Research abstract included in SURE conference booklet

advertisement
Pervasive Computing Review
Joshua R. Smitha and Dr. Sunil Kumarb
Department of Electrical and Computer Engineering
“The most profound technologies are those that disappear. They weave themselves into the fabric
of everyday life until they are indistinguishable from it,”1 Mark Weiser wrote in his 1991 Scientific
American article, “The Computer for the 21st Century.” To achieve Weiser’s vision, the computer needs
to move to the background of society’s consciousness, extending people’s skills to perform complex or
difficult tasks without giving additional recognition to a computer’s presence.2,3,4 Like a well-balanced
hammer disappears in the hand of a builder, the computer needs to act as an extension of human ability.5
In addition, computers, sensors, and networks need to pervasively (or ubiquitously) surround users,
allowing for constant, meaningful interaction. To achieve this vision, technology needs to be utilized in
an integrated fashion.6 However, integrated technology represents more than the sum of its parts.4
Pervasive computing systems can be classified in two ways: as an infrastructure or personal
system. Infrastructure systems are well suited to create smart environments such as classrooms that
automatically record, index, and publish lectures to the web;7 conference rooms that allow presenters to
effortlessly present slide-shows, write on an electronic white board and move between various control
points;8 and homes that suggest the best techniques for warming and cooling, while maintaining optimal
energy efficiency.9 Personal systems are carried and interact with other devices and people on an ad-hoc
basis.
There are many applications for pervasive computing technologies, in a wide variety of fields.
Infrastructure systems have been developed to monitor the elderly in specially designed residences. Not
only does this assist elderly caretakers, but also gives residents more freedom.10 Wearable computers
coupled with a database infrastructure allow warehouse workers to easily inventory incoming and
outgoing goods.11,12 Portable devices with wireless connectivity can offer location-specific information to
tourists and residents, for example, listing all fast-food restaurants within three blocks.13
Most challenges of pervasive computing fall into five main classifications: attention, complexity,
privacy, security, and extensibility.14 Other challenges in pervasive computing include the way social
interaction is changed because of technology,15,16,17,18 methods for evaluating pervasive computing
applications,19 development cycle issues,20,21 the semantic Rubicon,22 costs, and hardware and software
limitations (such as size and weight, energy use, user interface, and “disappearing software”).3
a. Class of 2006, Interdisciplinary Engineering and Management, Honors, oral presentation
b. Assistant Professor, Department of Electrical and Computer Engineering
In the study of pervasive systems and their components, there are consistent messages from
public users concerning privacy and security. The advantage of pervasive computing is that computers
are transparently integrated into people’s lives, but this benefit raises the fear: what exactly are the
computers doing? Research has found that people are generally willing to accept invasive technologies if
the benefits are thought to outweigh the risks.23 It follows, then, that in order for a person to make this
judgment, they must first fully understand both benefits and risks. Awareness of benefits and risks is a
challenge for developers to show users, especially since pervasive computing is meant to be transparent in
its workings.24
Development of real-world applications of pervasive computing requires teams with diverse
backgrounds in the fields of computer science, computer and electrical engineering, human-computer
interaction, and psychology, among others. Before computers will be spread pervasively throughout
environments, transparently integrating themselves as an extension of human ability, many of technical,
psychological, and ethical challenges remain. However, in applications where user privacy and security
are not at high risk, systems are already being implemented.
References:
[1] M. Weiser, “The Computer for the 21st Century,” Scientific American 265, no. 3, 94-104 (September 1991).
[2] M. Weiser and J. Seely-Brown, “The Coming Age of Calm Technology,” Beyond Calculation: The Next Fifty
Years of Computing, P.J. Denning and R.M. Metcalfe, eds., Copernicus, Heidelberg, Germany, 1998.
[3] R. Want, T. Pering, G. Borriello, and K.I. Farkas, “Disappearing hardware [ubiquitous computing],” IEEE
Pervasive Computing, vol. 1, no. 1, Jan.-Mar. 2002, pp. 36- 47.
[4] D. Garlan, D.P. Siewiorek, A. Smailagic, and P. Steenkiste, “Project Aura: toward distraction-free pervasive
computing,” IEEE Pervasive Computing, vol. 1, no. 2, Apr.-Jun. 2002, pp. 22- 31.
[5] M. Weiser, R. Gold, and J. S. Brown, “The origins of ubiquitous computing research at PARC in the late 1980s,”
IBM Systems Journal, vol. 38, no. 4, 1999, pp. 693-696.
[6] T. Kindberg and A. Fox, “System software for ubiquitous computing,” IEEE Pervasive Computing, vol. 1, no. 1,
Jan.-Mar. 2002, pp. 70- 81.
[7] G.D. Abowd, “Classroom 2000: An Experiment with the Instrumentation of a Living Educational Environment,”
IBM Systems Journal, vol. 38, no. 4, 1999, pp. 508-530.
[8] B. Johanson, A. Fox, and T. Winograd, “The Interactive Workspaces project: experiences with ubiquitous
computing rooms,” IEEE Pervasive Computing, vol. 1, no. 2, Apr.-Jun. 2002, pp. 67- 74.
[9] S.S. Intille, “Designing a home of the future,” IEEE Pervasive Computing, vol. 1, no. 2, Apr.-Jun. 2002, pp. 7682.
[10] V. Stanford, “Using pervasive computing to deliver elder care,” IEEE Pervasive Computing, vol. 1, no. 1, Jan.Mar. 2002, pp. 10- 13.
[11] V. Stanford, “Wearable computing goes live in industry,” IEEE Pervasive Computing, vol. 1, no. 4, Oct.-Dec.
2002, pp. 14- 19.
[12] T.E. Starner, “Wearable computers: no longer science fiction,” IEEE Pervasive Computing, vol. 1, no. 1, Jan.Mar. 2002, pp. 86- 88.
[13] R. Caceres, J. Donham, B. Fitterman, D. Joerg, M. Smith, and T. Vetter, “Mobile computing technology at
vindigo,” IEEE Wireless Communications, vol. 9, no. 1, Feb. 2002, pp. 50-53.
[14] S. Shafer et al., “EasyLiving,” Microsoft EasyLiving Project website,
<http://research.microsoft.com/easyliving/Documents/2001%2002%20EL%20Public%20Talk.ppt> Accessed 3
July 2003.
[15] C.A. Patterson, R.R. Muntz, and C.M. Pancake, “Challenges in location-aware computing,” IEEE Pervasive
Computing, vol. 2, no. 2, Apr.-June 2003, pp. 80- 89.
[16] G. Kortuem, Z. Segall, “Wearable communities: augmenting social networks with wearable computers,” IEEE
Pervasive Computing, vol. 2, no. 1, Jan.-Mar. 2003, pp. 71- 78.
[17] F. Bellotti, C. Berta, A. de Gloria, and M. Margarone, “User testing a hypermedia tour guide,” IEEE Pervasive
Computing, vol. 1, no. 2, Apr.-Jun. 2002, pp. 33- 41.
[18] M. Fleck, M. Frid, T. Kindberg, E. O'Brien-Strain, R. Rajani, and M. Spasojevic, “From informing to
remembering: ubiquitous systems in interactive museums,” IEEE Pervasive Computing, vol. 1, no. 2, Apr.-Jun.
2002, pp. 13- 21.
[19] S. Consolvo, and M. Walker, “Using the experience sampling method to evaluate ubicomp applications,” IEEE
Pervasive Computing, vol. 2, no. 2, Apr.-Jun. 2003, pp. 24- 31.
[20] S.F. Midkiff, “Rapid prototyping of computing systems,” IEEE Pervasive Computing, vol. 1, no. 1, Jan.-Mar.
2002, pp. 14- 18.
[21] G.D. Abowd, “Classroom 2000: An Experiment with the Instrumentation of a Living Educational
Environment,” IBM Systems Journal, vol. 38, no. 4, 1999, pp. 508-530.
[22] T. Kindberg and A. Fox, “System software for ubiquitous computing,” IEEE Pervasive Computing, vol. 1, no.
1, Jan.-Mar. 2002, pp. 70- 81.
[23] R. Bellotti and A. Sellen, “Design for Privacy in Ubiquitous Computing Environments,” Proc. 3rd European
Conf. Computer Supported Collaborative Work, Kluwer, 1993, pp. 77-92.
[24] R. Beckwith, “Designing for ubiquity: the perception of privacy,” IEEE Pervasive Computing, vol. 2, no. 2,
Apr.-Jun. 2003, pp. 40- 46.
Download