Related Work on Context-Aware Systems

Size: px
Start display at page:

Download "Related Work on Context-Aware Systems"

Transcription

1 Related Work on Context-Aware Systems Kostas Stefanidis Evaggelia Pitoura Department of Computer Science, University of Ioannina, Greece {kstef, In this work in-progress report, we survey work related to context-aware systems and applications. Types of Context Aware Applications Schilit [] notes that three important aspects of context are: where you are, who you are with, and what resources are nearby. Context encompasses more than just the user s location, because other things of interest are also mobile and changing. Context includes lighting, noise level, network connectivity, communication costs, communication bandwidth, and even the social situation; e.g., whether you are with your manager or with a co-worker. Context has been tied to ubiquitous computing, although the term has had several meanings that differ subtly. One challenge of mobile distributed computing is to exploit the changing environment with a new class of applications that are aware of the context in which they are run. Such context-aware software adapts according to the location of use, the collection of nearby people, hosts, and accessible devices, as well as to changes to such things over time. A system with these capabilities can examine the computing environment and react to changes to the environment. Schilit [] defines context-aware computing, and describes the four categories of context-aware applications: (a) proximate selection, (b) automatic contextual reconfiguration, (c) contextual information and commands, and (d) contexttriggered actions. Proximate Selection Proximate selection is a user interface technique where the located-objects that are nearby are emphasized or otherwise made easier to choose. In general, proximate selection involves entering two variables, the locus and the selection. However, of particular interest are user interfaces that automatically default the locus to the user s current location. There are at least three kinds of located-objects that are interesting to select

2 using this technique. The first kind is computer input and output devices that require co-location for use. This includes printers, displays, speakers, facsimiles, video cameras, thermostats, and so on. The second kind is the set of objects that you are already interacting with, and which need to be addressed by a software process. This includes people in the same room to whom you would like to beam a document. The third kind is the set of places one wants to find out about: restaurants, nightclubs, gas stations, and stores, or more generically, exits and entrances. Consider an electronic yellow pages directory that, instead of the city divisions of information, sorts represented businesses according to their distance from the reader. Automatic Contextual Reconfiguration Reconfiguration is the process of adding new components, removing existing components or altering the connections between components. Typical components and connections are servers and their communication channels to clients. However reconfigurable components may also include loadable device drivers, program modules, hardware elements, etc. In the case of context-aware systems, the interesting aspect is how context of use might bring about different system configurations and what these adaptations are. Contextual Information and Commands People s actions can often be predicted by their situation. There are certain things we do when in the library, kitchen, or office. Contextual information and commands aim to exploit this fact. Queries on contextual information can produce different results according to the context in which they are issued. Similarly, context can parameterize contextual commands, for example, the print command might, by default, print to the nearest printer. Context-Triggered Actions Context-triggered actions are simple IF-THEN rules used to specify how contextaware systems should adapt. Information about context-of-use in a condition clause triggers consequent commands; something like living in a rule-based expert system. A number of applications can be organized in this way. The category of context-aware software is similar to contextual information and commands, except that context-triggered action commands are invoked automatically according to previously specified rules. 2 Definition of Context While most people tacitly understand what context is, they find it hard to elucidate. Previous definitions of context are done by enumeration of examples or by choosing synonyms for context. A commonly-accepted definition is given by Dey [4]: Definition Context is any information that can be used to characterize the situation of an entity. An entity is a person, place, or object that is considered 2

3 relevant to the interaction between a user and an application, including the user and applications themselves. This definition makes it easier for an application developer to enumerate the context for a given application scenario. If a piece of information can be used to characterize the situation of a participant in an interaction, then that information is context. Take the canonical context-aware application, an indoor mobile tour guide, as an example. The obvious entities in this example are the user, the application and the tour sites. We will look at two pieces of information - weather and the presence of other people - and use the definition to determine whether either one is context. The weather does not affect the application because it is being used indoors. Therefore, it is not context. The presence of other people, however, can be used to characterize the user s situation. If a user is traveling with other people, then the sites they visit may be of particular interest to her. Therefore, the presence of other people is context because it can be used to characterize the user s situation. Dey [4] also defines context-aware computing. Definition 2 A system is context-aware if it uses context to provide relevant information and/or services to the user, where relevancy depends on the user s task. Similar to the problem of defining context, researchers have also tried to specify the important features of a context-aware application. Again, these features have tended to be too specific to particular applications. There are three general categories of features that a context-aware application can support: Presentation of information and services to a user; Automatic execution of a service for a user; and Tagging of context to information to support later retrieval 3 Awareness Information Environments in Mobile Computing Awareness information environments help to support the coordination of workgroups by providing application-independent information to geographically dispersed members of a workgroup about the members at the other sites. Such information typically includes their presence, availability, past and present activities; about shared artifacts; and about various other things that exist or happen at the other sites. Often they consist of sensors capturing information, a server that processes the information, and indicators to present the information to the interested users. 3

4 Context aware systems provide services and information to mobile users that are adapted to the current context of use (i.e., physical location, other persons nearby, etc.). Furthermore, the current context of the user is used to facilitate contacts and communication between users. Several approaches have defined context models and described different aspects of context taken into account for context-aware systems. In most definitions of context four main dimensions of a context are considered ([5]): Location: We consider location as a parameter that can be specified in electronic and physical space. An artifact can have a physical position or an electronic location described by URIs or URLs. Location-based services as one type of context aware applications can be based on a mapping between the physical presence of an artifact and the presentation of the corresponding electronic artifact. Identity: The identity of a person gives access to second level contextual information. In some context-aware applications highly sophisticated user models hold and infer information about the user s interests, preferences, knowledge and detailed activity logs of physical space movements and electronic artifact manipulations. As described in the following section the identity of a context can also be defined by the group of people that shares a context. Time: Time is an important dimension for describing a context. Time is an important and natural context for many applications. Time context, such as time of day, week, month and season of a year (e.g., working hours vs. weekend). Environment or Activity: The environment describes the artifacts and the physical location of the current situation. In several projects approaches for modeling the artifacts and building taxonomies or ontology about their interrelations are used for selecting and presenting information to a user. Also, this paper distinguishes primary and secondary context types. Primary context types describe the situation of an entity and are used as indices for retrieving second level types of contextual information. 4 Context-Aware Mobile Computing The goal of [2] is to survey the most relevant literature in the area of contextaware mobile computing. Various definitions of context are discussed and the paper presents ways in which context is used. Schmidt try to formally define context, as knowledge about the user s and it device s state, including surroundings, situation, and to a less extent, location. Combining several context values may generate a more powerful understanding 4

5 of the current situation. Primary contexts, including location, entity, activity and time, act as indices into other sources of contextual information. For example, knowing the current location and current time, together with the user s calendar, the application will have a pretty good idea of the user s current social situation, such as having a meeting, sitting in the class, waiting in the airport, and so on. Also, in this paper Chen and Kotz give their own definition of context. Definition 3 Context is the set of environmental states and settings that either determines an application s behavior or in which an application event occurs and is interesting to the user. There are two ways to use context: automatically adapt the behaviors according to discovered context (using active context), or present the context to the user on the fly and/or store the context for the user to retrieve later (using passive context). Thus there are two definitions of context aware computing: Definition 4 Active context awareness: an application automatically adapts to discovered context, by changing the application s behavior. Definition 5 Passive context awareness: an application presents the new or updated context to an interested user or makes the context persistent for the user to retrieve later. Active context-aware computing is more interesting because it leads to new applications on mobile devices and it requires more infrastructure support. 5 The Solar Platform An Open Platform for Context-Aware Mobile Applications, which called Solar, is presented in [3]. Solar is a middleware platform to help context-aware applications aggregate desired context from heterogeneous sources and to locate environmental services depending on the current context. Context information is derived from an array of diverse information sources, such as location sensors, weather or traffic sensors, computer-network monitors, and the status of computational or human services. While the raw sensor data may be sufficient for some applications, many require the raw data to be transformed or fused with other sensor data before it is useful. By aggregating many sensor inputs to derive higher-level context, applications can adapt more accurately. A fundamental challenge in pervasive computing is to collect raw data from thousands of diverse sensors, process the data into context information, and disseminate the information to hundreds of diverse applications running on thousands of devices, while scaling to large numbers of sources, applications, 5

6 [badge="ver648", location= [organization="dartmouth", building="sudikoff", room="20" ] timestamp= ] (a) A location event [measyre="location", badge="ver648", granularity="room", provides="versus" ] (b) A source name $badge loc = any [measure="location",badge="ver648"] [device="camera", color=true, resolutin="640x480", location=$badge loc:location ] (c) A context sensitive name for the mobile camera Figure : The event representation and naming mechanism in Solar and users, securing context information from unauthorized uses, and respecting individual s privacy. In the solar model, context-aware applications respond to context changes by adapting to the new context. These applications are likely to have an eventdriven structure, where context changes are represented as events. An information source publishes events indicating its current state or changes to its state. The sequence of events produced is an event stream. Context-sensitive applications subscribe to event streams that interest them. Solar represents contextual events as a list of hierarchical attribute-value pairs. The internal data structure is a forest with the values at the leaves. An example of an event about the current location of badge numbered VER648 may look like Figure (a). Also, Solar name the sources, using an attribute-based naming scheme. Solar uses an approach that keeps the values order-free but allows a tree structure on attribute names (not values) for convenience, exactly like the representation of Solar events. An example name of the source that tracks badge VER648 is shown in Figure (b). Traditionally a resource directory is fairly static and assumes that names rarely change after they are registered. Context-aware applications, however, may need to look up names based on context. For example, a context-aware display may want to find all nearby cameras. In this case, the physical location is part of the resource description for each camera, which may move frequently. Automatic name updates should be used; for example, attach an active badge to the camera and arrange to have location changes update the camera s name. The name is itself context-sensitive. Solar uses an approach that allows the name for a source to change according to context. Solar provides a unique way to automatically manage context-sensitive 6

7 names by defining the values of contextual attributes to be the output of some sources computing that piece of context. In Figure (c) there is an example of such a context-sensitive name for a mobile camera. It first defines a source that tracks the camera s location (assuming the camera has badge VER648 attached), and then defines the location attribute of that camera to be part of the location event published by the specified source. 6 User Profiles for Caching In [7], a profile specification scheme is presented that allows identifying items of interest. This scheme supports the specification of data dependencies (e.g., the fact that directions to a hotel from the airport are useful only in the presence of the corresponding airline and hotel reservations). Also, the scheme has the ability to specify thresholds, such as the fact that no more than three restaurant recommendations are useful. These extensions to profile formulation reflect a global view of how a selected item relates to other selected items. A simple language is proposed to express objects of interest. To illustrate this profile language, an example profile is presented in Figure 2. Observe that the profile specification is broken into two parts: the Domain clause (DOMAIN) defines the sets of objects of interest and the Utility clause (UTILITY) specifies the relative values of objects contained in each domain set. The value of each object it might be dependent on the presence of another object. Also, it might depend on how many of them appear in the cache. Thus,. A set of objects of interest can have a specific value OR 2. Some of the objects of interest of a set have a value and the rest of them have another value. (UPTO (u, v, w) is a threshold operator: up to u objects have a value of v each, and every object beyond u has a value of w.) OR 3. The value of a set of objects of interest is dependent on the presence of another object of interest. If the last object there is in the cache, the objects take values with the first or the second way. We explain all these in the following example. The Traveler profile might be used to drive data recharging for a traveler about to travel to Boston. Suppose the traveler wants to stay downtown. He needs to get from the airport to a downtown hotel, either by rental car or a shuttle. For a shuttle, he needs a schedule for a company offering shuttle service. For a rental car, he needs rate information for one or more rental car companies and driving directions from the airport to downtown. Even if he takes a shuttle downtown, directions serve some use as they tell him a bit about how to get 7

8 PROFILE Traveler DOMAIN RC=related.hertz.com Sh="shuttle scheduler" AND "airport" AND "Boston" Di="directions to downtown Boston" AND "airport" Ho="Hotel" AND "downtown Boston" Re="Restaurant Review" AND "downtown Boston" UTILITY U(Re)= U(RC[#Di>0])=UPTO(2,2,0) U(Sh)=UPTO(,3,0) U(Di[#Ho>0])=UPTO(,,0) U(Ho[#Di>0 OR #Sh>0])=UPTO(,2,0) END Figure 2: A Profile for Data Recharging about the city. He also needs information about downtown hotels, but only if he has received a shuttle schedule or directions telling him how to get to them. Finally, he would like to see reviews for nearby restaurants. The Domain clause of Traveler identifies 5 domain sets specified by expressions resembling inputs to a search engine. In this profile, RC is a set of rental car company web pages that offer details about rates and policies, Sh is a set of shuttle schedules for shuttles heading to downtown from the airport, Di is a set of web pages, text files etc. that give directions from the airport to downtown, Ho is a set of web pages for hotels located in downtown Boston, and Re is a set of reviews for restaurants also located in downtown Boston. The Utility clause of Traveler specifies 5 utility equations (one for each domain set) that capture the data values and dependencies previously described. Every restaurant review has a value of. The value of rental car web pages (RC objects) is dependent on the presence of Di objects: the condition, [#Di > 0], is true if the number of Di objects in the cache (#Di) is greater than 0. This reflects the dependency of the value of rental car data on having driving directions. The value of RC objects also depends on how many of them appear in the cache. UPTO (2, 2, 0) specifies that the first two RC objects carry a value of 2, and that any more found in the cache have no value. This reflects the preference that having 2 rental car web pages in the cache is useful (so that rates and policies can be compared), but that any more than this is unnecessary. UPTO (u, v, w) is a threshold operator: up to u objects have a value of v each, and every object beyond u has a value of w. Sh, Di and Ho objects are defined similarly to RC objects: up to shuttle schedule has value 3; up to set of 8

9 directions to downtown has value provided that a hotel web pages is in the memory; and up to hotel web page has value 2, provided that either a set of directions or a shuttle schedule are also in the cache. Thus, a cache consisting of two rental car web pages, one set of directions and a hotel web page would have overall value of ((2 + 2) =) 7, and a cache consisting of one shuttle schedule, one rental car web pages and two restaurant reviews would have an overall memory value of ( ( + ) =) 5. 7 Personalization in Database Systems [6] refers to a preference model that assigns to each possible atomic query condition a personal degree of interest and provides an intuitive mechanism to calculate the degree of interest of any complex query condition based on the degrees of interest of the participating atomic conditions. The preferences of each user could be marked with the degree of interest on the part of the user are stored in a user profile. Then the system could automatically consider and integrate them into the initial core query avoiding any additional human effort or use of complex interface. A user s preference of an atomic query element is expressed in the form of a degree of interest, which is a real number in the range [0,]. A particular user s preferences over the contents of a database can be expressed on top of personalization graph of the database. This is a directed graph G(V, E), (V is the set of nodes and E is the set of edges), that can be thought of as an extension schema graph. There are three types of nodes in V :. Relation nodes. One node for each relation in the schema. 2. Attribute nodes. One node for each attribute of each relation in the schema. 3. Value nodes. One node for each possible value of each attribute of each relation in the schema. Likewise, there are two types of edges in E:. Selection edges. An edge from an attribute node to a value node. 2. Join edges. An edge from an attribute node to another attribute node. Two attributes nodes could be connected through two different join edges, in the two possible directions. Consider the database schema below, with information about movie theatres, movies, directors, and actors: theatre(tid,name,phone,region) as th play(tid,mid,date) as pl 9

10 THEATRE CAST ACTOR TID NAME PHONE REGION MID ROLE ACID ACID NAME TID PLAY DATE 0.8 MID DOWNTOWN MID 0.8 MOVIE TITLE YEAR MID DIRECTED DID KIDMAN ROSSELLINI DID HOPKINS NAME MID GENRE DIRECTOR ALLEN LYNCH MGENRE COMEDY THRILLER ADVENTURE Figure 3: Personalization graph corresponding to Julie s profile movie(mid,title,year,plot) as mv cast(mid,acid,award,role) as ca actor(acid,name,sex) as ac directed(mid,did) as dd director(did,name,sex) as di mgenre(mid,genre) as mg Example: Julie prefers theatres located downtown. She is a fan of comedies, enjoy thrillers, and likes adventures to a lesser extent. She is very keen on D. Lynch and N. Kidman, likes A. Hopkins, and finds W. Allen and I. Rosselleni quite interesting. All the above are expressions of interest in selections. She performs searches concerning theatres, movies, actors and directors. Hence, she has preferences expressed over the joins between the corresponding relations, to allow queries on one to take into account her preferences on the others. For example, when Julie asks for movies, she is interested in their directors and to a lesser degree in their actors as well. All of Julie s preferences are captured in her profile, which is graphically depicted in the personalization graph of Figure 3. These preferences may evolve through time as a result Figure 3 illustrates an instance of Julie s profile for a given point in time. Note that the level of a user s desire to include a join into the query qualification may be different depending on which end of the join is already there. For this reason, a join condition may be associated with two different degrees of interest, indicated in the personalization graph with different labels on the 0

11 two distinct edges that correspond to the join condition, one for each possible direction from the node already included in the query to the one that is not. For example, there are two join edges with different labels between the relations movie and play, because it is more important to take into account information about movies when inquiring on theatres than the other way around. Consider a set P N of N compose-able atomic preferences and the corresponding set D N of the degrees of interest: D N = {d i d i : degree of interest in P i e P N, i =... N} For any function f calculating the degree of interest in a transitive preference formed by the atomic preferences in P N, the following must be hold: f(d N ) min(d N ) In other words, the degree of interest in a transitive preference decreases as it moves further away from the part of the graph that the user mentioned originally in the query. The function f is: f(d N ) = d d 2... d N For example, Julie likes movies starring N. Kidman, expressed as an implicit preference on the condition: movie.mid=cast.mid and cast.acid=actor.acid and actor.name= Kidman, N.. The degree of interest associated with the corresponding transitive preference is the product of the degrees of the constituent conditions, which based on her profile, gives = Combination of User Preferences Conjunctive Preference. For any function f calculating the degree of interest in the conjunction of the preferences in P N. Disjunctive Preference. For any function f calculating the degree of interest in the disjunction of the preferences in P N. The functions are the following: f (D N ) = ( d )( d 2 )... ( d N ) and f (D N ) = (d + d d N )/N

12 References [] Norman Adams Bill N. Schilit and Roy Want. Context - Aware Computing Applications. IEEE Workshop on Mobile Computing Systems and Applications, 994. [2] Guanling Chen and David Kotz. A Survey of Context-Aware Mobile Computing Research. Dartmouth Computer Science Technical Report TR [3] Guanling Chen and David Kotz. Solar: An Open Platform for Context- Aware Mobile Application. In Proceedings of the First International Conference on Pervasive Computing, [4] Anind K. Dey. Understanding and Using Context. Personal and Ubiquitous Computing, 200. [5] Tom Gross and Marcus Specht. Awareness in Context - Aware Information Systens. Proc Mensch and Computer 0, 200. [6] Georgia Koutrika and Yannis E. Ioannidis. Personalized Queries Using a Generalized Preference Model. HDMS, [7] Michael J. Franklin Mitch Cherniack, Eduardo F. Galvez and Stan Zdonik. Profile-Driven Cache Management. International Conference on Data Engineering,

A Survey of Context-Aware Mobile Computing Research

A Survey of Context-Aware Mobile Computing Research A Survey of Context-Aware Mobile Computing Research Guanling Chen and David Kotz 2005.11. 14 Cho Jaekyu jkcho@mmlab.snu.ac.kr Contents 1 2 3 4 5 6 7 8 Introduction Definition of Context Context-Aware Computing

More information

Context Aware Computing

Context Aware Computing CPET 565/CPET 499 Mobile Computing Systems Context Aware Computing Lecture 7 Paul I-Hai Lin, Professor Electrical and Computer Engineering Technology Purdue University Fort Wayne Campus 1 Context-Aware

More information

Personalization of Queries in Database Systems

Personalization of Queries in Database Systems Personalization of Queries in Database Systems Georgia Koutrika Yannis Ioannidis Department of Informatics and Telecommunications University of Athens, Hellas {koutrika, yannis}@di.uoa.gr Abstract As information

More information

Contextion: A Framework for Developing Context-Aware Mobile Applications

Contextion: A Framework for Developing Context-Aware Mobile Applications Contextion: A Framework for Developing Context-Aware Mobile Applications Elizabeth Williams, Jeff Gray Department of Computer Science, University of Alabama eawilliams2@crimson.ua.edu, gray@cs.ua.edu Abstract

More information

Personalized Keyword Search Contributions

Personalized Keyword Search Contributions Personalized Keyword Search Contributions Introduction Georgia Koutrika, Alkis Simitsis, Yannis E. Ioannidis: Précis: The Essence of a Query Answer. ICDE 26 Kostas Stefanidis, Marina Drosou, Evaggelia

More information

9/27/15 MOBILE COMPUTING. CSE 40814/60814 Fall System Structure. explicit output. explicit input

9/27/15 MOBILE COMPUTING. CSE 40814/60814 Fall System Structure. explicit output. explicit input MOBILE COMPUTING CSE 40814/60814 Fall 2015 System Structure explicit input explicit output 1 Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment

More information

Context-Aware Systems. Michael Maynord Feb. 24, 2014

Context-Aware Systems. Michael Maynord Feb. 24, 2014 Context-Aware Systems Michael Maynord Feb. 24, 2014 The precise definition of 'context' is contentious. Here we will be using 'context' as any information that can be used to characterize the situation

More information

A Context Based Storage System for Mobile Computing Applications

A Context Based Storage System for Mobile Computing Applications A Context Based Storage System for Mobile Computing Applications Sharat Khungar Jukka Riekki {firstname.lastname}@ee.oulu.fi Department of Electrical and Information Engineering and Infotech Oulu P.O.BOX

More information

Grid Computing Systems: A Survey and Taxonomy

Grid Computing Systems: A Survey and Taxonomy Grid Computing Systems: A Survey and Taxonomy Material for this lecture from: A Survey and Taxonomy of Resource Management Systems for Grid Computing Systems, K. Krauter, R. Buyya, M. Maheswaran, CS Technical

More information

MOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.

MOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input. MOBILE COMPUTING CSE 40814/60814 Spring 2017 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment

More information

Policy-Based Context-Management for Mobile Solutions

Policy-Based Context-Management for Mobile Solutions Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,

More information

MOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.

MOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input. MOBILE COMPUTING CSE 40814/60814 Spring 2018 System Structure explicit input explicit output Context as Implicit Input explicit input explicit output Context: state of the user state of the physical environment

More information

USING SPATIAL CONDITIONS FOR PROACTIVE COMPUTING AND INTERACTION METAPHORS

USING SPATIAL CONDITIONS FOR PROACTIVE COMPUTING AND INTERACTION METAPHORS USING SPATIAL CONDITIONS FOR PROACTIVE COMPUTING AND INTERACTION METAPHORS Sara Streng Institute for Media Informatics University of Munich, Germany sara.streng@ifi.lmu.de Dominique Guinard SAP Research

More information

Personalized Keyword Search Drawbacks found ANNE JERONEN, ARMAND NOUBISIE, YUDIT PONCE

Personalized Keyword Search Drawbacks found ANNE JERONEN, ARMAND NOUBISIE, YUDIT PONCE Personalized Keyword Search Drawbacks found 28..26 ANNE JERONEN, ARMAND NOUBISIE, YUDIT PONCE Introduction Personalized keyword search Drawbacks Suggested solution Introduction Georgia Koutrika, Alkis

More information

Solar: Towards a Flexible and Scalable Data-Fusion Infrastructure for Ubiquitous Computing

Solar: Towards a Flexible and Scalable Data-Fusion Infrastructure for Ubiquitous Computing Solar: Towards a Flexible and Scalable Data-Fusion Infrastructure for Ubiquitous Computing Guanling Chen and David Kotz Dartmouth College Hanover, NH, USA 03755 {glchen, dfk}@cs.dartmouth.edu Abstract

More information

Context-Aware Computing. Ramakrishna Padmanabhan February 12, 2013

Context-Aware Computing. Ramakrishna Padmanabhan February 12, 2013 Context-Aware Computing Ramakrishna Padmanabhan February 12, 2013 Overall Theme What kinds of applications can we create that make good use of context? How can we obtain location? What kind of software

More information

Context-Awareness and Adaptation in Distributed Event-Based Systems

Context-Awareness and Adaptation in Distributed Event-Based Systems Context-Awareness and Adaptation in Distributed Event-Based Systems Eduardo S. Barrenechea, Paulo S. C. Alencar, Rolando Blanco, Don Cowan David R. Cheriton School of Computer Science University of Waterloo

More information

The Role of a Context Service in a System that aims at integrating the Digital with the Real World

The Role of a Context Service in a System that aims at integrating the Digital with the Real World The Role of a Context Service in a System that aims at integrating the Digital with the Real World Dagstuhl Seminar Ubiquitous Computing, 09.09.2001 Fritz Hohl (hohl@sony.de) Telecommunication Research

More information

Browsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments

Browsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments Browsing the World in the Sensors Continuum Agents and Franco Zambonelli Agents and Motivations Agents and n Computer-based systems and sensors will be soon embedded in everywhere all our everyday objects

More information

Modeling and Storing Context-Aware Preferences

Modeling and Storing Context-Aware Preferences Modeling and Storing Context-Aware Preferences Kostas Stefanidis, Evaggelia Pitoura, and Panos Vassiliadis Department of Computer Science, University of Ioannina, {kstef, pitoura, pvassil}@cs.uoi.gr Abstract.

More information

Tizen apps with. Context Awareness, powered by AI. by Shashwat Pradhan, CEO Emberify

Tizen apps with. Context Awareness, powered by AI. by Shashwat Pradhan, CEO Emberify Tizen apps with 1 Context Awareness, powered by AI by Shashwat Pradhan, CEO Emberify Introduction Context refers to information that characterizes a situation, between: Apps People Surrounding environment

More information

Einführung in die Erweiterte Realität

Einführung in die Erweiterte Realität Einführung in die Erweiterte Realität - 7. Context Toolkit - Gudrun Klinker Dec. 2, 2003 Literature Anind K. Dey, Gregory D. Abowd, and Danieal Salber, A Conceptual Framework and a Toolkit for Supporting

More information

Location-Based Social Software for Mobile Devices. Inventors: Dennis Crowley Alex Rainert New York, NY Brooklyn, NY 11231

Location-Based Social Software for Mobile Devices. Inventors: Dennis Crowley Alex Rainert New York, NY Brooklyn, NY 11231 Title: Location-Based Social Software for Mobile Devices Date: April 28, 2004 Inventors: Dennis Crowley Alex Rainert New York, NY 10002 Brooklyn, NY 11231 dens@dodgeball.com alex@dodgeball.com Abstract

More information

Profile-Driven Data Management

Profile-Driven Data Management Profile-Driven Data Management Mitch Cherniack Department of Computer Science Brandeis University mfc@cs.brandeis.edu Joint work: Mike Franklin (Berkeley), Stan Zdonik (Brown) The State of the Web Large

More information

Contextual Database Preferences

Contextual Database Preferences Evaggelia Pitoura Dept. of Computer Science University of Ioannina, Greece pitoura@cs.uoi.gr Contextual Database Preferences Kostas Stefanidis Dept. of Computer Science and Engineering Chinese University

More information

model (ontology) and every DRS and CMS server has a well-known address (IP and port).

model (ontology) and every DRS and CMS server has a well-known address (IP and port). 7 Implementation In this chapter we describe the Decentralized Reasoning Service (DRS), a prototype service implementation that performs the cooperative reasoning process presented before. We present also

More information

CoWSAMI: Interface-aware context gathering in ambient intelligence environments

CoWSAMI: Interface-aware context gathering in ambient intelligence environments Pervasive and Mobile Computing 4 (2008) 360 389 www.elsevier.com/locate/pmc CoWSAMI: Interface-aware context gathering in ambient intelligence environments Dionysis Athanasopoulos a, Apostolos V. Zarras

More information

The quality of any business or industrial process outcomes depend upon three major foundations:

The quality of any business or industrial process outcomes depend upon three major foundations: Ensuring Quality in an Internet of Things Messages between devices, or to/from humans benefits from structure. Version 4, February 5, 2018 Prepared by Michael Scofield, M.B.A. Synopsis... 1 What is the

More information

Simple Rules to Remember When Working with Indexes

Simple Rules to Remember When Working with Indexes Simple Rules to Remember When Working with Indexes Kirk Paul Lafler, Software Intelligence Corporation, Spring Valley, CA Abstract SAS users are always interested in learning techniques related to improving

More information

REAL TIME PUBLIC TRANSPORT INFORMATION SERVICE

REAL TIME PUBLIC TRANSPORT INFORMATION SERVICE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 7, July 2015, pg.88

More information

Using Declarative Models in Multi-device Smart Space

Using Declarative Models in Multi-device Smart Space Using Declarative Models in Multi-device Smart Space Environments Sailesh Sathish 1 2005 Nokia w3cpresentation.ppt / 2007-06-05 / SS Introduction Smart Space What is smart space? Smart space is any smart

More information

TEMPORAL/SPATIAL CALENDAR EVENTS AND TRIGGERS

TEMPORAL/SPATIAL CALENDAR EVENTS AND TRIGGERS Technical Disclosure Commons Defensive Publications Series March 05, 2015 TEMPORAL/SPATIAL CALENDAR EVENTS AND TRIGGERS Daniel Klein Dean Jackson Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

PRE-ARRIVAL DESTINATION PREPARATION

PRE-ARRIVAL DESTINATION PREPARATION Technical Disclosure Commons Defensive Publications Series October 02, 2017 PRE-ARRIVAL DESTINATION PREPARATION Follow this and additional works at: http://www.tdcommons.org/dpubs_series Recommended Citation

More information

A Middleware for Context-Aware Agents in Ubiquitous Computing Environments *

A Middleware for Context-Aware Agents in Ubiquitous Computing Environments * A Middleware for Context-Aware Agents in Ubiquitous Computing Environments * Anand Ranganathan and Roy H. Campbell Department of Computer Science University of Illinois at Urbana-Champaign, USA {ranganat,rhc}@uiuc.edu

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

White Paper: VANTIQ Digital Twin Architecture

White Paper: VANTIQ Digital Twin Architecture Vantiq White Paper www.vantiq.com White Paper: VANTIQ Digital Twin Architecture By Paul Butterworth November 2017 TABLE OF CONTENTS Introduction... 3 Digital Twins... 3 Definition... 3 Examples... 5 Logical

More information

TOWARDS MOBILE SEMANTIC GRID FOR INFOMOBILITY

TOWARDS MOBILE SEMANTIC GRID FOR INFOMOBILITY TOWARDS MOBILE SEMANTIC GRID FOR INFOMOBILITY Mario BINETTI 1, Paola AMORUSO 1, Eugenio DI SCIASCIO 2, Michele RUTA 2, Agnese PINTO 2 Abstract. Flexible and effective information services in transport

More information

Introduction to Databases and SQL

Introduction to Databases and SQL Introduction to Databases and SQL Files vs Databases In the last chapter you learned how your PHP scripts can use external files to store and retrieve data. Although files do a great job in many circumstances,

More information

User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps

User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps Position Paper Gökhan Bal, Kai Rannenberg Goethe University Frankfurt

More information

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing

More information

Context Switch DAVID KALINSKY

Context Switch DAVID KALINSKY DAVID KALINSKY f e a t u r e Context Switch From the humble infinite loop to the priority-based preemptive RTOS and beyond, scheduling options are everywhere to be found. This article offers a survey and

More information

GENERATING HIGH LEVEL CONTEXT FROM SENSOR DATA FOR MOBILE APPLICATIONS

GENERATING HIGH LEVEL CONTEXT FROM SENSOR DATA FOR MOBILE APPLICATIONS GENERATING HIGH LEVEL CONTEXT FROM SENSOR DATA FOR MOBILE APPLICATIONS Wolfgang Woerndl 1, Christian Schueller 2, Thomas Rottach 1,2 1 Technische Universitaet Muenchen, Institut fuer Informatik Boltzmannstr.

More information

Fast Contextual Preference Scoring of Database Tuples

Fast Contextual Preference Scoring of Database Tuples Fast Contextual Preference Scoring of Database Tuples Kostas Stefanidis Department of Computer Science, University of Ioannina, Greece Joint work with Evaggelia Pitoura http://dmod.cs.uoi.gr 2 Motivation

More information

A Survey on Representation, Composition and Application of Preferences in Database Systems

A Survey on Representation, Composition and Application of Preferences in Database Systems A Survey on Representation, Composition and Application of Preferences in Database Systems KOSTAS STEFANIDIS Chinese University of Hong Kong, Hong Kong GEORGIA KOUTRIKA IBM Almaden Research Center, USA

More information

Ontology based Model and Procedure Creation for Topic Analysis in Chinese Language

Ontology based Model and Procedure Creation for Topic Analysis in Chinese Language Ontology based Model and Procedure Creation for Topic Analysis in Chinese Language Dong Han and Kilian Stoffel Information Management Institute, University of Neuchâtel Pierre-à-Mazel 7, CH-2000 Neuchâtel,

More information

Controlled vocabularies, taxonomies, and thesauruses (and ontologies)

Controlled vocabularies, taxonomies, and thesauruses (and ontologies) Controlled vocabularies, taxonomies, and thesauruses (and ontologies) When people maintain a vocabulary of terms and sometimes, metadata about these terms they often use different words to refer to this

More information

A System for Discovering Regions of Interest from Trajectory Data

A System for Discovering Regions of Interest from Trajectory Data A System for Discovering Regions of Interest from Trajectory Data Muhammad Reaz Uddin, Chinya Ravishankar, and Vassilis J. Tsotras University of California, Riverside, CA, USA {uddinm,ravi,tsotras}@cs.ucr.edu

More information

What is a multi-model database and why use it?

What is a multi-model database and why use it? What is a multi-model database and why use it? An When it comes to choosing the right technology for a new project, ongoing development or a full system upgrade, it can often be challenging to define the

More information

Modeling and Storing Context-Aware Preferences

Modeling and Storing Context-Aware Preferences Modeling and Storing Context-Aware Preferences Kostas Stefanidis, Evaggelia Pitoura, and Panos Vassiliadis Department of Computer Science, University of Ioannina, Greece {kstef, pitoura, pvassil}@cs.uoi.gr

More information

HCI Lecture 14. Special Issues: Ubiquitous computing

HCI Lecture 14. Special Issues: Ubiquitous computing HCI Lecture 14 Special Issues: Ubiquitous computing Barbara Webb Key points: Making the computer part of the environment Mobile devices Implicit input Ambient output Continuous interaction Issues for design

More information

Use C ases Cases 7/09

Use C ases Cases 7/09 Use Cases 7/09 Groups of 3 Recorder/Timekeeper Participation checker Devil s Advocate Motivation One way to describe a system is to create a story, y, the interaction between a user and the system This

More information

Video Prototype. CSE 440 Autumn 2008 Assignment 4 Online URL

Video Prototype. CSE 440 Autumn 2008 Assignment 4 Online URL Video Prototype CSE 440 Autumn 2008 Assignment 4 Online URL http://www.cs.washington.edu/education/courses/440/08au/project_files/parking/ Group Manager Design Usability Test Documentation Jonathan McKay

More information

A Location Model for Ambient Intelligence

A Location Model for Ambient Intelligence A Location Model for Ambient Intelligence National Institute of Informatics, Japan Email: ichiro@nii.ac.jp Outline 1. Motivation 2. Approach 3. Location Model 4. Design and Implementation 5. Applications

More information

Week 3: Context-Aware Computing

Week 3: Context-Aware Computing Week 3: Context-Aware Computing Pattie Maes MIT Media Lab Context-Aware Computing Using "context knowledge" such as location, time of day, activity(ies) user is involved in To change interaction of user

More information

A Tutorial on The Jini Technology

A Tutorial on The Jini Technology A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far A Tutorial on The Jini Technology Lian Chen Introduction Jini network technology provides a simple

More information

An Extension of the Use Case Diagram to Model Context-aware Applications

An Extension of the Use Case Diagram to Model Context-aware Applications An Extension of the Use Case Diagram to Model Context-aware Applications Ahmed Al-alshuhai Software Technology Research Laboratory De Montfort University The Gateway, Leicester LE1 9BH, UK p07143453@myemail.dmu.ac.uk

More information

A Reference Model for Context-Aware Mobile Services

A Reference Model for Context-Aware Mobile Services A Reference Model for Context-Aware Mobile Services Jacqueline Floch, Svein Hallsteinsen, Arne Lie and Hans I. Myrhaug SINTEF Telecom and Informatics, N-7465 Trondheim, Norway E-mail: {Jacqueline.Floch,

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Context-aware Services for UMTS-Networks*

Context-aware Services for UMTS-Networks* Context-aware Services for UMTS-Networks* * This project is partly financed by the government of Bavaria. Thomas Buchholz LMU München 1 Outline I. Properties of current context-aware architectures II.

More information

Demystifying PROC SQL Join Algorithms

Demystifying PROC SQL Join Algorithms Demystifying PROC SQL Join Algorithms Kirk Paul Lafler, Software Intelligence Corporation, Spring Valley, California ABSTRACT When it comes to performing PROC SQL joins, users supply the names of the tables

More information

Optimizing Simulation of Movement in Buildings by Using People Flow Analysis Technology

Optimizing Simulation of Movement in Buildings by Using People Flow Analysis Technology Mobility Services for Better Urban Travel Experiences Optimizing Simulation of Movement in Buildings by Using People Flow Analysis Technology The high level of progress in urban planning is being accompanied

More information

FROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE

FROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE FROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE David C. Hay Essential Strategies, Inc In the buzzword sweepstakes of 1997, the clear winner has to be Data Warehouse. A host of technologies and techniques

More information

Overcoming Cellular Connectivity Limitations with M2Blue Autonomic Distributed Data Caching

Overcoming Cellular Connectivity Limitations with M2Blue Autonomic Distributed Data Caching Overcoming Cellular Connectivity Limitations with M2Blue Autonomic Distributed Data Caching 1 Brian Dougherty, 1 Daniel Guymon, 2 Douglas C. Schmidt and 1 Jules White 1 Virginia Tech, {brianpd,dguymon,julesw}@vt.edu

More information

Taxonomies and controlled vocabularies best practices for metadata

Taxonomies and controlled vocabularies best practices for metadata Original Article Taxonomies and controlled vocabularies best practices for metadata Heather Hedden is the taxonomy manager at First Wind Energy LLC. Previously, she was a taxonomy consultant with Earley

More information

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN NOTES ON OBJECT-ORIENTED MODELING AND DESIGN Stephen W. Clyde Brigham Young University Provo, UT 86402 Abstract: A review of the Object Modeling Technique (OMT) is presented. OMT is an object-oriented

More information

Context Aware Computing. Unit IV-First part

Context Aware Computing. Unit IV-First part Context Aware Computing Unit IV-First part Types of Context Enumeration based: In which context is defined in terms of its carious categorization Role based: In which context is defined in terms of

More information

Active Adaptation in QoS Architecture Model

Active Adaptation in QoS Architecture Model Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex

More information

An Archiving System for Managing Evolution in the Data Web

An Archiving System for Managing Evolution in the Data Web An Archiving System for Managing Evolution in the Web Marios Meimaris *, George Papastefanatos and Christos Pateritsas * Institute for the Management of Information Systems, Research Center Athena, Greece

More information

Ubicomp and Physical Interaction

Ubicomp and Physical Interaction Ubicomp and Physical Interaction Ubicomp? Computation embedded in the physical spaces around us Ambient intelligence Take advantage of naturally-occurring actions and activities to support people Input

More information

CPS221 Lecture: Threads

CPS221 Lecture: Threads Objectives CPS221 Lecture: Threads 1. To introduce threads in the context of processes 2. To introduce UML Activity Diagrams last revised 9/5/12 Materials: 1. Diagram showing state of memory for a process

More information

4. CONTAINER DATABASE OBJECT ORIENTED DESIGN

4. CONTAINER DATABASE OBJECT ORIENTED DESIGN 32 4. CONTAINER DATABASE OBJECT ORIENTED DESIGN We propose an Object-oriented design for the Container Database. The abstraction itself is not necessarily dependent on OO technologies nor do we claim it

More information

C O N TA C T !!!!!! Portfolio Summary. for more information July, 2014

C O N TA C T !!!!!! Portfolio Summary. for more information  July, 2014 C O N TA C T IQ Portfolio Summary July, 2014 for more information www.concerttechnology.com bizdev@concerttechnology.com C o n c e r t T e c h n o l o g y Overview SOCIAL GRAPH ContactIQ is a collection

More information

Social Media and Masonry

Social Media and Masonry Social Media and Masonry What is social media? Social media describes the various ways of using technology to connect with an audience. Every Lodge should have a social media or outreach program that connects

More information

SQTime: Time-enhanced Social Search Querying

SQTime: Time-enhanced Social Search Querying SQTime: Time-enhanced Social Search Querying Panagiotis Lionakis 1, Kostas Stefanidis 2, and Georgia Koloniari 3 1 Department of Computer Science, University of Crete, Heraklion, Greece lionakis@csd.uoc.gr

More information

Context-Aware Services

Context-Aware Services Chapter 6 Context-Aware Services 6.1 Rationale and Motivation As the user becomes swamped with more and more information, filtering this information becomes ever more important. This is especially true

More information

Module 5. Function-Oriented Software Design. Version 2 CSE IIT, Kharagpur

Module 5. Function-Oriented Software Design. Version 2 CSE IIT, Kharagpur Module 5 Function-Oriented Software Design Lesson 12 Structured Design Specific Instructional Objectives At the end of this lesson the student will be able to: Identify the aim of structured design. Explain

More information

CoWSAMI: Interface-Aware Context Gathering in Ambient Intelligence Environments

CoWSAMI: Interface-Aware Context Gathering in Ambient Intelligence Environments CoWSAMI: Interface-Aware Context Gathering in Ambient Intelligence Environments Dionisis Athanasopoulos a Apostolos Zarras a, Valerie Issarny b Evaggelia Pitoura a Panos Vassiliadis a a Dept. of Computer

More information

Automatic visual recognition for metro surveillance

Automatic visual recognition for metro surveillance Automatic visual recognition for metro surveillance F. Cupillard, M. Thonnat, F. Brémond Orion Research Group, INRIA, Sophia Antipolis, France Abstract We propose in this paper an approach for recognizing

More information

VITP: An Information Transfer Protocol for Vehicular Computing

VITP: An Information Transfer Protocol for Vehicular Computing VITP: An Information Transfer Protocol for Vehicular Computing Marios D. Dikaiakos, Saif Iqbal,Tamer Nadeem, Liviu Iftode Adapted from the work of Marios D. Dikaiakos 2nd ACM International Symposium on

More information

Using Data Mining to Determine User-Specific Movie Ratings

Using Data Mining to Determine User-Specific Movie Ratings Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Episode 15: Context Awareness

Episode 15: Context Awareness Episode 15: Context Awareness Hannes Frey and Peter Sturm University of Trier based on slides by Christian Becker, University of Stuttgart Definition of Context Context (Merriam Webster) contexere: to

More information

Accelerating BI on Hadoop: Full-Scan, Cubes or Indexes?

Accelerating BI on Hadoop: Full-Scan, Cubes or Indexes? White Paper Accelerating BI on Hadoop: Full-Scan, Cubes or Indexes? How to Accelerate BI on Hadoop: Cubes or Indexes? Why not both? 1 +1(844)384-3844 INFO@JETHRO.IO Overview Organizations are storing more

More information

G.A Collaborative Project of the 7 th Framework Programme. 1 st Prototype Description. v.1 [29/12/2010]

G.A Collaborative Project of the 7 th Framework Programme. 1 st Prototype Description. v.1 [29/12/2010] G.A.247447 Collaborative Project of the 7 th Framework Programme 1 st Prototype Description v.1 [29/12/2010] www.brainable.org Document Information Project Number 247447 Acronym BrainAble Full title Project

More information

Application of Clustering Techniques to Energy Data to Enhance Analysts Productivity

Application of Clustering Techniques to Energy Data to Enhance Analysts Productivity Application of Clustering Techniques to Energy Data to Enhance Analysts Productivity Wendy Foslien, Honeywell Labs Valerie Guralnik, Honeywell Labs Steve Harp, Honeywell Labs William Koran, Honeywell Atrium

More information

Deep Web Content Mining

Deep Web Content Mining Deep Web Content Mining Shohreh Ajoudanian, and Mohammad Davarpanah Jazi Abstract The rapid expansion of the web is causing the constant growth of information, leading to several problems such as increased

More information

Caching video contents in IPTV systems with hierarchical architecture

Caching video contents in IPTV systems with hierarchical architecture Caching video contents in IPTV systems with hierarchical architecture Lydia Chen 1, Michela Meo 2 and Alessandra Scicchitano 1 1. IBM Zurich Research Lab email: {yic,als}@zurich.ibm.com 2. Politecnico

More information

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction A Data-Centric Approach for Modular Assurance Gabriela F. Ciocarlie, Heidi Schubert and Rose Wahlin Real-Time Innovations, Inc. {gabriela, heidi, rose}@rti.com Abstract. A mixed-criticality system is one

More information

Introduction to the Semantic Web

Introduction to the Semantic Web ITTALKS Introduction to the Web example applications ITTALKS is a database driven web site of IT related talks at UMC and other institutions. The database contains information on Seminar events http://ittalks.org/

More information

City Research Online. Permanent City Research Online URL:

City Research Online. Permanent City Research Online URL: Goker, A.S., Myrhaug, H., Whitehead, N., Faegri, T.E. & Lech, T.C. (2004). AmbieSense: a system and reference architecture for personalised and context-sensitive information services for mobile users.

More information

Shared Sensemaking: Enhancing the Value of Collaborative Web Search Tools

Shared Sensemaking: Enhancing the Value of Collaborative Web Search Tools Shared Sensemaking: Enhancing the Value of Collaborative Web Search Tools Meredith Ringel Morris Microsoft Research Redmond, WA, USA merrie@microsoft.com Saleema Amershi University of Washington Seattle,

More information

Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network

Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network Wireless Sensor Network, 2010, 2, 710-717 doi:10.4236/wsn.2010.29086 Published Online September 2010 (http://www.scirp.org/journal/wsn) Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor

More information

Licentiate Thesis proposal

Licentiate Thesis proposal Licentiate Thesis proposal Context-addressed communication dispatch Alisa Devlic Royal Institute of Technology (KTH) Primary advisor: Prof. Gerald Q. Maguire Jr. Secondary advisor: Prof. Mark Smith Committee

More information

Chapter 1. Types of Databases and Database Applications. Basic Definitions. Introduction to Databases

Chapter 1. Types of Databases and Database Applications. Basic Definitions. Introduction to Databases Chapter 1 Introduction to Databases Types of Databases and Database Applications Numeric and Textual Databases Multimedia Databases Geographic Information Systems (GIS) Data Warehouses Real-time and Active

More information

Chapter : Analysis Modeling

Chapter : Analysis Modeling Chapter : Analysis Modeling Requirements Analysis Requirements analysis Specifies software s operational characteristics Indicates software's interface with other system elements Establishes constraints

More information

Location-Based Services & Route Planning

Location-Based Services & Route Planning Praktikum Mobile und Verteilte Systeme Location-Based Services & Route Planning Prof. Dr. Claudia Linnhoff-Popien André Ebert, Sebastian Feld http://www.mobile.ifi.lmu.de WS 2017/18 Praktikum Mobile und

More information

Unified management of heterogeneous sensors for complex event processing

Unified management of heterogeneous sensors for complex event processing Risk Analysis VI 445 Unified management of heterogeneous sensors for complex event processing M. Valdés, I. Nieto, V. Guardiola, D. Gil & A. Gómez-Skarmeta University of Murcia, Spain Abstract The turn

More information

Technical Report GIT-GVU The Context Toolkit: Aiding the Development of Context-Enabled Applications

Technical Report GIT-GVU The Context Toolkit: Aiding the Development of Context-Enabled Applications The Context Toolkit: Aiding the Development of Context-Enabled Applications Daniel Salber, Anind K. Dey, Gregory D. Abowd GVU Center, College of Computing Georgia Institute of Technology 801 Atlantic Drive

More information

The Service Availability Forum Platform Interface

The Service Availability Forum Platform Interface The Service Availability Forum Platform Interface The Service Availability Forum develops standards to enable the delivery of continuously available carrier-grade systems with offthe-shelf hardware platforms

More information

A Lightweight Location System for Sentient Artefacts

A Lightweight Location System for Sentient Artefacts A Lightweight Location System for Sentient Artefacts Fahim Kawsar, Kaori Fujinami, Tatsuo Nakajima Department of Information and Computer Science, Waseda University, Tokyo, Japan {fahim,fujinami,tatsuo}@dcl.info.waseda.ac.jp

More information

Data Modeling Using the Entity-Relationship (ER) Model

Data Modeling Using the Entity-Relationship (ER) Model CHAPTER 3 Data Modeling Using the Entity-Relationship (ER) Model Copyright 2017 Ramez Elmasri and Shamkant B. Navathe Slide 1-1 Chapter Outline Overview of Database Design Process Example Database Application

More information