Ubiquitous Computing

advertisement
Ubiquitous Computing
What is Ubiquitous Computing?
“Ubiquitous computing is the method of enhancing computer use by making many
computers available throughout the physical environment, but making them effectively
invisible to the user”.[7]
The most profound technologies are those that disappear. They weave themselves into the
fabric of everyday life until they are indistinguishable from it.[8]
About 15 years ago few years ago, I bought a used car which had an engine that would
inexplicably cut out at random. On the highway, in busy intersections or on quiet streets,
I could never rely on this car to get me from here to there. After many trips to the
original dealer and my own mechanic, many relatively inexpensive parts were replaced
with no success at resolving the problem. Finally, the mechanic said that the only thing
left was to replace the “computer”. I didn’t even know this car had a computer!
In this happy circumstance, the computer was warranted for 50,000 miles. The odometer
read 49,000…free computer. Better yet, the problem was resolved.
This is the essence of Ubiquitous Computing. The human interacts with various devices
and the environment and has no need for knowledge that a computer is involved.
Ubiquitous Computing looks forward to the day when computers (from tiny computer
chips to super computers) will be seamlessly and transparently used in all aspects of our
everyday lives.
What Ubiquitous Computing is not.
The analogy that is often held up as an example of Ubiquitous Computing is the
refrigerator that can tell you when to buy more milk.[5] This is a good example to
contemplate as it can help us learn what Ubiquitous Computing is and is not.
Although some people consider the “buy more milk command” a part of the Ubiquitous
Computing environment, there are others who consider that and other superficial
functions to be do-able, but impractical and thus not worth the long term effort that would
be required to bring them to reality.
“What is striking about most of these
scenarios is the marginal and irrelevant character of the
needs referred to in them and of the envisioned
enhancements of the activities”[3]
Even more striking is the stark contrast between the
marginality of the enhancements and the complexity of the
computing infrastructure required to achieve them.[3]
Knowing when to buy milk is a personal decision, involving not only how much milk is
left, but also what your future plans are. Are you going to be out of town for the next few
days?
Are you going to have friends over for coffee… or cocoa? Ubiquitous
Computing technology can be used to make simple decisions for us, but should it?
“A few places in the world have begun work on a possible next generation computing
environment in which each person is continually interacting with hundreds of nearby
wirelessly interconnected computers. The point is to achieve the most effective kind of
technology, that which is essentially invisible to the user.”[7]
So the goal of Ubiquitous Computing is not to use computers to do unimportant tasks
(which may become a consequence of Ubiquitous Computing), but rather, to create a vast
infrastructure of computers that will be available to serve humans needs.
Requirements for Ubiquitous Computing
Ubiquitous Computing has two basic requirements:
-
-
Natural interfaces – “We desire natural interfaces that facilitate a richer variety of
communications capabilities between humans and computation.”[1]
Ubiquitous Computing technology requires computers to be able to input
information from natural human activity. That is, a human shouldn’t have to
explicitly enter data into a computer. Humans communicate through speech,
handwriting, gestures. Research is being conducted on how to translate that
human communication into computer usable data.
Context-awareness – “Ubicomp applications need to be context-aware, adapting
their behavior based on information sensed from the physical and computational
environment.[1]
That is, in addition to recognizing Natural Interfaces from human activity,
computer devices can become aware of elements in the environment, including
other computing devices. The Pharmaceutical industry is currently testing the
imbedding of computer chips in the boxes of product (Radio Frequency
Identification – RFID Technology). These chips can be queried by other devices
as they move from manufacturer to retailer, so that each box of product can be
traced.[5]
Thus the concept of Ubiquitous Computing doesn’t mean just that there are lots of
computers in the environment, they also must collect data by monitoring natural
human activity and be able to interact with other computing devices.
Data Capture Problems
Researchers are currently studying new materials and devices for data capture. Although
Ubiquitous Computing requires seamless interfaces, it does not preclude the use of new
materials and devices for data capture. Electronic Whiteboards, audio and video devices,
pens and tablets, new types of ink and other devices are being developed and tested.
[4][3][8] Use of these devices is not invisible to the user; but as they become more
familiar, they will be more acceptable to Ubiquitous Computing technology.
We are familiar with basic programming support for keyboard and mouse operations,
Researchers are also working on basic programming support for audio, video and
pens to parse and interpret that information. [3][5]
Capturing human activity in a way that allows a computer to manipulate that data, is
often very difficult. Handwriting is one example. Electronically capturing the hand
movement is relatively easy using special pens, inks and tablets. But interpreting and
manipulating those strokes as words and numbers or other symbols is much more
difficult.
Location awareness is an important aspect of Ubiquitous Computing. The most well
known example is the Global Position System (GPS) device that can report where it is
anywhere in the world. But there has also been research into Active Badges [8] and other
location aware devices. It is important to note that no location-aware devices work
everywhere, thus, a “handoff’ of information from one device to another will be required
in some cases.
“There is more to context than position and identity. Most context-aware systems still do
not incorporate knowledge about time, history(recent or long past), other people than the
user, as well a many other pieces of information often available in our environment”[1]
Current systems focus their attention on one person. In a Ubiquitous Computing
environment computers will have to incorporate the relationship of many people.[1]
Generally, current systems are not aware of the passage of time (except for effective
dated records). A baseline of behavior over time is of particular interest in Ubiquitous
Computing.[1]
Sensing contextual information such as body temperature, heart rate and galvanic skin
response will help understand why people act as they do.[1] Devices to transmit and
capture this information will be useful in a Ubiquitous Computing environment.
Other areas that need to be explored
-
Context Fusion – No single device works in all environments (GPS often doesn’t
work indoors). Compatible devices must be developed to hand off information
from one device to another to in order to maintain location awareness.[1]
-
-
-
Network Protocols “Ubicomp changes the emphasis in networking in at least four
areas: wireless media access, wide bandwidth, real-time capabilities for
multimedia over standard networks, and packet routing.[7]
Audio/video recording is easy, but systems to quickly retrieve specific
information still need to be developed. For example audio recordings of the
construction of a building could aid in maintenance.[1] Also with current
technology recording “everything” isn’t an option. Decisions currently need to be
made as to what information will be relevant in the future. As audio/video
recordings move from the personal to recording public settings, privacy issues
will have to be explored.
Merging of multiple forms of media will add value to the Ubiquitous Computing
environment.
One function that could be considered close to Ubiquitous Computing is eMail. You can
go to any computer workstation (that is connected to the Internet) and get your email
regardless of who your eMail service provider is. Many people can go to any one of
many display terminals and get eMail from one of many providers. The next step that
would make it truly Ubiquitous Computing is that each person would have to carry or
ware or have imbedded some sort of identifying device that would either contain or point
to the person’s eMail provider, username and password.
This is a big stumbling block. How much personal information do we want to be
broadcast over the internet? This is one of the conundrums for Ubiquitous Computing.
Pure Ubiquitous Computing requires that computers be able to recognize individual
people without any need for the person to specifically communicate with the computer.
On the other hand, we don’t want to have our personal information available for anyone
(any computer) to pick up
Study to decide how to provide maximum usable information for a Ubiquitous
Computing environment, without providing personal information that can be connected
to a specific person, will have to be conducted. Also how can we secure personal
identification devices?
Capture-and-access research
There has been considerable research in the area of meeting-room/classroom
environments:
- Schmandt and Arons, 1985 and Hindus and Schmandt, 1992 recorded phone
conversations and test ways to access the content.
- The Tivoli System (Minneman et.al, 1995) used various software tools for
recording note taking.
- Electronic Whiteboard technology (Elrod et al, 1992)
- Classroom 2000 (Abdowd, 1999) merged audio and video and ink media to
access and displays the recordings in a synchronized fashion.
-
Experiments with support of capture of brainstorming sessions (Brotherton et al.
1999) and structured design meetings (Richter et al. 1999)
Author’s Conclusion
By its nature, Ubiquitous Computing is always a many-to-many relationship, many
computers, many people and objects. Thus it can be extrapolated that in a truly
Ubiquitous environment, Standards must come first. That’s not to say that proprietary
work isn’t a necessary prerequisite to the standards, but a function can’t become
Ubiquitous until the standards are in place. This has profound implications as to how the
Ubiquitous Computing environment will be built. How do we reimburse an organization
for their investment in developing a Ubiquitous Computing feature when the
specifications have to be distributed to other manufactures after the standards are set?
A great deal of thought will have to be invested in the question of personal information
security. Truly Ubiquitous Computing requires that a significant amount of personal
information be freely available for computers to pick-up and process. How to draw the
line between necessary information and unnecessary private information will be a
difficult problem.
In the classroom there has been some research into video recording of classroom lectures
and creating indexes so that a student reviewing the recording can quickly find a specific
portion of the lecture. In addition there has been research into electronic whiteboard, pen
and tablet forms of data capture. Before this feature can be truly ubiquitous the
technology of video storage will have to be advanced so that the cost of storing all
lectures will be considered trivial. The technology of creating indexes is secondary in
importance. If good classroom videos are ubiquitous then electronic whiteboards and
electronic tablets would be unnecessary.
Bibliography
[1]Abowd, Gregory D. and Mynatt, Elizabeth D. “Charting Past, Present, and Future
Research in Ubiquitous Computing”, ACM Transactions on Computer-Human
Interaction, Vol 7, No 1, March 2000, PP28-58
[2] Agu,Emmanuel , “CS 525M Mobile and Ubiquitous Computing Seminar”
http://www.cs.wpi.edu/~emmanuel/courses/mobile_computing/slides/mc_intro_01_20.pd
f
[3] Araya, Agustin A., “Questioning Ubiquitous Computing”, Proceedings of the 1995
ACM 23rd Annual Conference on Computer Science, PP230 – 237, Nashville, TN, 1995
Also at
http://delivery.acm.org/10.1145/260000/259560/p230araya.pdf?key1=259560&key2=1577869801&coll=portal&dl=ACM&CFID=11111111&
CFTOKEN=2222222
[4] Dourish, Paul, “What we talk about when we talk about context”, Personal and
Ubiquitous Computing, vol 8, Issue 1,February, 2004 Also at
http://delivery.acm.org/10.1145/980000/970985/40080019.pdf?key1=970985&key2=414
7869801&coll=portal&dl=ACM&CFID=11111111&CFTOKEN=2222222
[5] Forcinio,
Hallie , “What can Radio Frequency Identification Do for Pharmaceutical
Packaging?”, Pharmaceutical Technology, Vol 27, No. 5, May, 2003 also at
http://www.trenstar.com/pdfs/may_03_pharm_tech.pdf
[6] Rhodes, Bradley J., Minar, Nelson and Weaver, Josh,”Wearable Computing Meets
Ubiquitous Computing” The Proceedings of The Third International Symposium on
Wearable Computers (ISWC '99), San Francisco, CA, October 18-19 1999, pp. 141-149.
also at: http://xenia.media.mit.edu/~rhodes/Papers/wearhive.html
[7]Weiser, Mark, “Some computer science issues in Ubiquitous Computing”, March 23,
1993, http://www.ubiq.com/hypertext//weiser,/UbiCACM.html
[8] Weiser, M. (1991) The Computer for the Twenty-First
Century. Scientific American, 265 (3), 94- 104. also at
http://www.ubiq.com/hypertext/weiser/SciAmDraft3.html
Download