1 / 22

Pervasive Computing

Pervasive Computing. 通訊所 693430028 鄭筱親. Outline. Introduction Context Awareness Recent Research Future and Conclusion. Introduction (1).

kathie
Download Presentation

Pervasive Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Pervasive Computing 通訊所 693430028 鄭筱親

  2. Outline • Introduction • Context Awareness • Recent Research • Future and Conclusion

  3. Introduction (1) • The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it. --------Mark Weiser

  4. Introduction (2) • 普及計算==無間計算 • 時無間-----anytime • 空無間-----anywhere • 罪器無間---any devices • 平等無間---any race • 生死無間---service forever

  5. Taxonomy of computer systems research problems in pervasive computing Federated communities Virtualization Standardization Uneven condition Grid computing Global Smart Space Remote communication Fault tolerance High availability Remote information access Distributed security Distributed systems Pervasive computing Mobile computing Mobile networking Mobile information access Adaptive applications Energy-aware systems Location sensitivity Smart spaces Invisibility Localized scalability Context-awareness

  6. Four Additional Research Thrusts • Effective Use of Smart Spaces • Invisibility • Localized Scalability • Masking Uneven Conditioning Pervasive Computing:Vision and Challenges Personal Communications, IEEE, Vol. 8 , Issue: 4 , Aug. 2001, p.10 - 17

  7. Context-Awareness • What is context? • Context is any information that can be used to characterize the situation of an entity. • An entity is a person, place, or object that is considered relevant to the interaction between a user and an application, including the user and applications themselves. Towards a Better Understanding of Context and Context-Awareness GVU Technical Report GIT-GVU-99-22, College of Computing, Georgia Institute of Technology

  8. Context-Awareness • Context-aware applications look at the who’s, where’s, when’s and what’s of entities and use this information to determine why the situation is occurring. • There are four primary types of context • Location • Identity • Activity • Time Towards a Better Understanding of Context and Context-Awareness GVU Technical Report GIT-GVU-99-22, College of Computing, Georgia Institute of Technology

  9. The MIThril RealTime Context Engine

  10. Issues of implementing a context-aware system • How is context represented internally? • How is this information combined with system and application state? • Where is context stored? • What are the relevant data structures and algorithms? • How frequently does context information have to be consulted? • What is the overhead of taking context into account? • What techniques can one use to keep this overhead low?

  11. Issues of implementing a context-aware system • What are the minimal services an environment needs to provide to make context awareness feasible? • What are reasonable fallback positions if an environment does not provide such services? • Is historical context useful? • What are the relative merits of different location-sensing technologies? • Under what circumstances should one be used in preference to another? • Should location information be treated just like any other context information, or should it be handled differently?

  12. Recent Research • AHRI • HawkTour

  13. AHRI • Purpose: Design for people • Background: Georgia Tech Broadband Institute Residential Laboratory • a three-story, 5040-square-foot home that functions • a living laboratory for interdisciplinary design, development and evaluation.

  14. AHRI • Gesture Pendant • Simplified home control

  15. Color Tracking Camera 1 (Fixed) Camera 3 (PTZ) Color Tracking Video Face Tracking Video Motion Tracking Room Manager Beam Former Calibrated Locations Color Tracking Camera 4 (PTZ) Face Recog. Video Motion Tracking Video Auditory Localization Camera 2 (Fixed) Face Tracking More Sensors More Sensors System Architecture

  16. Hawk Tour— A Context-aware Visitor Guide • Illinois Institute of Technology • The application would run on PDAs or Tablet PCs • Provide users with general campus information while guiding the user around the campus • Maintain continually awareness of the user’s current location and intent, thereby adapting the tour to the user’s own personal preferences and context.

  17. Specific of Hawk Tour • Hawk Tour uses the Ekahau Positioning Engine • which makes use of the received signal strengths from WiFi access points to determine positions of the user • Use 「Scarlet」to collect and provide context information

  18. Separate infrastructure functionality with application-specific functionality Non Functional Requirements Scalability Modularity Cross platform Security Extensibility Ability to Evolve Quality of Service Fault Tolerance Mobility User Friendly Interface Scarlet—A framework for context-aware computing • Functional Requirements • Context collection • Context Storage/Management • Context Subscription/Delivery • Context Analysis/Composition Ability

  19. Separation of Application and Infrastructure

  20. The Scarlet System

  21. Future and Conclusion • 我們的未來不是夢?

  22. ---The End--Thank you for your listening!

More Related