to many devices sold
today, liveboards supported multi-user input pretty early on.

fig: XEROX LIVEBOARD

The developments and studies conducted at Mark Weisers lab emphasized the
combination of the three device types for computer supported cooperation, and
cooperative knowledge work in particular.
Layers of Ubiquitous Computing
It is not as easy as creating a new type of computer with varying abilities from
its predecessors to define ubiquitous computing. It’s as complex as establishing
a unique manner of engaging with and obtaining information, communicating,
and a new way of living. One may use wireless sensor networks with the
Internet of Things (IoT).
Such sensor networks gather information from selected device sensors before
passing it to an IoT server. A system of layers with a specific series of tasks that
come together to make up ubiquitous computing might be considered. These
layers include the following:

Layer 1: The task management layer


It examines user tasks, context, and index. It also controls the territory’s
complicated dependencies. The system uses knowledge about a user’s jobs to
set up and reconfigure the surroundings on the consumer’s behalf. To begin, the
infrastructure must understand what to configure for; i.e., what a user requires
from surroundings to complete their responsibilities. Second, the infrastructure
must understand how to design the environment appropriately: it must have
processes to match the user’s demands to the resources and capabilities
available in the environment.
Task management also analyzes explicit user cues and occurrences in the user’s
physical environment. It coordinates the two aspects of preserving the user-level
state of a suspended task and reinstating the resumed task on receiving a signal
from the user – whether to suspend the current task or resume another task. One
can also capture complex depictions of user tasks through task management.
It collects information about customer tasks and their related purpose. This
information is used to regulate the setup of the environment when the user’s
work or situation changes. For example, a user seeking to complete a task in a
new environment can have task management access to all relevant information
and manage task support with the environment management layer.

Layer 2: The environment management layer


It is responsible for mapping service needs, user-level conditions of specific
attributes, and resource and capability tracking.The environment’s abstract
models are kept in the environment management layer. These models bridge the
gap between the user’s demands, described in environment-independent terms,
and the actual abilities of every environment.
Such directions are utilized to handle environmental heterogeneity as well as
dynamic change. In terms of heterogeneity, when customers require services,
such as voice recognition, environment management will locate and configure a
“supplier” for that service from among those accessible in the environment.
In terms of dynamic change, explicit models of the environment’s capabilities
permit automated reasoning when those abilities change constantly. The
environment management automatically updates such a mapping in reaction to
variations in the subscriber’s wants (adaptation triggered by task management)
and modifications in the environment’s resources and capabilities (adoption
initiated by environment management). Maximizing a utility function expresses
the user’s preferences and guides adjustment in both circumstances.

Layer 3: The environment layer


It monitors and maintains essential resources. The environment layer includes
programs and devices that one may customize to help a user complete a job.
Aside from configuration difficulties, these vendors engage with the user just
because they would without the system. The network simply intervenes to set up
such vendors on the user’s behalf.
The environment manager manipulates the individual abilities of every supplier,
acting as an interpreter for the environment-independent definitions of user
demands supplied by task management.
The platform allows applications to perform the adaptation strategies suited for
every job by factoring models of users’ needs and circumstances out of
individual applications. This information is challenging to gain at the
application level, but once decided at the user level via task management, it is
readily transferred to the programs that support the subscriber’s task.
Computing systems on which people rely must increasingly adapt to failures in
contexts that are not totally within the control of the system implementers. They
must modify their run-time features to accommodate the changing loads,
resources, and objectives. The field of ubiquitous computing is a particularly
relevant sector for self-adaptation.
Consumers are now exposed to diverse, ubiquitous, and changeable technology.
It is diverse because computation may occur on various computer systems,
interfaces, networks, and services. It penetrates much of our working and
residential surroundings via wireless and cable communication. It is flexible
because resources change: users might relocate from resource-rich to resource-
poor areas.

KEY ELEMENTS OF UBIQITOUS


COMPUTING
Ubiquitous sensing
Ubiquitous sensing is a fundamental concept in Ubiquitous Computing
(Ubicomp) that involves the pervasive deployment of sensors and data collection
devices throughout the physical environment to gather information about the
world. These sensors can monitor a wide range of physical parameters,
environmental conditions, and user interactions. Ubiquitous sensing is crucial for
creating context-aware and responsive computing systems. Here's a detailed
explanation:
Key Components of Ubiquitous Sensing
1. Sensors: Sensors are devices that detect and measure physical properties,
such as temperature, humidity, light, sound, motion, pressure, and more.
There is a vast array of sensor types designed to capture different aspects of
the environment.
2. Data Collection Devices: These devices include cameras, microphones,
biometric sensors (e.g., fingerprint scanners, heart rate monitors), and other
data-capturing instruments that can collect data from both the physical
world and human interactions.

How Ubiquitous Sensing Works


1. Deployment: Sensors and data collection devices are strategically placed in
various locations and on different objects within the environment. They can
be embedded in infrastructure, attached to equipment, or even integrated
into wearable devices.
2. Data Collection: Sensors continuously collect data from their surroundings.
For example, a temperature sensor might record ambient temperature, while
a motion sensor detects movement in a room.
3. Data Processing: The data collected from sensors is transmitted to a central
hub or a cloud-based platform for processing and analysis. This step often
involves cleaning and filtering the data to ensure its accuracy and relevance.
4. Context Awareness: By analyzing data from multiple sensors, Ubiquitous
Computing systems can gain insights into the context of the environment.
For instance, combining temperature data with motion sensor data might
indicate whether a room is occupied.
5. Real-Time Feedback and Actions: Ubicomp systems can respond to the data
collected by sensors in real-time. For instance, if a motion sensor detects no
movement in a room for an extended period, the system can turn off the
lights to save energy.
6. Storage and Historical Data: Sensor data can also be stored for historical
analysis and trend identification. For example, temperature sensor data over
time can reveal seasonal trends or anomalies.

Significance of Ubiquitous Sensing


1. 1.Context Awareness: Ubiquitous sensing allows computing systems to be
aware of the context in which they operate. This context can include
information about the physical environment, user behavior, and
interactions.
2. Personalization: Sensors enable systems to personalize experiences based
on the current context. For example, a smart home system can adjust
heating, lighting, and security settings based on who is at home and their
preferences.
3. Efficiency: By monitoring and responding to changes in the environment,
Ubiquitous Computing systems can optimize resource usage, improve
energy efficiency, and reduce waste.
4. Enhanced User Experiences: Ubiquitous sensing contributes to more
natural and intuitive interactions with technology. For instance, voice-
activated virtual assistants use microphones to understand and respond to
spoken commands.
5. Data-Driven Insights: Sensor data, when analyzed over time, can provide
valuable insights for decision-making, trend analysis, and process
optimization in various domains, including healthcare, transportation, and
industrial settings.
Ubiquitous access
Ubiquitous access is a core concept in Ubiquitous Computing (Ubicomp) that
ensures the availability of information, services, and resources from any location,
at any time, and through any device or interface. It aims to make technology
seamlessly accessible to users wherever they are and on whichever device they
choose to use. Here's a more detailed explanation:

Key Components and Aspects of Ubiquitous Access


1. Device Agnosticism: Ubiquitous access allows users to access services and
information using a wide range of devices, including smartphones, tablets,
laptops, desktop computers, wearable devices, smart TVs, and more. It
eliminates device-specific limitations, enabling a consistent user
experience across different platforms.
2. Network Connectivity: Ubiquitous access relies on network connectivity,
whether it's through wired connections (e.g., Ethernet) or wireless
technologies (e.g., Wi-Fi, cellular networks, Bluetooth). Users can access
resources over local networks or the internet.
3. User Authentication and Authorization: Security is a critical aspect of
ubiquitous access. Users often need to authenticate themselves to access
specific resources or services. Multi-factor authentication, biometric
recognition, and encryption play roles in securing access.
4. Cloud Services: Ubiquitous access is facilitated by cloud computing, where
data and services are hosted on remote servers. This allows users to access
their data and applications from virtually anywhere, provided they have an
internet connection.
5. Cross-Platform Compatibility: To achieve ubiquitous access, applications
and websites are developed to be cross-platform compatible. They use
responsive design techniques to adapt to different screen sizes and devices,
ensuring a consistent user experience.
6. APIs and Integration: Application Programming Interfaces (APIs) enable
different software components and services to communicate and integrate
seamlessly. This integration is essential for providing users with access to
various services and resources.

How Ubiquitous Access Works


1. Connectivity: Ubiquitous access begins with establishing network
connectivity, either through a local network or the internet. Users can
connect their devices to the network using Wi-Fi, cellular data, or wired
connections.
2. User Interaction: Users can interact with devices, applications, and
services through various means, such as touchscreens, keyboards, voice
commands, or gestures.
3. Data and Service Requests: Users initiate requests for data or services. For
example, a user might request access to an email account, a cloud storage
service, or a streaming video platform.
4. Authentication: In many cases, users need to authenticate themselves to
gain access. This can involve entering a username and password, providing
biometric data (e.g., fingerprint, facial recognition), or using multi-factor
authentication methods.
5. Access Control: After authentication, access control mechanisms
determine what resources and services the user is authorized to access.
This ensures that users only have access to the data and services they are
entitled to.
6. Data Retrieval and Interaction: Once access is granted, users can retrieve
data, perform tasks, or interact with services. For example, they can send
emails, view documents, stream videos, or control smart home devices.

Significance of Ubiquitous Access


1. Convenience: Ubiquitous access enhances user convenience by allowing
them to access information and services on their own terms, without being
limited by location or device.
2. Flexibility: Users can switch between devices seamlessly and continue
their tasks without interruption. For example, they can start drafting an
email on their smartphone and finish it on their computer.
3. Productivity: Ubiquitous access promotes productivity by enabling remote
work, collaboration, and access to critical resources from anywhere with
an internet connection.
4. Personalization: Services can be personalized based on the user's
preferences and location. For example, location-based services can offer
recommendations for nearby restaurants or attractions.
5. Accessibility: Ubiquitous access ensures that technology is accessible to
people with different abilities and needs, supporting inclusivity.
6. Scalability: Cloud-based services can scale to accommodate user demands,
ensuring that resources are available as needed.

Ubiquitous middleware
Ubiquitous middleware is a critical component in Ubiquitous Computing
(Ubicomp) environments that acts as an intermediary layer of software between
the hardware components (sensors, devices, actuators) and application software.
It facilitates communication, data processing, and the management of distributed
resources in Ubicomp systems. Here's a more detailed explanation:
Key Functions and Characteristics of Ubiquitous Middleware
1. Interoperability: Ubiquitous middleware enables different devices,
sensors, and software applications to communicate and work together
seamlessly. It abstracts the complexities of device-specific communication
protocols and data formats.
2. Data Aggregation and Processing: Middleware collects data from various
sensors and devices deployed in the environment. It processes this data,
filtering, aggregating, and analyzing it to derive meaningful insights.
3. Context Awareness: Middleware plays a crucial role in maintaining
context awareness in Ubicomp systems. It keeps track of the environment's
current state, including the location of devices, user preferences, and real-
time data.
4. Resource Management: Ubiquitous middleware manages distributed
resources efficiently. It allocates computing resources, network
bandwidth, and storage capacity as needed to support various applications
and services.
5. Security: Middleware implements security mechanisms to protect data and
communication. This includes encryption, authentication, authorization,
and access control to ensure the privacy and integrity of information.
6. Scalability: Ubiquitous middleware can scale to accommodate the
growing number of devices and sensors in Ubicomp environments. It can
handle the increased volume of data and users effectively.
7. Real-Time Communication: In Ubicomp, real-time communication is
often essential. Middleware supports low-latency communication between
devices and systems, allowing for quick response to changing conditions.
8. Application Integration: Middleware provides Application Programming
Interfaces (APIs) and tools for developers to build and integrate Ubicomp
applications. This simplifies the development process and ensures
compatibility with existing systems.
9. Event-Driven Architecture: Middleware often employs an event-driven
architecture, where actions or events trigger specific responses. For
example, a change in sensor data might trigger an action to adjust
environmental controls.
How Ubiquitous Middleware Works
1. Data Collection: Sensors and devices continuously collect data from their
surroundings and transmit it to the middleware layer.
2. Data Processing: Middleware processes the incoming data, applying
filtering, transformation, and analysis as required. It may identify patterns,
trends, or critical events.
3. Context Management: Middleware maintains context information about
the environment, users, and devices. This context awareness is used to
make informed decisions and trigger actions.
4. Communication and Integration: Middleware ensures that data and
information are shared among devices, services, and applications. It
facilitates the interoperability of various components.
5. Security: Middleware enforces security measures to protect data in transit
and at rest. It manages user authentication, authorization, and encryption
of sensitive data.
6. Resource Allocation: Middleware allocates computing resources
dynamically to meet the demands of various applications. It ensures that
computing resources are used efficiently.
7. Event Handling: Middleware uses an event-driven model to respond to
events or conditions in real-time. For example, a fire alarm sensor
triggering an alert is an event that the middleware can handle.

Significance of Ubiquitous Middleware


1. Simplified Development: Ubiquitous middleware simplifies the
development of Ubicomp applications by abstracting low-level
complexities, enabling developers to focus on building application logic.
2. Interoperability: It promotes interoperability, allowing devices and
applications from different manufacturers and technologies to work
together seamlessly.
3. Scalability: Ubiquitous middleware supports the scalability of Ubicomp
systems, ensuring they can handle a growing number of devices and users.
4. Efficiency: Middleware optimizes resource usage and enhances system
efficiency by processing data and making decisions closer to the source of
data collection.
5. Security: It enforces security measures to protect sensitive data and ensure
user privacy, which is crucial in Ubicomp systems.

Ubiquitous networking
Ubiquitous networking is a fundamental concept in Ubiquitous Computing
(Ubicomp) that refers to the establishment of interconnected networks allowing
devices, sensors, and services to communicate and collaborate seamlessly. It aims
to provide continuous and ubiquitous connectivity, enabling data exchange,
resource sharing, and real-time interaction across diverse devices and systems.
Here's a more detailed explanation:

Key Components and Aspects of Ubiquitous Networking


1. Connectivity Technologies: Ubiquitous networking relies on various
connectivity technologies, including wired (e.g., Ethernet) and wireless
(e.g., Wi-Fi, Bluetooth, cellular networks, Zigbee, LoRaWAN) protocols.
These technologies enable devices to communicate both locally and
globally.
2. Internet of Things (IoT): Ubiquitous networking often integrates with IoT
concepts, where billions of devices and sensors are connected to the
internet. These devices can range from smart home appliances to industrial
sensors, enabling a wide range of applications.
3. Cloud Computing: Ubiquitous networking leverages cloud computing
services, where data and applications are hosted on remote servers. Cloud
services enable ubiquitous access to data and resources from anywhere
with an internet connection.
4. Edge Computing: In addition to cloud-based networking, edge computing
plays a role in ubiquitous networking. Edge devices, located closer to data
sources and users, can process data locally, reducing latency and improving
responsiveness.
5. Mesh Networks: Ubiquitous networking can involve the use of mesh
networks, where devices form a self-organizing network topology. Mesh
networks are resilient and can automatically route data, ensuring
continuous connectivity even if some devices fail.
6. Mobile Connectivity: Ubiquitous networking extends to mobile devices
like smartphones and tablets. Cellular networks provide ubiquitous
connectivity, enabling users to access data and services while on the move.

How Ubiquitous Networking Works


1. Device Connectivity: Devices, sensors, and systems connect to the network
using compatible communication protocols. For example, a smart
thermostat may connect to a Wi-Fi network, while an industrial sensor may
use a specialized IoT protocol like MQTT.
2. Data Transmission: Data generated by devices is transmitted over the
network to centralized servers, cloud platforms, or other connected
devices. Data can be structured (e.g., sensor readings) or unstructured (e.g.,
multimedia content).
3. Data Processing and Storage: Data is processed and, if necessary, stored in
cloud servers or edge computing devices. Processing can include data
analytics, machine learning, or simple data filtering.
4. Real-Time Communicatio: Ubiquitous networking enables real-time
communication between devices and systems. This real-time aspect is
crucial for applications such as video conferencing, online gaming, and
remote control of devices.
5. Security: Security measures, including encryption, authentication, and
access control, are implemented to protect data and communication in the
network. This is especially important when sensitive data is involved.
6. Resource Allocation: Network resources such as bandwidth, processing
power, and storage are allocated dynamically based on demand. This
ensures efficient use of resources while maintaining network performance.

Significance of Ubiquitous Networking


1. Continuous Connectivity: Ubiquitous networking ensures that devices and
systems can communicate without interruption, facilitating always-on
services and applications.
2. Global Access: It allows users to access data and services from anywhere
in the world, making information and resources universally available.
3. Real-Time Interaction: Ubiquitous networking enables real-time
interactions between users and devices, supporting applications like
telemedicine, real-time gaming, and remote monitoring.
4. Scalability: The network can scale to accommodate an increasing number
of devices and users as technology adoption grows.
5. Efficiency: Ubiquitous networking optimizes resource usage and data
transmission, improving the efficiency of connected systems.
6. Innovation: Ubiquitous networking provides the infrastructure for the
development of innovative applications and services, leading to
advancements in various industries.

Calm-Technology
Today Internet is carrying us through an era of widespread distributed computing
towards the relation- ship of ubiquitous computing, characterized by deeply
embedding computation in the world. Ubiquitous computing will require a new
approach to fitting technology to our life, an approach called ”calm technology”.
The most potentially interesting, challenging, and profound change implied by
the ubiquitous computing/ubicomp era is a focus on calm. If computers are
everywhere they better stay out of the way, and that means designing them so that
the people being shared by the computers remain serene and in control. Calmness
is a new challenge that UC brings to computing. When computers are used behind
closed doors by experts, calmness is relevant to only a few. Computers for
personal use have focused on the excitement of interaction. But when computers
are all around, so that we want to compute while doing something else and have
more time to be more fully human, we must radically rethink the goals, context
and technology of the computer and all the other technology crowding into our
lives. Calmness is a fundamental challenge for all technological design and
implementation of the next ten to fifty years.
In designing calm technology , Weiser and john saily brown describe calm
technology as ”” that which informs but doesn’t demand our focus or attention””
Characteristics of ideal Calm Technology
• The best computer is a quiet, invisible servant
• The more you can do by intuition the smarter you are;
• The computer should extend your unconscious.
• Technology should create calm

Context Awareness
Context awareness is an important characteristic to application in a ubiquitous
computing. Using con- text awareness, systems can integrate gracefully with their
environments with minimal intrusion and unnecessary interaction with the user.
There are many definitions of context awareness that have been discussed in
recent years. Each of these definitions, although slightly different from each
other, exhibits certain commonalities between them. These commonalities
mapped directly to the four types of context that a ubiquitous system can be aware
of:
•location
•activity
•identity
•time
Collecting and analysing this context information can greatly enhance ubiquitous
computing systems for the standard user. This point was illustrated by exploring
different ubiquitous computing systems that are currently available in todays
market place, or that are at the prototype stage and will perhaps be available in
the future. These examples showed that without the use of context aware
information in a ubiquitous computing system, none of these technologies would
be possible. Not only was it shown that context aware technologies enhanced the
overall experience for standards user, but also it was shown that context
awareness benefits users with disabilities through the use of assistive technology.
Over one- third of the assistive technology devices distributed each year are
abandoned by users v . This is due to the fact that the assistive technologies are
not context aware technologies. These systems will break down barriers, allowing
people with disabilities to integrate seamlessly into social environments, much
like ubiquitous computing itself.

What is Context Awareness?


The first definition of context awareness appeared in an article written by Schilit
and Theimer in 1994 . They defined context aware computing to be the ”ability
of a mobile user’s applications to discover and react to changes in the
environment they are situated in”. This definition considers the location of a user,
and perhaps the time of day, when defining what functions a context aware
application should perform.
In 1999, Dey redefined context aware computing as ”Context is any information
that can be used to characterize the situation of an entity. An entity is a person,
place, or object that is considered relevant to the interaction between a user and
an application, including the user and applications themselves” . Deys definition
focuses strongly on the idea of identity and location. Dey believes that a
computer system not only needs to be aware of the location of the user, as
similarly suggested by Schilit, but that the identity of the user is also an important
factor when a system is defining what functions is should and should not perform.
More recently, in 2004, Beale defined context as a ”set of changing relationships
that may be shaped by the history of those relationships”. The example he uses
describes a student visiting a library and searching through the shelves for a few
books of interest. On subsequent visits, the student could be presented with
recommendations of other books to read that are similar to the books the student
read on previous visits. This definition takes into account that the activity is a key
aspect to context awareness.

Types of context
the four types of context that a ubiquitous system must be aware of:
1.Location
Location awareness plays a very important role for ubiquitous computing
systems. It allows these systems to adapt in terms of the resources that are
available to the user and to the system. With a users location, a system may be
able to determine what other objects or people are in the surround- ing area and
what activity is occurring near the entity. Furthermore, using this information the
ubiquitous system itself can adapt to ensure the users demands are met efficiently
and effectively.
With the increased popularity in mobile computing and communication, users
now have an expec- tation that information services should be available to them
at all times, irrespective of their current location. Mobile devices need to be aware
of your current location in order to ensure a user is provided with the most
efficient network service. Some locations may have access to Wi-Fi, some to 3G
and some to EDGE networks. Mobile computers need to, using the information
collected from the users location, determine which network service is the
strongest and then configure itself to that frequency, all without the need for user
interaction.

2.Activity
An activity describes what is occurring in a given situation. A ubiquitous
computing system that is activity aware will collect data regarding the activity
that is currently being performed as well as from previously performed user tasks.
With this data, the system can conduct a number of different data analytic
functions, and using the results, can determine what additional tasks need to be
performed as well as predicting what tasks will be performed in the future
whether a given context should trigger an event.

fig location context

For example, many IT companies run a virus scanning tools over the companys
network to detect is the network is free from malicious viruses. This process can
be very resource intensive and can lead to workers computers slowing down
considerably. To prevent this slow down, and thus ensure the workers
productivity is not affected, the network system is programmed to be aware of
normal working hours and only begin this virus scanning outside of these hours.
Some systems can also determine when the last successful virus scan completed
and therefore flag to the ICT department if another scan is required.

3.Identity
When a ubiquitous computing system is identity aware, it has access to
information about the user. This information can either be explicitly or implicitly
provided by the user. For the identity information to be explicitly indicated the
user does not need to interact with the system in order for the system to collect
data. For example, facial recognition software can be used to correctly identify
the person that is interacting with the system. For identity information to be
implicitly collected, the user must directly interact with the software in order for
the system to be made aware of the user. A common implicit identity gathering
feature is a login dialog where the user must type in their username and password.
Once this primary identity information is acquired the system can access
secondary information about the user also, for example, a users contact
information, date of birth, relationship with other people in the environment, etc.
Knowing the identity of a user is a powerful and useful tool. It allows a system to
present cus- tomised information to the user as well as using this information to
determine what other system events should be processed in order to meet the users
demands.
4.Time
Time aware computing systems are aware of the time of day and/or can record
time lapses between certain events. These systems can use this time information
to determine capturing and processing this type of information it must still be
designed correctly to ensure the proactive solution does not irritate the user, as
this would remove the systems invisibility and transparency.
Knowing the identity of a user is a powerful and useful tool. It allows a system to
present customised information to the user as well as using this information to
determine what other system events should be processed in order to meet the users
demands.

Context Awareness and Ubiquitous Computing


The vision for ubiquitous computing is to create environments that are saturated
with computing and communication capabilities, which integrate with human
users gracefully. With a successful creation of this type of environment, the
technology that surrounds the user becomes transparent and disappears. A
pervasive computing system must be context aware to ensure that the system is
minimally intrusive. It must be aware of the users identity, location, time and
activity. With the use of context aware systems ubiquitous computing systems can
become adaptable, flexible and proactive while still remaining invis- ible to the
user.
There are a few key areas within ubiquitous computing that can be enhanced with
the use of context awareness
Proactive
For a ubiquitous computing system to be very effective, it must track and record
the users intent. Without this ability, the system will be unable to predict which
system actions and events will help the user rather than hinder them. Even when
the system is capable of might need to perform. If the assistant was context aware
and had access to this identity and activity information the tool could, for
example, determine that the user was an expert user and that they worked as a
secretary. Analysing the activities previously performed by this user, the system
would be made aware that the user only used Microsoft Word to write letters.
Therefore the system could proactively decide to present the user with a letter
template as soon as they opened Word. This template would contain the companys
address, the days date, and signed with the users name to ensure the user did not
have to repeatedly input this data every time they wrote a letter.

fig Context Awareness and Ubiquitous Computing


Invisible
Ubiquitous systems need to remain invisible to the user to ensure the minimal
intrusion on the users life. Without context awareness, a system would require a
user to manually input important data relating to each task that needed to be
performed. This in itself would remove the systems transparency. How- ever
when a system is context aware, it can gather this information by observing the
user context and behaviour without the need for user intervention, thus allowing
the system to remain invisible.
Adaptation
For a ubiquitous computing system to be effective it needs to have an adaption
strategy in place. An adaption strategy is necessary when there is a significant
mismatch between the demand and the supply of particular resources. The
resources may be energy, memory, network signal, etc. With this mismatch the
ubiquitous system needs to quickly determine what alternative strategy to take.
The only way the system can do this is to collect information relating to the users
context and then decide on the most efficient and effective path to take.

Ubiquitous Assistive Technologies


The International ISO-9999 Standard defines assistive technology as the
following:” Any product, instrument, equipment or technical system used by a
disabled or elderly person, made specially or existing on the market, aimed to
prevent, compensate, relieve or neutralise the deficiency, the inability or the
handicap.” This essentially means that any technology, whether low tech or high
tech, that helps a disabled user is deemed as an assistive technology. Assistive
technology enables people with disabilities to participate in society as
contributing community members. These technologies can also allow people to
achieve optimal functionality and independence assuming that the assistive
technology fully meets the needs of the user

HATT model
The Human Activity Assistive Technology (HAAT) Model is often used when
designing an assistive technology for a user with disabilities [6]. This model
describes how the users performance can be influenced, negatively or positively,
by the person, the activity and the persons environment.
The model suggests that each of these factors influence each other, and for
optimal performance these factors need to adapt to change effectively. Each of
the factors considered in the HAAT Model can be directly mapped to the types of
context information that a ubiquitous computing system can be made aware of.
Using this context information acquired by the ubiquitous system/assistive
technology, the system could continuously adapt to the users requirements.

fig The HATT model

Implementation and challenges


Goal based interactions
The smart environment is made up of numerous ubiquitous computing devices.
They each function to sense and actuate according to a given occupants need. But
what happens when one device contradicts the other? How can the devices
cooperate so that a ubiquitous computing environment responds correctly, as a
whole?
The paper Smart Environments and Self-Organizing Appliance Ensembles raises
the very interesting question, ”How do you control devices you do not perceive?”.
An answer to this question revolves around goal oriented device cooperation. You
see, the smart system cannot rely on the user to provide a step-by-step process of
how each device should behave. Similarly, the designer cannot predict all
combinations of how an ensemble ubiquitous computing environment needs to
respond. Instead, a system may be driven by a users goal where the system
generates the strategy.
Within a smart environment, goal based interactions are likely to be at its heart.
How a computing device carries out a function is not what matters most to a user.
It is rather the effect of ubiquitous computing devices that is key. The following
is a diagram as described in the paper to illustrate how such a goal oriented
context-aware environment will work

fig 1 Goal based Interaction

As you can see, intention analysis and strategy planning are critical to how the
ubiquitous computing system will work. Both are necessary for goal based
interactions.
A users needs may be quite varied and the smart environments devices must
cooperate with each other in unison. In addition, as users add or remove devices
to their smart environment, ubiquitous computing technologies must easily allow
for such user changes. In the end, a goal oriented approach calls for a dynamic
system, so the users needs are met even as they change in real-time. The smart
environment will be able to simultaneously feed the senses so occupants can carry
out a multitude of functions. With few interface techniques a user may
communicate based on their intention; and therefore, their goals. Smart
environments will work seamlessly to orchestrate a smart space through context
aware techniques. Appliances will form an ensemble, giving rise to architectural
space that yields greatest value.

How ubiquitous computing works


The success of ubiquitous computing rests with the proper integration of various
components that talk to each other and behave as one. Shows such a ubiquitous
computing stack. At the bottom of the stack is a physical layer. Tiny sensors are
attached (carried, worn, or embedded) to people, animals, machines, homes, cars,
buildings, campuses, and fields. Today, some smartphones come with a host of
sensors that capture various bits of information from the immediate surroundings.
Beyond the microphone and camera, they integrate multiple sensors such as GPS,
accelerometer, compass, and so on.

fig 2 Ubiquitous computing stack

Above the sensors lies the wireless communication infrastructure, which can be
provided by the
802.11 family of networks. Newer standards such as 802.11n have lower latency.
Together with mesh networks, such standards ensure the connectivity of sensors
and devices. Another technology called ZigBee is a low-cost alternative for
keeping multiple devices connected, allowing parent devices to wirelessly control
child sensors. Near field communication (NFC) is yet another technology
standard that leverages RFID and can be used for ubiquitous computing,
especially in scenarios where non- battery-operated passive points are concerned.
NFC-powered devices can also interact with one another. The next level includes
a range of application services. The data from the sensors and handheld de- vices
is gathered, mined, and analysed for patterns. The patterns help provide options
to smart applications that proactively make changes to environments through
smartphones, tablets, netbooks, notebooks, handhelds, or other smart devices.
The smartphone, for instance, can transform itself into a barcode or quick
response (QR) code reader to identify and get details of a product from a retail
store, or display the barcode of your airline ticket so that the barcode code reader
at the check-in kiosk can read it and issue a boarding pass. Another example could
be that of a cardiac patient wearing a tiny monitor connected to a mobile device.
An irregular ECG will trigger the mobile to alert the patients doctor and
emergency services. An example of how this can happen has been depicted in
Figure.

fig 3 Smart device interaction.

Challenges
The power ubiquitous computing promises carries with it significant risks. One
such risk is associated with the amount of privacy that must be sacrificed to see
the benefits of truly helpful computers. Another is that early, bleeding edge
applications of ubiquitous computing will turn out to be more ambitious than
effective, leading some to prematurely conclude that the idea is a failure. We
address each of these concerns below.
Privacy and Security
When such a vast number of entities are connected, their interactions and
communications are examined more carefully. First, data from one persons device
must be distinguished from data from anothers. Second, it is necessary to ensure
that false data is not intentionally injected by some other device, masquerading
as a bonafide source for that information. And finally, it must be rendered difficult
or impossible to steal someone else data. Researchers are currently working on
solving each of these problems in an effort to secure mesh networks.
• You are now predictable
• System can co-relate location, context and behaviour patterns
• Do you want employer, colleagues or insurance company to know you
carry a medical monitor?
• Tension between authentication and anonymity business want to
authenticate you for financial transactions and to provide personalized
service
• Users should be aware of being monitored
• Ability to control who/what has access to my data (stored, communicated,
inferred), ability to define levels of privacy, trust etc

Information management
• Billions of sensors generating petabytes of (dynamic) data
• Need filtering, aggregation, collaborative sensing, new query techniques
which cater for errors in source.
• Meta data description of information
• Provenance - audit trails,
• how and where modified etc.

Scalability
• In a ubiquitous computing environment where possibly thousands and
thousands of devices are part of scalability of the whole system is a key
requirement
• All the devices are autonomous and must be able to operate independently
a decentralized management will most likely be most suitable

Mobility
• Mobility is made possible through wireless communication technologies
• Problem of disconnectivity !!! This behaviour is an inherent property of the
ubicomp concept and it should not be treated as a failure

Networking
• Another key driver for the final transition will be the use of short-range
wireless as well as traditional wired technologies
Reliability
• Thus the reliability of ubiquitous services and devices is a crucial
requirement
• In order to construct reliable systems self monitoring, self-regulating and
self-healing features like they are found in biology might be a solution

Interoperability
• This will probably be one of the major factors for the success or failure of
the Ubicomp vision
• This diversity will make it impossible that there is only one agreed standard

Resource Discovery
• The ability of devices to describe their behaviour to the network is a key
requirement.
• On the other hand, it can not be assumed that devices in a ubiquitous
environment have prior knowledge of the capabilites of other occupants.

Requirement

”Ubiquitous Computing” will usher in a new era. Instead of do-it-all computers,


we will see the advent of simple, task-specific, miniaturized and intuitively
operable processors that will be invisibly integrated in everyday objects.
Similarly, traditional input devices such as keyboards and mice will not be
required. Instead, the processors will be controlled by electronic, optical, acoustic
or chemical sensors, and they will output via actuators such motors or other
control units.
In order to reach that point, however, researchers need to develop new software
that is capable of the following:
• Self-configuration, that is, automatic adaptation to changing environments
• Self-optimization, including continual monitoring and analysis of its own
performance and the use of available resources according to specific
processes
• Self-organization and the implementation of decisions across the system as
a whole
• Self-protection, meaning identification and control of unauthorized access
and virus activity
• Self-repair, for example, discovering and resolving problems
• Self-teaching, that is, recognition of behavioral patterns and their
incorporation in internal man- agement mechanisms. Of particular
importance here is sensitivity to context.
In other words, the system must not only be capable of recognizing objects and
persons, but it must also be able to prepare for future situations

Application and Services of ubiquitous


computing

Ubiquitous service
A service refers to a software component that performs computation or action on
behalf of a system entity. This entity can be the user or another service. Services
are usually well-defined in their functionality as well as their inputs and outputs
. We identify the five goals of ubiquity, with regards to a service,as Availability,
Transparency, Seamlessness, Awareness, and Trustworthiness (ATSAT) as
depicted in the figure. These goals may be satisfied to varying degrees based on
user needs and operating conditions.
1.Availability
Ideally, a ubiquitous service should be available independent context. The service
should be also available regardless of changes in user status, needs, and
preferences.
2.Transparency
According to Weiser, a good tool is an invisible tool. Weisersnotion of
disappearance, where a tool is ”literally visible, effectively invisible” means that
the tool does not intrude on the user conscious- ness; the user focuses on the task,
not the tool. Ubiquitous computing provides smarter unconscious, so that users
do more easily and intuitively without requiring user attention and awareness of
the underlying technology. Transparency implies more than just a user-friendly
interface; the technology should facilitate the task in a non-intrusive way and in
this way ”hide” the underlying technology from the user
3.Seamlessness
Seamlessness can be defined as the capability of providing an everlasting service
session under any connection with any device. The ultimate goal is that the system
will recognize the user wherever she logs on, on any system, with any equipment,
at anytime, with the applications in a given state and have them adapting the best
possible way given these surrounding conditions. Seams occur when the service
fails to satisfy the minimum QoS requirements set by the end-user.
4.Awareness
Ubiquitous devices extend the human senses by providing greater awareness of
the surrounding environment. By blending into the physical world, a ubiquitous
service bridges the gap between the end-user and his surrounding. We advocate
the need for mutual awareness between the user (context) and the
service(feedback). Abowd and Mynatt put forth the ”five W’s” of context,
providing a good starting point of the different components that should be put
together to provide user context. The five Ws are:-Who (the ability of a device to
identify not only its owner, but other people and devices in its vicinity within the
environment),What (the ability to interpret user activity and behaviour, and using
that information to infer what the user wants to do), Where (the ability to interpret
the location of the user and use that to tailor functionality), When (the ability to
understand

the passage of time, use it to understand the activities around and to make
inferences), and Why (the ability to understand the reasons behind certain user
actions). In addition to the system awareness of its user, a ubiquitous environment
provides user awareness of the task (i.e. feedback) in a way that may enhance the
user’s decisions.
5.Trustworthiness
We define trust of an entity in a ubiquitous service environment asthe confidence
that the entity will behave as expected in a given context. Mutual trust must be
established between different entities in a ubiquitous environment in a sense that
each entity is assigned a trust value based on its behaviour. An entity can be a
device, a service or a user. In the latter case, the trust worthiness of a service or a
device has psycho sociological aspects that affect its usability. The model of trust
in a ubiquitous context should capture both the needs of the traditional world of
computing where trust is based on identity, and of the world of ubiquitous and
pervasive computing where trust is based on identity, physical context or a
combination of both . In other words, both identity-based and context-based trust
relationships should be defined between different entities within a ubiquitous
environment.

Application of ubiquitous computing

1.Real-Time Locating System (RTLS)


RTLS is a local positioning system where small, inexpensive electronic tags are
attached to people and objects, such as equipment, patients and caregivers in a
hospital, to help track interactions and improve services.

fig 4 Real-Time Locating System for hospital.


This means hospitals can better track when doctors and nurses entered the room,
interacted with the equipment and patient etc. This non-intrusive logging means
that the system could alert nurses when a patient hasn’t been checked on for a
while. It could also be used for better asset-tracking; Hospital staff no longer need
to manually log every time a piece of equipment moves rooms, but can locate
equipment instantly even in large hospitals. Tags on the patients wrist can pull up
their electronic medical records immediately and accurately, reducing the risk of
dangerous errors.
All this is done through small, wireless tags that are low-power and need no
recharging for the life of the tag.
The system is non-intrusive in that it doesn’t require users to change their
behaviour, but instead integrates into their environment and provides benefit
through improving patient care and reducing risks and errors. The tags are small,
need no maintenance and easily integrated into wristbands, asset management

fig 5 Awarepoint Tag.

tags etc. The base stations for talking to them are simple devices that can be
plugged directly into a wall socket.

2.The ”ubi”

”An always-on, connected computer that talks back”


The Ubi is an always-on voice-activated computer ready to help. Just plug it in,
talk to it and it’ll help you connect with your world. You talk to the Ubi and it
talks back. It directly connects to the Internet through wi-fi.
We believe people want to do things when they’re at home - they clean, they fold
laundry, they cook, they eat, they spend time with loved ones. These are all things
that (for the most part) take up use of our arms and hands. When we’re at home,
we’d rather use our limbs for other activities than typing, scrolling, or swiping.
Ubi is short for ubiquitous computer because it’s always on, always listening,
always ready to help. It can scribe, listen, analyse. Ubi will either talk back to you
the information you seek or indicate information through multi-colour lights. Ubi
listens to its environment and senses it through sound, temperature, light,
pressure, and humidity. It can record this information or use it to trigger events
and communication. Ubi can be used for potentially hundreds of applications.

fig 6 The ubi

The applications we plan to ship with the Ubi are:


1. Voice-enabled Internet search
2. Speakerphone
3. Indicator light (light changing based on events, e.g. weather, stock, email)
4 .Home speaker system with sound piping
5. Virtual assistant (audio calendar, feed reader, podcast etc)
6. Voice memos
7.Alarm clock

Future

The Future: Ubiquitous Computing


Computing, over the past 50+ years, has gone through two distinct phases: the
mainframe era and the personal computing era. The third phase has begun and
you may have not even noticed that is the way it is supposed to be. Ubiquitous
means existing or being everywhere at the same time, i.e. constantly encountered.
Ubiquitous computing, or ubicomp, as it has been tagged will define the future of
computing.
The distinguishing feature of ubicomp will be the lack of interface. Everything
will be controlled by natural actions as opposed to the point-and-click interfaces
we have all grown used to.
Right now we receive information in two distinct ways: pull or push. Pull can be
characterized by a user sitting down at a computer, firing up Google, and
searching for specific information in real-time. Push is characterized by receiving
filtered information based on user preferences; much like the personalized text
messages on your cell phone informing you of weather or traffic conditions.

When computing becomes ubiquitous you will not need to manually set
preferences. The object you interact with will learn from you and provide
information based on your environment. Temperature, time of day, movement,
sound, colour and light will all influence the information you receive. Ubiquitous
computing will provide a continuous stream of information without being
distracting and will only pro- vide the information you need at the time.
Everything will become interactive and more importantly, reactive. Imagine the
following scenarios:
1. You make a call to your friend whose native language is French. He
understands English quite well but prefers to speak in French. No problem.
In real-time what you say comes across on his end in French and vice-
versa.
2. You need to setup a meeting with a group of business partners who all have
busy schedules. No problem, their automated calendars work together to
find a good time for all of you to meet.
3. You are rushed to the hospital after a car accident. By performing a retinal
scan the ER doctors are provided with time-sensitive and important
information: allergies, past surgeries, existing condi- tions, emergency
contact information, name and age. (Ubiquitous computing will probably
prevent most accidents before they happen.)
4. You have lost your keys. No more searching, just ask your house. It will
know EXACTLY where they are, even if they are hiding in the couch
cushions. (Keys will probably be a thing of the past at this point.)
fig Ultra tiny computer imbedded in environment.

it is difficult to comprehend all that ubiquitous computing will entail. I look at it


this way: Everything, and I mean everything, will be connected. A
communication device of some type will be embedded in every single product
created. This prospect is scary for some, exciting for others.

Conclusion
The UC will bring information technology beyond the big problems like
corporate finance and school homework, to the little annoyances like Where are
the car-keys, Can I get a parking place, and Is that shirt I saw last week at Macy’s
still on the rack? Many researchers are working towards this new era among them
our work at Xerox PARC, MIT’s AI-oriented ”Things That Think” program, the
many mobile and wearable computing programs (many funded by ARPA), and
the many companies integrating computation into everyday objects, including
Mattel and Disney but
• Currently pervasive systems are more hype than reality
• Some component technologies are available
• Technology problems - seamless communications, power
• Management problems - adaptive self management, privacy
• Most research focuses on Engineering aspects No theory to underpin
understanding, analysis & design
• SMC provides a scope for theoretical analysis and Implementation

You might also like