Ubiquitous Computing CSE 40827
Popular in Course
Popular in Computer Science and Engineering
This 0 page Class Notes was uploaded by Mrs. Damaris Hyatt on Sunday November 1, 2015. The Class Notes belongs to CSE 40827 at University of Notre Dame taught by Poellabauer in Fall. Since its upload, it has received 13 views. For similar materials see /class/232737/cse-40827-university-of-notre-dame in Computer Science and Engineering at University of Notre Dame.
Reviews for Ubiquitous Computing
Report this Material
What is Karma?
Karma is the currency of StudySoup.
Date Created: 11/01/15
82509 Ubiquitous Computing CSE4082760827 Fall 2009 University of Notre Dame Course Overview I Instructor Christian Poellabauer cpoeliachsendedu 354 Fitzpatrick Hall Of ce hours Mon 9710 Wed 11 Ev appomtmem I Teaching Assistant Nikhil Vadav ivadav ndedu 214 Cushing Hail Of ce hours We 71130 DARTS Lab 3555 Fitzpatrick Ham Course Overview MWF104071130deBart00 202 Friday lectures quoton demand like this week Catching up Student presentations independent lab meetings r nnan n r Course Overview 82509 Student requirements Prepare ror lectures 15 Papersummarles due beldre lecture Ars Createdirectpry re ihgs hd harnesurnrnarles summar MMDDxx M mphthnodayxxxextehsiphsdpcpdl pslxl Survey paper on topic or your choice 15 How to tutorial on one technology 15 Projectszln quot3minisp piects Prpectprpppsal Desighleasibility study lmpiemenla unandevaiuatiun Presentation and documentation Collaborative assessment 15 wlkl Reading Assignment The Computerfor the 21 Centuryquot Mark Weiser Synthetic SerendipityquotVernorVinge Mike ViHas s Worldquot Harry Goidstein Paper surrirriar Summarize each paper in 172 paragraphs Key ideas problem discussed solutions proposed open issues etc Answer questions 173 sentences eac How does Weiser exp aih the term quotembodied vlrluaillyquot Can you cprhrhehtph some dlhls predicti phs battery lileti rhe screen size rempyable hard disks ahd memory chips Wireless trahsler raters etc What does Weiser identity as the key social issue What is Ubiquitous Computing I quotThe most profound technologies are those that disappear They Weave themselves into the fabric of everyday life until they are indistinguishable from it Mark Weiser 1991 www outube com watch GnZSSTSSTO History and Visions Computer Science and Engineering University of Notre Dame 82709 Ubiquitous Computing quotThe most profound technologies are those that disappear They weave themselves into the fabric of everyday life until they are indistinguishable from it Mark Weiser 1991 quot Computer Science and Engineering University of Notre Dame Xerox PARC Tab PARCTAB or quottabquot Touch sensitive panel use with nger or stylus with 128x64 resolution can ip for lefthand use 3 buttons speaker different tones Infrared 192k baud Localization using quotroomsized communication cells 12MHz Intel 8051 microcontroller Can operate for 10minshour 8 hours per day 1 week before recharging Computer Science and Engineering University of Notre Dame Xerox PARC Pad Pad Tablet prototype pen computer 9x11x1 4 hour battery life 5 lbs Motorola 683xx processor w 4MB RAM PCMCIA PAR Pen w builtin microphone 640x480 display Infrared Computer Scrence and Engineering 7 Universlty of Notre Dame 82709 Xerox PARC Board Bulletin boards white boards ip charts book case 40 by 60 1024x768 Wireless electronic quotchalkquot Computer Scrence and Engineering 7 Universlty of Notre Dame Active Badge Olivetti Research Roy Want Workers could automatically unlock areas to which they had been granted access Phone calls routed to wherever they are Create running diaries of meetings Could be tracked Olivetti s public web site allowed visitors at one point to nd location of employee Computer Science and Engineering 7 University of Notre Dame Active Badge Batteries Minrnprncessur cunlml hutlun Inlraml lightemitting indes 82709 CWTin Huhrli1gilieggtihg iimem Active Badge Identity Room level location Button Relatively simple technology led to lots of applications Door opens only to right badge wearer Bill Gates house Rooms greet people by name Telephone calls automatically forwarded Computer terminal can quickly pull your settings from l home computer quotteleportingquot Automatic diary Cummiin anew mu Predictions Displays htt wwwamerichi com CPU speeds Storage 05 Migration of screen content Networks The Sal Story 557 Coffee machine only knows Yes and quotNoquot No other speech input devices nearby or can ignore Coffee machine knows if it has coffee grounds inside quotShe sees electronic trails that have been kept for her of neighbors coming and going Window has some computer vision Window can also display information 82709 HH f quot 51 quotCoffeequot The Sal Story quotShe can see that her kids got up 15 and 20 minutes ago No plausible deniability for kids anymore Possibly sensors in bed microphones in bedrooms or location tracking quotShe wipes her pen over the newspaper s name date section and page number and then circles the quote The pen sends a message to the paper which transmits the quote to her of ce Ll How does the pen know who to send to 39A The Sal Story quotSal can press a code into the opener and the missing manual will nd itself These days would probably be web based quotShe spots a slowdown ahead and also notices on a side street the telltale green in the foreview of a food shop Advertiserbased hardware Install this and 10 off price Or somehow con gure it Con gure lots of devices The Sal Story Sal glances out her windows a gray day in Silicon Valley meanwhile it has been a quiet morning at the East Coast of cequot Figure 1 ll WLU gei smmym aha ncxr rm hours figure 2 1mm freeze ionighl 1mm m gloves 82709 The Sal Story The telltale by the door that Sal programmed her rst day on thejob is blinking fresh coffee Enduser programming how to do this in ubicomp Coffee seems to be popular in Silicon Valley The Sal Story Sal picks up a tab and waves it to her friend Joequot Have to be careful ofaccidental data sharing How does it know what to share How to differentiate if multiple people there The two have given each other access to their location detectors and to each other s screen contents and location How to easily con gure Would coworkers nd this acceptable Social conventions Forgetting to remove permissions 82709 The Sal Story A blank tab on Sal s desk beeps and displays the word Joe Joe wants to discuss a document with her and now it shows up on the wall These days would probably be initiated via IM Easy to share data and talk realtime What s Missing Web Notice no mention of the Internet wasn t obvious at time Makes the paper feel a little dated Subtle difference in vision original ubicomp about embedded chips in everything web about information anywhere anytime web services about mass scale Orwellian Dream Come True A Badge That Pinpoints You jgr j Social sciences Privacy Really compelling applications What s Missing Do laptops still have a future in ubicomp Lots of devices and somehow your data gets to them Laptops still central but can easily share data How do cell phones fit into the ubicomp picture Famous Quote 82709 Therexisamjore information availableiatour fingertips duringJa walk in the woods than irnya ny39comiputer system yet pe39o39pleifindTa w39alkamongtrees relaxing 393 nd computers frustrating Machine39s that tthe human envirOnmenit instead of forcing humans to enter theirs will make using a c39or np u t r a s refreshing as39t aTking a walk inkt he w00ds Synthetic Serendipity Vinge is well known sci ti writer Story set in year 2020 Has to be plausible vision of future Combines lots of tech ideas Virtual reality Digital libraries Ubicomp Wearable computers Wireless Sensor nets Usermachine interfaces Another Vision of Ubicomp We will reach a point where the combination of powerful processors limitless data storage capacity ubiquitous sensor networks and deeply embedded user interfaces will create a bond between human and machine so intimate that users may reasonably be considered superhumanly intelligent VernorVinge Synthe cSerendiphy Some interesting points How Google eBay FedEx used in future Not real cyborgs but close to it Realtime Google Silent messaging Information overlays on top of real world Pipes nav arrows online games in world 82709 Synthetic Serendipity Will wearable computers actually take off How to do input How to avoid accidental input Non visual output Or heads up displays http Mt ranfnnl m 39 M muszi narll hfml Synthetic Serendipity Will it be harder to differentiate reality Live in reality or a world we created A Matrix of our own making World of Warcraft addiction How to make cost effective Sensor nets not cheap Wearable computers not cheap plus recharging needs Simple things we can do rst UbiquitousPervasive Computing 39 Distributed systems 39 Mobile computing 39 Effective use of smart spaces lightheat control in room 39 Invisibility minimal user distraction 39 Localized scalability scalable but constraint to local 39 Masking uneven conditioning will take long time before uniform penetration mask dumbness of environments eg device compensates for lack of wireless connectivity immunei 39 7 University oi ivori 82709 Evolution of Pervasive Computing Remote communication protocol layering RFC endrlorend args F It tolerance ACID twophase commit nested transactions High availability Distributed Mobile Pervasive replication rollback recovery 4W 439mmpuung 4 mmpulmg Remote information access dist rile systems dist databasg aching buted security Distri encryption mutual authentication Mobile networking Mobile IFV ad hoc networki wireless TCP fixes Mobile information access disconnected aperalion weak consistency V V Smart spaces Adaptive applications proxies transcodlng agility lnvmbiliw V Energyrawarevsystems Localized scalability goaldirected adaptation disk splnrdown Uneven conditioning Location sensitivrty ops WaveLan triangulation context awareness imprinti st 9m 3w lliii ltl llvill if liquot ionis Pervasive Computing During one of his talks Weiser outlined a set of principles describing pervasive computing also called ubiquitous computing The purpose of a computer is to help you do something else The best computer is a quiet invisible servant The more you can do by intuition the smarter you are the computer should extend your unconscious Technology should create calm Calm technology 34 technology that which informs but doesn39t demand our focus or attention Designing Calm Technology Weiser and John Seeley Brown i ImuaichriN Invisibility 82709 One does not need to continually rationalize one s use of a pervasive computing sys em Having learnt about its use suf ciently well one ceases to be aware o 39t It is literally visible effectiver invisible in the same way that a skilled carpenter engaged in his work might use a hammer without consciously planning each swing Similarly when you look at a street sign you absorb its information without consciously performing the act of reading Common Terminology Ubiquitous Computing Pervasive Computing Calm Technology Internet ofThings Thingsthatthink Everyware Pervasive Internet Ambient Intelligence Proactive Computing Augmented Reality Related Areas Sensor Networks Mobile Computing Wireless Networks Embedded SystemsControl Humancomputer Interaction Arti cial Intelligence Autonomic Computing Will It Come 82709 Many powerful institutions vested in its coming Enormous market possibilities We39re alreadythere Locationrbased services and apps Tracking cell phones Great challenge for us we like solving riddles Who will be most affected Nontechnical nonspecialist ordinary citizens won39t even realize it39s there we will know