CS 7470 Mobile and Ubiquitous Computing (MUC)

advertisement
CS 7470 Mobile and Ubiquitous Computing (MUC)
Final Exam for Graduate Students, Fall 2011
Gregory D. Abowd
Due: Thursday, December 15, 5:40pm
This exam has two different parts. You have to complete only one of those parts. The
first part is an essay exam, in which you have to complete one of the essay
questions. The second part is an exercise to design a module of the MUC class on a
theme of your choice. More details for each part are below, including how to turn in
the exam for grading. Be sure to structure your answers in the format defined in the
questions and pay attention to the distribution of points for each part of any
question, as that will help guide how much emphasis you should place on the quality
and depth of your answer. When you have completed the exam, you must turn in a
hard-copy version to Dr. Abowd. A box will be placed outside of Dr. Abowd’s TSRB
office (329) and you may also turn in your exam there. You should also submit your
materials for the exam in t-square. For the second part of the exam, this will allow
you to turn in any materials that are better viewed online (e.g., presentations with
animations or effective use of color or videos) than in printed form.
Part 1 Essays on MUC topics
Directions: Answer any one of the following essay questions. Your answer should
be about 1000 words in length, and should contain references to the relevant
scientific literature (references do not count in the overall word count). Be sure to
answer each part of the question as directly as you can. Your answer will be graded
based on how effectively you address the question, how you demonstrate
knowledge of the readings and lectures from class, your ability to synthesize across
different readings from class, and your creativity in the answer. The quality of your
English writing will also be important. Emailed versions of your exam will not be
accepted. You may use any online source to assist you with this exam, but you are
expected to work on the exam by yourself. You are encouraged to get others to
proofread your answers to catch writing errors.
1. Ubicomp as a field of study. You read a variety of papers that set forth the
vision and breadth of challenges of ubiquitous computing, starting with Weiser’s
Scientific American article, and including a Communications of the ACM article by
Weiser, the chapter by Roy Want in the class text book, and Abowd’s article on
software engineering challenges and ubicomp. We also watched in class a video
presentation by John Seely Brown that reflected on the 20 years of progress in
Ubicomp since Weiser’s landmark article (see
http://www.slideshare.net/ubicomp2011/panel-2-9353103 ). Abowd had a
much less hopeful message to convey about ubicomp conferences that can be
viewed at http://www.slideshare.net/ubicomp2011/acm-ubicomp-2011-panel9353487).
A. (30 points) Give 2 examples of predictions from Weiser’s articles that you
can demonstrate through commercial products or research results that have
come true in the last 20 years.
B. (20 points) Give one example of a prediction from Weiser that has not come
true yet? Comment on whether you think this prediction will come true
eventually or never at all, and why you believe that to be the case.
C. (20 points) Watch Abowd’s 8-minute commentary on Ubicomp (the
conference) versus Ubiquitous Computing (the field). How would you
interpret Abowd’s comments as they pertain to the relevance of teaching a
single course on ubiquitous computing as part of a graduate degree program
in Computer Science?
D. (30 points) If you were to be in charge of the next edition of John Krumm’s
book on Ubiquitous Computing Fundamentals, what one chapter would you
remove from the book and why? What additional chapter would you add to
the book and why?
2. RFID technology. We had a guest lecture on RFID technology and you read Roy
Want’s overview article on RFID
A. (40 points) Compare and contrast the computer vision approach to object
identification versus the RFID approach. What are the advantages and
disadvantages of each? Give an example of a scenario where you would favor
one approach over the other.
B. (30 points) As a technology, how does RFID work? In your answer, define
the necessary components of an RFID system and how the different
components communicate. Explain what backscatter is and the role it plays
in this communication.
C. (30 points) In his chapter on privacy, Langheinrich spends a lot of time
discussing the issues of privacy and RFID. Summarize what the concerns
regarding privacy are that result from the use of RFID technology? Provide
an example of how privacy concerns can be addressed with RFID using a
modification of how RFID itself works. Provide an example of how privacy
concerns can be addressed through the way existing RFID is incorporated
into an existing application.
3. Sensor analysis. We had a number of lectures on sensing technologies and the
use of sensor data in this class. This essay addresses a number of topics across
those themes.
1. (30 points) What is the difference between processing/analyzing sequential
data vs. non-sequential data? Is one harder than the other? Why?
2. (30 points) What is the idea behind state models in Activity Recognition? In
theory, when should the HMM (Hidden Markov Model) technique be used to
model activities? (Hint. What is HMMs key limitation/assumption?)
3. (40 points) Imagine you would like to build a system to understand what
your dog does at home when you come to school. Taking into account what
you learnt in the class about sensors and techniques for processing sensor
data, how would you build this system? Describe a high-level architecture of
such system and compare/contrast different approaches (e.g. on-body vs.
sensors in the environment).
4. Being a reviewer for the Ubicomp community. You have now studied mobile
and ubiquitous computing enough that you could be considered a
knowledgeable person in the area. You have read a lot of papers that have been
published in the area and have engaged in a number of critical discussions on
those papers. For this question, you are to play the role of a reviewer of a paper
submitted to a conference in the area. Pick a single paper published in the
Ubicomp 2011 conference (the entire proceedings are available in the ACM
Digital Library, which is freely accessible through the Georgia Tech Library
website). This paper must not be one of the papers we already read in class.
The paper has already been published, and in this exercise you are to assume the
authors want to submit a revised version to a top journal. Structure your review
in the following way.
A. (30 points) Summarize the contributions of this paper in a paragraph.
B. (5 points) Explain why this paper may or may not be of interest to the
ubiquitous computing research community.
C. (15 points) Summarize the strengths of the paper in a paragraph.
D. (15 points) Summarize the weaknesses of the paper in a paragraph.
E. (5 points) What related work is missing from this paper?
F. (30 points) The paper needs to be extended to include at least 30% new
material to be included in the journal you are reviewing for. Give explicit
advice to the authors on how the paper should be modified and extended.
Part 2 Design a module for the MUC class
In this exercise, you are to select a major topic in mobile and ubiquitous computing
and design a 2-lecture sequence to teach that topic in a future MUC class. You are to
complete each step below. The answers to parts 1-3 should be written up as
answers to essay questions. The answers to parts 4 and 5 should be prepared as
lecture slides. If you design slides that have embedded videos or animations that
you feel are important to the presentation, then you can submit these electronically
through t-square. The instructor has both Powerpoint and Keynote to view slides. If
you want to use a different presentation format, please clear that through the
instructor and TA first.
1. (10 points) Topic selection. Looking over the syllabus to the class, decide
on a single topic to cover. You may select topics that were exactly reflected in
the syllabus (e.g., location, context-awareness, ubicomp history, RFID,
interaction on surfaces, sensor analysis, privacy, wearable computing, field
studies, systems software) or you can select topics that were not specifically
addressed in the syllabus but that you feel are interesting and important (e.g,
augmented reality, sensor design, power and heat, observational studies).
Indicate your topic and give a one-paragraph justification for the selection of
this topic.
2. (10 points) Positioning of topic in class. Indicate when in the class this
topic should be addressed and whether it should be before or after any other
related topics. For example, should a lecture on privacy come before or after
any lectures on specific sensing technologies? Or should a lecture on systems
software come before or after lectures on user experience?
3. (10 points) Select an overview article. For the first lecture on this topic,
you are to select a single reading for all students to read. This can be a
chapter from the Krumm book used in class or another foundational reading.
Provide a full reference to the reading so that the instructor can access and
view the article you have selected. You should justify why this reading is
being selected for every student to read.
4. (40 points) Design an overview lecture on the topic. Create a slide
presentation that would take approximately 50 minutes to deliver. The slide
presentation is intended to be an overview of the topic area and should
highlight the main points of the reading and provide valuable additional
material to understand the general topic area as it is relevant to the general
education of a MUC student. Aim for a presentation that is about 20 slides in
length and assume students have read the overview article. Your
presentation can include pointers to interesting videos or other
supplemental material (Web sites of interesting people in the area or
significant related topics that might be mentioned in the article) that you
could show in class. If you choose a topic that was already part of the
syllabus for class this semester, you can start with any materials that were
presented in class. For lecture topics that were not presented in class or for
which there were no prepared materials, you are free to search for other
presentation materials that you might find on the Web. For example, you
could search slideshare.net or search websites of other universities that offer
classes on this topic. While you are free to use any existing material for your
lecture, you MUST indicate where you borrowed this information from in an
acknowledgments slide at the end of your presentation.
5. (30 points) Design a discussion lecture based on related papers. For this
lecture, you are to create a list of at least 5 related papers from the published
research literature that address interesting topics linked to this module. If
you pick a topic that was covered in class, you may reuse articles that were
given as suggested readings, but at least two of your selected papers must be
papers that were not suggested for this class. You should pick articles that
have appeared in peer-reviewed conferences or journals. You should not pick
articles that just appear on the web and that you cannot prove have appeared
in a conference or journal (that kind of information can be referenced in your
introductory lecture in the previous part if you find it valuable and
trustworthy). For each article, you are to list the full reference for the article
and give a 1-2 sentence justification for why you selected it. Each article
should be presented with reference and justification on a single slide in a
presentation. The remaining presentation should list discussion topics that
you would want to have in class based on topics that cut across some subset
of papers.
Download