Pervasive Computing Review Joshua R. Smitha and Dr. Sunil Kumarb Department of Electrical and Computer Engineering “The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it,”1 Mark Weiser wrote in his 1991 Scientific American article, “The Computer for the 21st Century.” To achieve Weiser’s vision, the computer needs to move to the background of society’s consciousness, extending people’s skills to perform complex or difficult tasks without giving additional recognition to a computer’s presence.2,3,4 Like a well-balanced hammer disappears in the hand of a builder, the computer needs to act as an extension of human ability.5 In addition, computers, sensors, and networks need to pervasively (or ubiquitously) surround users, allowing for constant, meaningful interaction. To achieve this vision, technology needs to be utilized in an integrated fashion.6 However, integrated technology represents more than the sum of its parts.4 Pervasive computing systems can be classified in two ways: as an infrastructure or personal system. Infrastructure systems are well suited to create smart environments such as classrooms that automatically record, index, and publish lectures to the web;7 conference rooms that allow presenters to effortlessly present slide-shows, write on an electronic white board and move between various control points;8 and homes that suggest the best techniques for warming and cooling, while maintaining optimal energy efficiency.9 Personal systems are carried and interact with other devices and people on an ad-hoc basis. There are many applications for pervasive computing technologies, in a wide variety of fields. Infrastructure systems have been developed to monitor the elderly in specially designed residences. Not only does this assist elderly caretakers, but also gives residents more freedom.10 Wearable computers coupled with a database infrastructure allow warehouse workers to easily inventory incoming and outgoing goods.11,12 Portable devices with wireless connectivity can offer location-specific information to tourists and residents, for example, listing all fast-food restaurants within three blocks.13 Most challenges of pervasive computing fall into five main classifications: attention, complexity, privacy, security, and extensibility.14 Other challenges in pervasive computing include the way social interaction is changed because of technology,15,16,17,18 methods for evaluating pervasive computing applications,19 development cycle issues,20,21 the semantic Rubicon,22 costs, and hardware and software limitations (such as size and weight, energy use, user interface, and “disappearing software”).3 a. Class of 2006, Interdisciplinary Engineering and Management, Honors, oral presentation b. Assistant Professor, Department of Electrical and Computer Engineering In the study of pervasive systems and their components, there are consistent messages from public users concerning privacy and security. The advantage of pervasive computing is that computers are transparently integrated into people’s lives, but this benefit raises the fear: what exactly are the computers doing? Research has found that people are generally willing to accept invasive technologies if the benefits are thought to outweigh the risks.23 It follows, then, that in order for a person to make this judgment, they must first fully understand both benefits and risks. Awareness of benefits and risks is a challenge for developers to show users, especially since pervasive computing is meant to be transparent in its workings.24 Development of real-world applications of pervasive computing requires teams with diverse backgrounds in the fields of computer science, computer and electrical engineering, human-computer interaction, and psychology, among others. Before computers will be spread pervasively throughout environments, transparently integrating themselves as an extension of human ability, many of technical, psychological, and ethical challenges remain. However, in applications where user privacy and security are not at high risk, systems are already being implemented. References: [1] M. Weiser, “The Computer for the 21st Century,” Scientific American 265, no. 3, 94-104 (September 1991). [2] M. Weiser and J. Seely-Brown, “The Coming Age of Calm Technology,” Beyond Calculation: The Next Fifty Years of Computing, P.J. Denning and R.M. Metcalfe, eds., Copernicus, Heidelberg, Germany, 1998. [3] R. Want, T. Pering, G. Borriello, and K.I. Farkas, “Disappearing hardware [ubiquitous computing],” IEEE Pervasive Computing, vol. 1, no. 1, Jan.-Mar. 2002, pp. 36- 47. [4] D. Garlan, D.P. Siewiorek, A. Smailagic, and P. Steenkiste, “Project Aura: toward distraction-free pervasive computing,” IEEE Pervasive Computing, vol. 1, no. 2, Apr.-Jun. 2002, pp. 22- 31. [5] M. Weiser, R. Gold, and J. S. Brown, “The origins of ubiquitous computing research at PARC in the late 1980s,” IBM Systems Journal, vol. 38, no. 4, 1999, pp. 693-696. [6] T. Kindberg and A. Fox, “System software for ubiquitous computing,” IEEE Pervasive Computing, vol. 1, no. 1, Jan.-Mar. 2002, pp. 70- 81. [7] G.D. Abowd, “Classroom 2000: An Experiment with the Instrumentation of a Living Educational Environment,” IBM Systems Journal, vol. 38, no. 4, 1999, pp. 508-530. [8] B. Johanson, A. Fox, and T. Winograd, “The Interactive Workspaces project: experiences with ubiquitous computing rooms,” IEEE Pervasive Computing, vol. 1, no. 2, Apr.-Jun. 2002, pp. 67- 74. [9] S.S. Intille, “Designing a home of the future,” IEEE Pervasive Computing, vol. 1, no. 2, Apr.-Jun. 2002, pp. 7682. [10] V. Stanford, “Using pervasive computing to deliver elder care,” IEEE Pervasive Computing, vol. 1, no. 1, Jan.Mar. 2002, pp. 10- 13. [11] V. Stanford, “Wearable computing goes live in industry,” IEEE Pervasive Computing, vol. 1, no. 4, Oct.-Dec. 2002, pp. 14- 19. [12] T.E. Starner, “Wearable computers: no longer science fiction,” IEEE Pervasive Computing, vol. 1, no. 1, Jan.Mar. 2002, pp. 86- 88. [13] R. Caceres, J. Donham, B. Fitterman, D. Joerg, M. Smith, and T. Vetter, “Mobile computing technology at vindigo,” IEEE Wireless Communications, vol. 9, no. 1, Feb. 2002, pp. 50-53. [14] S. Shafer et al., “EasyLiving,” Microsoft EasyLiving Project website, <http://research.microsoft.com/easyliving/Documents/2001%2002%20EL%20Public%20Talk.ppt> Accessed 3 July 2003. [15] C.A. Patterson, R.R. Muntz, and C.M. Pancake, “Challenges in location-aware computing,” IEEE Pervasive Computing, vol. 2, no. 2, Apr.-June 2003, pp. 80- 89. [16] G. Kortuem, Z. Segall, “Wearable communities: augmenting social networks with wearable computers,” IEEE Pervasive Computing, vol. 2, no. 1, Jan.-Mar. 2003, pp. 71- 78. [17] F. Bellotti, C. Berta, A. de Gloria, and M. Margarone, “User testing a hypermedia tour guide,” IEEE Pervasive Computing, vol. 1, no. 2, Apr.-Jun. 2002, pp. 33- 41. [18] M. Fleck, M. Frid, T. Kindberg, E. O'Brien-Strain, R. Rajani, and M. Spasojevic, “From informing to remembering: ubiquitous systems in interactive museums,” IEEE Pervasive Computing, vol. 1, no. 2, Apr.-Jun. 2002, pp. 13- 21. [19] S. Consolvo, and M. Walker, “Using the experience sampling method to evaluate ubicomp applications,” IEEE Pervasive Computing, vol. 2, no. 2, Apr.-Jun. 2003, pp. 24- 31. [20] S.F. Midkiff, “Rapid prototyping of computing systems,” IEEE Pervasive Computing, vol. 1, no. 1, Jan.-Mar. 2002, pp. 14- 18. [21] G.D. Abowd, “Classroom 2000: An Experiment with the Instrumentation of a Living Educational Environment,” IBM Systems Journal, vol. 38, no. 4, 1999, pp. 508-530. [22] T. Kindberg and A. Fox, “System software for ubiquitous computing,” IEEE Pervasive Computing, vol. 1, no. 1, Jan.-Mar. 2002, pp. 70- 81. [23] R. Bellotti and A. Sellen, “Design for Privacy in Ubiquitous Computing Environments,” Proc. 3rd European Conf. Computer Supported Collaborative Work, Kluwer, 1993, pp. 77-92. [24] R. Beckwith, “Designing for ubiquity: the perception of privacy,” IEEE Pervasive Computing, vol. 2, no. 2, Apr.-Jun. 2003, pp. 40- 46.