Guest Editors' Introduction: Hostile Environments The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation Lukowicz, Paul, Mary G. Baker, and Joseph Paradiso. “Guest Editors’ Introduction: Hostile Environments.” IEEE Pervasive Computing 9.4 (2010): 13–15. Web. © 2012 IEEE. As Published http://dx.doi.org/10.1109/MPRV.2010.80 Publisher IEEE Computer Society Version Final published version Accessed Wed May 25 18:05:18 EDT 2016 Citable Link http://hdl.handle.net/1721.1/70571 Terms of Use Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. Detailed Terms GUEST EDITORS’ INTRODUCTION e l i s t t s n Ho ironme v n E H ostile environments are a particularly relevant application of pervasive computing. The technology can save lives by both eliminating the need for humans to work in these environments and supporting them when they do. Examples of application areas include fi rePaul Lukowicz fighting,1 search and rescue, 2 University of Passau, Germany the military, 3 and environmental monitoring.4,5 PotenMary G. Baker tially hostile environments for HP Labs Palo Alto humans include outer space, caves, the arctic, deserts, junJoseph Paradiso gles, underwater, and certain MIT Media Lab industrial or research settings, such as nuclear power stations, accelerator beamlines, biohazard zones, and chemical plants. Significant challenges for pervasive systems are often also found in sports (for example, swimming6 Published by the IEEE CS ■1536-1268/10/$26.00©2010IEEE or skiing7 ), which can at times involve user risk. In general, environments that are hazardous to humans are hard on technology as well. Of course, nonhazardous situations can also strain the technology—for example, monitoring machinery that creates intensive, high-frequency vibrations can be hard on the electronics without being dangerous to humans. Applications in Hostile Environments We can distinguish three broad categories of applications in hostile environments, which are exemplified by the articles in this special issue. Environmental monitoring is the traditional domain of sensor networks and has a large pool of research and applications.8 Devices record and forward simple parameters, often over large areas and extended time periods. Such applications facilitate the study of PER VA SI V E computing 13 GUEST EDITORS’ INTRODUCTION the AUTHORS Paul Lukowicz is a professor of computer science at the University of Passau, Germany. His research interests include pervasive and ubiquitous computing, particularly activity and context recognition and wearable systems. Lukowicz has a PhD in computer science from the University of Karlsruhe, Germany. Contact him at paul.lukowicz@uni-passau.de. Mary G. Baker is a senior research scientist at HP Labs Palo Alto. Her research interests include distributed systems, networks, mobile systems, and digital preservation. Baker has a PhD in computer science from the University of California, Berkeley. She’s a member of Usenix, the ACM, and IEEE. Contact her at mary.baker@hp.com. Joseph Paradiso is an associate professor of Media Arts and Sciences at MIT Media Lab, where he directs the Responsive Environments Group, which explores how sensor networks augment and mediate human experience, interaction, and perception. Paradiso has a PhD in physics from MIT’s Lab for Nuclear Science. He’s a senior member of IEEE and the American Institute of Aeronautics and Astronautics, and a member of the American Physical Society, the ACM, and Sigma Xi. Contact him at joep@media.mit.edu. environments that are hostile or not easily accessible without endangering humans. In this issue, Marcus Chang and Philippe Bonnet’s article on arctic monitoring represents this category. Going beyond monitoring of simple parameters, pervasive computing also offers situational awareness and tactical support, assisting teams engaged in activities in hazardous environments with complex, integrated information and extended communication and collaboration capabilities.1 The article on wildfire monitoring by Cristina Barrado and her colleagues exemplifies this domain. Pervasive systems can also focus on the individual, enhancing his or her ability to deal with a hazardous situation. Functionality can range from guidance support and advanced communication capabilities to hazard warnings.9 In most cases, appropriate user interfaces are a key issue, and wearable computing solutions play an important role. In this issue, the LifeBelt article by Alois Ferscha and 14 PER VA SI V E computing Kashif Zia is an example of such an application type. Technology challenges come mainly from four sources: • the harshness of the environment, in which factors such as temperature, vibration, or radiation have significant impact on hardware reliability and stability and require special precautions; • the environment’s impact on the system’s ability to function correctly, in particular with respect to sensordata collection and communication; • the need for safety-critical systems with high data reliability and accuracy; and • the need for interaction concepts that provide full access to the required functionality without distracting the user from the physical world. Although such interaction requirements in this last challenge are common of many pervasive systems, they’re particularly critical and difficult in hostile environments, where undue distractions can be life threatening. In This Issue This issue contains three articles and a Spotlight column, all of which illustrate many of the issues discussed here. Chang and Bonnet’s article, “Monitoring in a High Arctic Environment: Some Lessons from MANA,” is an experience report illustrating the challenges involved in water-quality monitoring in a remote arctic region. The system consists of sensing buoys deployed on a lake and a base station that receives, processes, and forwards the data. Discussion includes handling temperatures as low as -40º C combined with humidity and winds; power supply considerations; communications system design; and deployment problems. The Spotlight column, “The IceCube Detector: A Large Sensor Network at the South Pole,” by Martin Merck, takes place at the opposite end of the Earth, and describes challenges involved in deploying the IceCube neutrino observatory—essentially a large sensor network comprised of many phototubes deployed deep in the Antarctic ice to detect neutrinos for cosmic ray physics research. Sensor networks are a core technology of ubiquitous computing, and this article indeed describes an extreme implementation of one. “Wildfire Monitoring Using a Mixed Air-Ground Mobile Network” by Barrado and her colleagues describes a mobile ad hoc network solution for forest-fire-hot-spot localization that consists of unmanned aerial devices equipped with infrared sensors, a set of relay balloons that improve communication quality, and ground vehicles. The article focuses on communication design and quality. Ferscha and Zia’s “LifeBelt: Crowd www.computer.org/pervasive Evacuation Based on Vibro-Tactile Guidance” describes a vibro-tactile belt designed to help people find their way out of a building in an emergency. The article briefly sketches the devices, then models their influence on large-scale evacuations. This article exemplifies an emerging trend in pervasive computing research— examining the impact of technology on collective behavior. Pervasive Computing, vol. 4, no. 1, 2005, pp. 72–79. and Monitoring Professional Skiers,” IEEE Pervasive Computing, vol. 4, no. 3, pp. 40–46. 3. S. Julier et al., “BARS: Battlefield Augmented Reality System,” Proc. NATO Symp. Information Processing Techniques for Military Systems, 2000; http:// handle.dtic.mil/100.2/ADP010892. 8. I.F. Akyildiz et al., “Wireless Sensor Networks: A Survey,” Computer Networks, vol. 38, no. 4, 2002, pp. 393–422. 9. P. Lukowicz et al., “WearIT@Work: Toward Real-World Industrial Wearable Computing,” IEEE Pervasive Computing, vol. 6, no. 4, 2007, pp. 8–13. 4. R. Szewczyk et al., “An Analysis of a Large Scale Habitat Monitoring Application,” Proc. 2nd Int’l Conf. Embedded Networked Sensor Systems, ACM Press, 2004, pp. 214–226. 5. J. Partan, J. Kurose, and B.N. Levine, “A Survey of Practical Issues in Underwater Networks,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 11, no. 4, 2007, pp. 23–33. REFERENCES 1. X. Jiang et al., “Ubiquitous Computing for Firefighters: Field Studies and Prototypes of Large Displays for Incident Command,” Proc. SIGCHI Conf. Human Factors in Computing Systems, ACM Press, 2004, pp. 679–686. 6. M. Bächlin, K. Förster, and G. Tröster, “SwimMaster: A Wearable Assistant for Swimmer,” Proc. 11th Int’l Conf. Ubiquitous Computing (Ubicomp 09), ACM Press, 2009, pp. 215–224. 2. I. Nourbakhsh et al., “Human-Robot Teaming for Search and Rescue,” IEEE Selected CS articles and columns are also available for free at http://ComputingNow.computer.org. 7. F. Michahelles and B. Schiele, “Sensing Call rticles A r o f g putin m o C e es t vasiv r he lat e P s on t E r e E p a E I ul p e, , u s ef seek s a c ce s s peer-r eview mobil guid e li n e .com www .htm u th o r sive /a a v r e p ils: e Furth p a r det w co m p uter.o rg rg/p uter.o p m o w w.c ive@ e r va s OCTOBER–DECEMBER 2010 ive v e nt elopm s in pe m ous co biquit war e, orld r e al - w hu r vasiv putin nolo e te c h uc tur ics g. Top gy, so e f t war sensin te r ompu man - c g an d intera c tion, ing includ tions, a r y. e id privac cons te m s y, and s it y r s u d c se an bilit y, t, scala n e m y deplo intera c/ .org /m p u te r u e hard tr infras s: e d de e , an d includ or Au t h ible c tion, ervas PER VA SI V E computing 15