SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
Context-Aware Communication for People
Telephone amazing technology has helped communication from the 1870s
     • could ring at most inappropriate and inconvenient times and be a source of
       annoyance
     • the callee does not have a choice and is forced to hear the ringing by the
       caller, even if the callee does not answer the phone.
Making the phone not ring, 2005, H. Schulzrinne, Columbia Univ.
     • presentation at the Internet2 Spring Meeting
Context-aware communication
     • Make the phone not ring except in an appropriate manner         Evolution of VoIP
     • The Phone rings at the callee situations



 PRID : Rich Presence ID
 automatically derived from
    sensors: physical presence, movement
    electronic activity: calendars
 Provide watchers with better information about
    the what, where, how of presentities


상황인식 2010 가을                               11 주차                                   41
1. Routing
Routing : Messages or voice calls can be routed to the appropriate destination
    • The phone in the right room can ring by call forwarding :
        who they are with, where they are, what they are doing, what the time it is
    •   Augmenting device-mediated communication with context information enrich
        user interaction.

Architectural Considerations for Scalable, Secure, Mobile Computing with Location
   Information, 1994, Mike Spreitzerm Xerox Palo Alto
Ubiquitous Message Delivery at Xerox PARC (UMD, 1994)
    • An autonomous system for both sensing and communication acts
    • User location - active badges, keyboard input activity, and explicit commands
    • Text delivered “at the soonest acceptable time via the most appropriate terminal
        near the recipient”, waited for a suitable situation or terminal to be available
    • User agent process : User location and the user’s policy regarding message
                              delivery were maintained
    • Terminal agents : manage the policy of outputting messages on terminals
    • No user-oriented heuristics for deciding acceptable times and appropriate
        terminals
  상황인식 2010 가을                             11 주차                                      42
2. Addressing
Addressing : contextually appropriate people (mailing lists and shared spaces)
    • Entities can be addressed based on their context instead of their unique
       identifier or names

A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of
   Context-Aware Applications, 2001, Dey, Georgia Tec
The Context-Aware Mailing List
    • Dynamic distribution list is used to deliver email messages to members of a
       research group who are currently in the building
    • Addressing email-style communication to a group of people who are selected
       by their location.
    • Context-aware mailing list built with the
       Context Toolkit


                             Architecture diagrams for
                               the In/Out Board and
                             Context-Aware Mailing list
                                    Applications

상황인식 2010 가을                            11 주차                                    43
3. Messaging
Messaging : contextual reminder/messaging
    • By knowing the situation of the receiver or addressee,
      the right message can be delivered at the right time and in the right form,
        be it a reminder message or an incoming e-mail

Hanging Messages – using Context-Enhanced messages for just-In-Time
    communication, 2001, Chang and Maes, MIT
What is a hanging message?
      • Context-enhances message for just-in-time communication
      • A message which is delivered to a recipient at a specific place and time
      • Envision the message as “hanging” in a certain location, waiting for the recipient
      • Messages are context enhanced for better filtering
Mobile wireless device agent : Located an on each user's device
      • make use of existing context to filter incoming communications.
      • A user should never receive any unsolicited or irrelevant message
Filtering mechanisms :
       hierarchical categorization for messages
       user profiling by rules
       multiple location-based operational modes for each user.
상황인식 2010 가을                             11 주차                                        44
4. Providing Awareness of callee
Providing awareness of callee or receiver
    • One can determine if the individual is available to talk by presence awareness
    • Presence awareness is similar to the idea of status in Instant Messenger systems

Context-aware communication with Live Contacts, 2004, G. Henriter Hofte
Live Contacts system (running on pocket PC phones, PC)
Presence information of listed contacts,
     • current Messenger status (e.g., busy, online, away, on-the-phone, etc.)
     • current calendar information (e.g., work and non-work times, appointments,…)
     • last-known location information (e.g., at work, at home, on move, or unknown)
One can initiate contact (via telephone call, SMS, IM, or e-mail)
         or ask to be reminded to make contact at a nominated future time.

Live Contact servers : A client–server architecture - querying for updates on contacts




  상황인식 2010 가을                            11 주차                                        45
5. Screening
Screening : establishing communication under appropriate conditions
    • Filtering or redirecting calls based on the situation of the receiver combined with
       the previous application types
    • Inform the caller of the callee’s situation , and takes action automatically on
       perceiving that the callee is unavailable
    Ex) In a meeting, then the phone can be put in a certain mode, virtually filtering the
       call

Calls.calm : callee specifies the extent of a caller’s access to situation information and
    communication channels in a database of relationships
   Uses Web phones to mediate communication with subscribers.
   A person selects who to call, and he is greeted by the callees, contact page contextualized and
   customized for the caller; if the caller is unknown, (c) a generic page.
   For trusted callers, Calls.Calm reveals status, messages, and a list of preferred communication
   channels.
   The system supports negotiating a time to make a voice call by an exchange of short text
   messages


The aforementioned application types may be combined in a specific application
    Ex) Route messages using context as well as filter appropriate messages
  상황인식 2010 가을                                11 주차                                             46
Call Services
 Applying a Disciplined Approach to the Development of a Context-Aware
     Communication Application, 2005, Ted McFadden, Australia
Context Information :
      location , the status of the user,
      available communication mode (e.g.,
      voice, text, or video),
      device battery power
Context Modeling Language (CML) :
      represent the context representation
      for context-communication application
ECA (Event, Condition, Action) model
the precondition in this case is always true,
and the action is to re-evaluate preferences
for the call of concern
Process the ‗Locate‘ messages
1. Context Manager is queried to discover
     devices near the user
2. devices are rated against the FinalEval
    preference
3. If any device gets an oblige score,
   it is selected for use.
4. The SIP address for the device selected at
  step 3 is determined from the “has address”
  상황인식 2010 가을                                  11 주차                    47
Call Services




          Context fact model for the communication application
상황인식 2010 가을                      11 주차                          48
Application Types
 Application types: addressing & context-aware commands
     Ex) “when the 8 p.m. news is finished and if no one is watching, turn off
         the television next to the chair John is sitting in.”
        addressing : to TV by the context
        command : “turn off” performed in the right context

 Context ensures that commands are delivered in the right way and at the
    right time to appliances.

 Sensing/thinking/acting subsystems are studied previously.




Command         Interpreter      Determine the      Sensing      Reasoning       Action
                                   attribute




상황인식 2010 가을                           11 주차                                       49
Smart Space
Smart space : it can intercept and understand user commands
     Context-aware command processor : execute commands issued by a speaker
        - interprets the user’s commands, translates it into an operation on a device,
        - and invokes the operation on the device
     Query sensors & devices whether a command has been successfully completed
     Server : continuously listens for user commands and has access to devices
     Devices have an API or a Web service-like interface for invoking the operations

UPnP Design by Example, 2003, Jeronimo, Intel
UPnP(Universal Plug & Play) for future devices.
    Interface to devices to communicate with or make use of the device
    Action invoking to a UPnP control point
   Ex) 3 services for Super Toaster device
        • Lifetime Statistics, Toaster Status, Toaster Control

http://www.jini.org/wiki/Category:Introduction_to_Jini
      Jini : SUN
         • Provides a Java-based object model of devices
         • Discovery, Join, look-up, and client uses service.
상황인식 2010 가을                             11 주차                                    50
Smart Space


                                                                 Smart Space




                                                       Lamp
                Command to
               target devices
                                                                     door
                                          Query
                                                                               Utterance W
                                                  TV                            Operation




                          Query



                                                  Sensors

                                Infra Structure : Determine the situation
                                          such as which device ?
                                         Sensing/Thinking/Action

상황인식 2010 가을                                  11 주차                                          51
Context-Aware
               Sensor networks

                    윤 용운

                   2010.11.18




상황인식 2010 가을                     52
Context-Aware Sensors
A survey on sensor network, 2002, Akyldiz, Georgia
Life Patterns: structure from wearable sensors, 2002, Brian Patrick Clarkson MIT
Sensor Networks
     • Numerous applications : from kinder garden to traffic management
     • Understanding regularity in everyday life behavior (wearable sensors MIT)
          • Life patterns are the reoccurring events in daily behavior, such as those
            induced by the regular cycle of night and day, weekdays and weekends,
            work and play, eating and sleeping
Researches : networking protocols, Hardware, Operating systems, Programming model

2 related topics for Sensors and Context-aware Computing
     • Sensors are used to acquire context information
     • Sensors themselves can be made to be aware of their own context
        Context-Aware Sensors:                                       Aware
                                                       Context                   Sensor
                                                     Information
                                                                    Acquire
Sensor networks + Context-aware computing
    • whose behavior can be changed in response to their current context,
    • power-conserving actions depending주차 the situation the sensors are in.
  상황인식 2010 가을                        12 on                                               53
Context-Aware Sensors: The Concept
WSN : wireless sensor network
    a combination of low cost, low-power, multifunctional miniature sensor devices
      consisting of sensing, data processing, and communicating components,
      networked through wireless links between neighboring nodes
    Large number of sensor nodes are deployed over an area
    Mesh network : relay sensed information to base station
    Energy constraints of sensors
                   for Sensing/Computing/Networking




Idea of Context-aware sensors
     • If sensors know more about their own context, then they could adapt their
        behavior and function only when needed in the current circumstances
      they becomes more prudent for spending energy



  상황인식 2010 가을                           12 주차                                        54
Architecture

Framework
    • Setting of groups of sensors – provide context & send/receive
        commands
    •   Several support services – provide communication between sensors and
        the system
    •   Components to provide the core functionalities for context discovery &
        use

the sensor nodes –
     • Programming : nesC under TinyOS
     • To interface with the sensors : Java 1.1 API is used for modules that
       provide data collection, analysis, and communication between the motes
       and the base station




상황인식 2010 가을                          12 주차                                      55
Architectural diagram
     Architectural diagram showing the main components of the framework




상황인식 2010 가을                        12 주차                                 56
Frameworks

Sensor groups :
    • Send sensor readings to communication server
    • Receive sensor control commands from the “Context Trigger Engine” via
       communication server.



Communication server:
  Acts as a mediator between the base station and the sensors
  and provides a unified protocol of communication for applications
   • Parse raw data packets from the sensors into a format recognizable by App.
   • Parse control messages from the application to the sensors




상황인식 2010 가을                          12 주차                                       57
Frameworks
Context locator service: Interpret the current context from the raw sensor readings
    • If-else condition rules – decide whether certain context has been acquired
    • Form secondary context by conjunctions of different primary context information


                                         Lookup    IF temp sensor < threshold,
   Temp
  Sensor             Context locator                  Primary context is cold
      Temp               server
     Sensor                                        IF groups of temp sensors < threshold,
                                         Context      Secondary context is coldweatherContext
                                          name


Context mining service: context discovered autonomously in the system
    • User programmed rules - Static context discovery and dependent on designed
        scenarios
    •   With this service,
         • Context locator service would be sampling sensor data
         • Context mining service would be discovering context


 상황인식 2010 가을                              12 주차                                           58
Frameworks
Context trigger engine: determines the sensor operations triggered,
    • using a combination of given context and sensor profiles
    • Action macros : a command or a combination of actual commands sent to
       sensors
                                                 Context,
                                               Sensor group
                                                              Other context information (Ex: current
                       Request                                time,) about the system can be used.
        Context
                                      Context scheduler       Put found action macro on the queue
        Actions
                     Action macro                             to be scheduled for triggering.
       Data store
                    Time-to-trigger                           The queue operates based on a time-
                                                              to-trigger parameter

                                       Macro Decoder          Decompose the macro into simpler
                                                              instructions to be sent to the listening
                                                              application running at a base station

                      operations
         Action                       Action Interpreter   Sensor ID
        operation                                                          Sensor
           DB                                                              profile
                                                  Sensor control
                                                     message
                                                 Sensor command
Context action data store: Relationship between context & its respective actions
    • 1-to-1 mapping, mapping with interdefined relationship

  상황인식 2010 가을                                   12 주차                                               59
Context-Aware
                  Security

                   윤 용운




                  2010.11.25
상황인식 2010 가을                   60

Weitere ähnliche Inhalte

Was ist angesagt?

Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
Parc Human Interaction
Parc Human InteractionParc Human Interaction
Parc Human Interactionbo begole
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
The Future of Search (Keynote at I-Know 2010)
The Future of Search (Keynote at I-Know 2010)The Future of Search (Keynote at I-Know 2010)
The Future of Search (Keynote at I-Know 2010)marti_hearst
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningLior Rokach
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
From Context-awareness to Human Behavior Patterns
From Context-awareness to Human Behavior PatternsFrom Context-awareness to Human Behavior Patterns
From Context-awareness to Human Behavior PatternsVille Antila
 
RoutineMaker: Towards End-user Automation of Daily Routines using Smartphones
RoutineMaker: Towards End-user Automation of Daily Routines using SmartphonesRoutineMaker: Towards End-user Automation of Daily Routines using Smartphones
RoutineMaker: Towards End-user Automation of Daily Routines using SmartphonesVille Antila
 
Presence @ Winterschool 2008
Presence @ Winterschool 2008Presence @ Winterschool 2008
Presence @ Winterschool 2008scottw
 
An Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueAn Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueCSCJournals
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 
2010 mobilelearning workshopsctr5
2010 mobilelearning workshopsctr52010 mobilelearning workshopsctr5
2010 mobilelearning workshopsctr5Stefaan Ternier
 

Was ist angesagt? (17)

Research Overview
Research OverviewResearch Overview
Research Overview
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Parc Human Interaction
Parc Human InteractionParc Human Interaction
Parc Human Interaction
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Self assessment of e readiness
Self assessment of e readinessSelf assessment of e readiness
Self assessment of e readiness
 
The Future of Search (Keynote at I-Know 2010)
The Future of Search (Keynote at I-Know 2010)The Future of Search (Keynote at I-Know 2010)
The Future of Search (Keynote at I-Know 2010)
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
From Context-awareness to Human Behavior Patterns
From Context-awareness to Human Behavior PatternsFrom Context-awareness to Human Behavior Patterns
From Context-awareness to Human Behavior Patterns
 
331 340
331 340331 340
331 340
 
RoutineMaker: Towards End-user Automation of Daily Routines using Smartphones
RoutineMaker: Towards End-user Automation of Daily Routines using SmartphonesRoutineMaker: Towards End-user Automation of Daily Routines using Smartphones
RoutineMaker: Towards End-user Automation of Daily Routines using Smartphones
 
Presence @ Winterschool 2008
Presence @ Winterschool 2008Presence @ Winterschool 2008
Presence @ Winterschool 2008
 
Maya
MayaMaya
Maya
 
319 325
319 325319 325
319 325
 
An Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking TechniqueAn Approach for Securing Voice Communication via Image Watermarking Technique
An Approach for Securing Voice Communication via Image Watermarking Technique
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
2010 mobilelearning workshopsctr5
2010 mobilelearning workshopsctr52010 mobilelearning workshopsctr5
2010 mobilelearning workshopsctr5
 

Andere mochten auch

2.2 catalogue-rail-htmlwirexx
2.2 catalogue-rail-htmlwirexx2.2 catalogue-rail-htmlwirexx
2.2 catalogue-rail-htmlwirexxSneha Singh
 
Eyetracking of St Joseph Channel (KQ2) website
Eyetracking of St Joseph Channel (KQ2) websiteEyetracking of St Joseph Channel (KQ2) website
Eyetracking of St Joseph Channel (KQ2) websitearizona2
 
Review 1 부분5
Review 1 부분5Review 1 부분5
Review 1 부분5희범 구
 
Review 1 부분2
Review 1 부분2Review 1 부분2
Review 1 부분2희범 구
 
ISATHERM Plus® and ISATHERM Minus ® Thermocouple Alloys.pdf
ISATHERM Plus® and ISATHERM Minus ® Thermocouple Alloys.pdfISATHERM Plus® and ISATHERM Minus ® Thermocouple Alloys.pdf
ISATHERM Plus® and ISATHERM Minus ® Thermocouple Alloys.pdfSneha Singh
 

Andere mochten auch (6)

2.2 catalogue-rail-htmlwirexx
2.2 catalogue-rail-htmlwirexx2.2 catalogue-rail-htmlwirexx
2.2 catalogue-rail-htmlwirexx
 
Eyetracking of St Joseph Channel (KQ2) website
Eyetracking of St Joseph Channel (KQ2) websiteEyetracking of St Joseph Channel (KQ2) website
Eyetracking of St Joseph Channel (KQ2) website
 
Review 1 부분5
Review 1 부분5Review 1 부분5
Review 1 부분5
 
Review 1 부분2
Review 1 부분2Review 1 부분2
Review 1 부분2
 
4
44
4
 
ISATHERM Plus® and ISATHERM Minus ® Thermocouple Alloys.pdf
ISATHERM Plus® and ISATHERM Minus ® Thermocouple Alloys.pdfISATHERM Plus® and ISATHERM Minus ® Thermocouple Alloys.pdf
ISATHERM Plus® and ISATHERM Minus ® Thermocouple Alloys.pdf
 

Ähnlich wie Review 1 부분3

context aware.pptx
context aware.pptxcontext aware.pptx
context aware.pptxnassmah
 
contextawareness.pptx
contextawareness.pptxcontextawareness.pptx
contextawareness.pptxnassmah
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware ComputingMOHIT DADU
 
An ontology based sensor selection engine
An ontology based sensor selection engineAn ontology based sensor selection engine
An ontology based sensor selection enginePrimal Pappachan
 
Adaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homesAdaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homesambitlick
 
UNIT I DIS.pptx
UNIT I DIS.pptxUNIT I DIS.pptx
UNIT I DIS.pptxSamPrem3
 
An Inference Sharing Architecture for a More Efficient Context Reasoning
An Inference Sharing Architecture for a More Efficient Context ReasoningAn Inference Sharing Architecture for a More Efficient Context Reasoning
An Inference Sharing Architecture for a More Efficient Context ReasoningAitor Almeida
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computinglogus2k
 
90seconds Presentation
90seconds Presentation90seconds Presentation
90seconds Presentationpbihler
 
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004Jason Hong
 
Mobile user experience conference 2009 - The rise of the mobile context
Mobile user experience conference 2009 - The rise of the mobile contextMobile user experience conference 2009 - The rise of the mobile context
Mobile user experience conference 2009 - The rise of the mobile contextFlorent Stroppa
 
Caaa07 Presentation February Final
Caaa07 Presentation February FinalCaaa07 Presentation February Final
Caaa07 Presentation February Finalpbihler
 
PerCol 2012 - Presentation
PerCol 2012 - Presentation PerCol 2012 - Presentation
PerCol 2012 - Presentation Ville Antila
 
Context detection and effects on behavior
Context detection and effects on behaviorContext detection and effects on behavior
Context detection and effects on behaviorTimo Smura
 
Your Are Your Mobile Phone
Your Are Your Mobile PhoneYour Are Your Mobile Phone
Your Are Your Mobile Phoneguest314c4e
 
context aware computing
context aware computingcontext aware computing
context aware computingswati sonawane
 
Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...Respa Peter
 

Ähnlich wie Review 1 부분3 (20)

context aware.pptx
context aware.pptxcontext aware.pptx
context aware.pptx
 
contextawareness.pptx
contextawareness.pptxcontextawareness.pptx
contextawareness.pptx
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computing
 
Sirris presentation
Sirris presentationSirris presentation
Sirris presentation
 
An ontology based sensor selection engine
An ontology based sensor selection engineAn ontology based sensor selection engine
An ontology based sensor selection engine
 
Adaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homesAdaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homes
 
UNIT I DIS.pptx
UNIT I DIS.pptxUNIT I DIS.pptx
UNIT I DIS.pptx
 
An Inference Sharing Architecture for a More Efficient Context Reasoning
An Inference Sharing Architecture for a More Efficient Context ReasoningAn Inference Sharing Architecture for a More Efficient Context Reasoning
An Inference Sharing Architecture for a More Efficient Context Reasoning
 
Teleconferencing
TeleconferencingTeleconferencing
Teleconferencing
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
Basics of Mobile COmmunication.pptx
Basics of Mobile COmmunication.pptxBasics of Mobile COmmunication.pptx
Basics of Mobile COmmunication.pptx
 
90seconds Presentation
90seconds Presentation90seconds Presentation
90seconds Presentation
 
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
An Architecture for Privacy-Sensitive Ubiquitous Computing at Mobisys 2004
 
Mobile user experience conference 2009 - The rise of the mobile context
Mobile user experience conference 2009 - The rise of the mobile contextMobile user experience conference 2009 - The rise of the mobile context
Mobile user experience conference 2009 - The rise of the mobile context
 
Caaa07 Presentation February Final
Caaa07 Presentation February FinalCaaa07 Presentation February Final
Caaa07 Presentation February Final
 
PerCol 2012 - Presentation
PerCol 2012 - Presentation PerCol 2012 - Presentation
PerCol 2012 - Presentation
 
Context detection and effects on behavior
Context detection and effects on behaviorContext detection and effects on behavior
Context detection and effects on behavior
 
Your Are Your Mobile Phone
Your Are Your Mobile PhoneYour Are Your Mobile Phone
Your Are Your Mobile Phone
 
context aware computing
context aware computingcontext aware computing
context aware computing
 
Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...Web services have made the development of mobile Web applications much easier...
Web services have made the development of mobile Web applications much easier...
 

Kürzlich hochgeladen

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Kürzlich hochgeladen (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Review 1 부분3

  • 1. Context-Aware Communication for People Telephone amazing technology has helped communication from the 1870s • could ring at most inappropriate and inconvenient times and be a source of annoyance • the callee does not have a choice and is forced to hear the ringing by the caller, even if the callee does not answer the phone. Making the phone not ring, 2005, H. Schulzrinne, Columbia Univ. • presentation at the Internet2 Spring Meeting Context-aware communication • Make the phone not ring except in an appropriate manner Evolution of VoIP • The Phone rings at the callee situations PRID : Rich Presence ID automatically derived from sensors: physical presence, movement electronic activity: calendars Provide watchers with better information about the what, where, how of presentities 상황인식 2010 가을 11 주차 41
  • 2. 1. Routing Routing : Messages or voice calls can be routed to the appropriate destination • The phone in the right room can ring by call forwarding : who they are with, where they are, what they are doing, what the time it is • Augmenting device-mediated communication with context information enrich user interaction. Architectural Considerations for Scalable, Secure, Mobile Computing with Location Information, 1994, Mike Spreitzerm Xerox Palo Alto Ubiquitous Message Delivery at Xerox PARC (UMD, 1994) • An autonomous system for both sensing and communication acts • User location - active badges, keyboard input activity, and explicit commands • Text delivered “at the soonest acceptable time via the most appropriate terminal near the recipient”, waited for a suitable situation or terminal to be available • User agent process : User location and the user’s policy regarding message delivery were maintained • Terminal agents : manage the policy of outputting messages on terminals • No user-oriented heuristics for deciding acceptable times and appropriate terminals 상황인식 2010 가을 11 주차 42
  • 3. 2. Addressing Addressing : contextually appropriate people (mailing lists and shared spaces) • Entities can be addressed based on their context instead of their unique identifier or names A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications, 2001, Dey, Georgia Tec The Context-Aware Mailing List • Dynamic distribution list is used to deliver email messages to members of a research group who are currently in the building • Addressing email-style communication to a group of people who are selected by their location. • Context-aware mailing list built with the Context Toolkit Architecture diagrams for the In/Out Board and Context-Aware Mailing list Applications 상황인식 2010 가을 11 주차 43
  • 4. 3. Messaging Messaging : contextual reminder/messaging • By knowing the situation of the receiver or addressee, the right message can be delivered at the right time and in the right form, be it a reminder message or an incoming e-mail Hanging Messages – using Context-Enhanced messages for just-In-Time communication, 2001, Chang and Maes, MIT What is a hanging message? • Context-enhances message for just-in-time communication • A message which is delivered to a recipient at a specific place and time • Envision the message as “hanging” in a certain location, waiting for the recipient • Messages are context enhanced for better filtering Mobile wireless device agent : Located an on each user's device • make use of existing context to filter incoming communications. • A user should never receive any unsolicited or irrelevant message Filtering mechanisms :  hierarchical categorization for messages  user profiling by rules  multiple location-based operational modes for each user. 상황인식 2010 가을 11 주차 44
  • 5. 4. Providing Awareness of callee Providing awareness of callee or receiver • One can determine if the individual is available to talk by presence awareness • Presence awareness is similar to the idea of status in Instant Messenger systems Context-aware communication with Live Contacts, 2004, G. Henriter Hofte Live Contacts system (running on pocket PC phones, PC) Presence information of listed contacts, • current Messenger status (e.g., busy, online, away, on-the-phone, etc.) • current calendar information (e.g., work and non-work times, appointments,…) • last-known location information (e.g., at work, at home, on move, or unknown) One can initiate contact (via telephone call, SMS, IM, or e-mail) or ask to be reminded to make contact at a nominated future time. Live Contact servers : A client–server architecture - querying for updates on contacts 상황인식 2010 가을 11 주차 45
  • 6. 5. Screening Screening : establishing communication under appropriate conditions • Filtering or redirecting calls based on the situation of the receiver combined with the previous application types • Inform the caller of the callee’s situation , and takes action automatically on perceiving that the callee is unavailable Ex) In a meeting, then the phone can be put in a certain mode, virtually filtering the call Calls.calm : callee specifies the extent of a caller’s access to situation information and communication channels in a database of relationships Uses Web phones to mediate communication with subscribers. A person selects who to call, and he is greeted by the callees, contact page contextualized and customized for the caller; if the caller is unknown, (c) a generic page. For trusted callers, Calls.Calm reveals status, messages, and a list of preferred communication channels. The system supports negotiating a time to make a voice call by an exchange of short text messages The aforementioned application types may be combined in a specific application Ex) Route messages using context as well as filter appropriate messages 상황인식 2010 가을 11 주차 46
  • 7. Call Services Applying a Disciplined Approach to the Development of a Context-Aware Communication Application, 2005, Ted McFadden, Australia Context Information : location , the status of the user, available communication mode (e.g., voice, text, or video), device battery power Context Modeling Language (CML) : represent the context representation for context-communication application ECA (Event, Condition, Action) model the precondition in this case is always true, and the action is to re-evaluate preferences for the call of concern Process the ‗Locate‘ messages 1. Context Manager is queried to discover devices near the user 2. devices are rated against the FinalEval preference 3. If any device gets an oblige score, it is selected for use. 4. The SIP address for the device selected at step 3 is determined from the “has address” 상황인식 2010 가을 11 주차 47
  • 8. Call Services Context fact model for the communication application 상황인식 2010 가을 11 주차 48
  • 9. Application Types Application types: addressing & context-aware commands Ex) “when the 8 p.m. news is finished and if no one is watching, turn off the television next to the chair John is sitting in.” addressing : to TV by the context command : “turn off” performed in the right context Context ensures that commands are delivered in the right way and at the right time to appliances. Sensing/thinking/acting subsystems are studied previously. Command Interpreter Determine the Sensing Reasoning Action attribute 상황인식 2010 가을 11 주차 49
  • 10. Smart Space Smart space : it can intercept and understand user commands  Context-aware command processor : execute commands issued by a speaker - interprets the user’s commands, translates it into an operation on a device, - and invokes the operation on the device  Query sensors & devices whether a command has been successfully completed  Server : continuously listens for user commands and has access to devices  Devices have an API or a Web service-like interface for invoking the operations UPnP Design by Example, 2003, Jeronimo, Intel UPnP(Universal Plug & Play) for future devices.  Interface to devices to communicate with or make use of the device  Action invoking to a UPnP control point Ex) 3 services for Super Toaster device • Lifetime Statistics, Toaster Status, Toaster Control http://www.jini.org/wiki/Category:Introduction_to_Jini  Jini : SUN • Provides a Java-based object model of devices • Discovery, Join, look-up, and client uses service. 상황인식 2010 가을 11 주차 50
  • 11. Smart Space Smart Space Lamp Command to target devices door Query Utterance W TV Operation Query Sensors Infra Structure : Determine the situation such as which device ? Sensing/Thinking/Action 상황인식 2010 가을 11 주차 51
  • 12. Context-Aware Sensor networks 윤 용운 2010.11.18 상황인식 2010 가을 52
  • 13. Context-Aware Sensors A survey on sensor network, 2002, Akyldiz, Georgia Life Patterns: structure from wearable sensors, 2002, Brian Patrick Clarkson MIT Sensor Networks • Numerous applications : from kinder garden to traffic management • Understanding regularity in everyday life behavior (wearable sensors MIT) • Life patterns are the reoccurring events in daily behavior, such as those induced by the regular cycle of night and day, weekdays and weekends, work and play, eating and sleeping Researches : networking protocols, Hardware, Operating systems, Programming model 2 related topics for Sensors and Context-aware Computing • Sensors are used to acquire context information • Sensors themselves can be made to be aware of their own context Context-Aware Sensors: Aware Context Sensor Information Acquire Sensor networks + Context-aware computing • whose behavior can be changed in response to their current context, • power-conserving actions depending주차 the situation the sensors are in. 상황인식 2010 가을 12 on 53
  • 14. Context-Aware Sensors: The Concept WSN : wireless sensor network  a combination of low cost, low-power, multifunctional miniature sensor devices consisting of sensing, data processing, and communicating components, networked through wireless links between neighboring nodes  Large number of sensor nodes are deployed over an area  Mesh network : relay sensed information to base station  Energy constraints of sensors for Sensing/Computing/Networking Idea of Context-aware sensors • If sensors know more about their own context, then they could adapt their behavior and function only when needed in the current circumstances  they becomes more prudent for spending energy 상황인식 2010 가을 12 주차 54
  • 15. Architecture Framework • Setting of groups of sensors – provide context & send/receive commands • Several support services – provide communication between sensors and the system • Components to provide the core functionalities for context discovery & use the sensor nodes – • Programming : nesC under TinyOS • To interface with the sensors : Java 1.1 API is used for modules that provide data collection, analysis, and communication between the motes and the base station 상황인식 2010 가을 12 주차 55
  • 16. Architectural diagram Architectural diagram showing the main components of the framework 상황인식 2010 가을 12 주차 56
  • 17. Frameworks Sensor groups : • Send sensor readings to communication server • Receive sensor control commands from the “Context Trigger Engine” via communication server. Communication server: Acts as a mediator between the base station and the sensors and provides a unified protocol of communication for applications • Parse raw data packets from the sensors into a format recognizable by App. • Parse control messages from the application to the sensors 상황인식 2010 가을 12 주차 57
  • 18. Frameworks Context locator service: Interpret the current context from the raw sensor readings • If-else condition rules – decide whether certain context has been acquired • Form secondary context by conjunctions of different primary context information Lookup IF temp sensor < threshold, Temp Sensor Context locator Primary context is cold Temp server Sensor IF groups of temp sensors < threshold, Context Secondary context is coldweatherContext name Context mining service: context discovered autonomously in the system • User programmed rules - Static context discovery and dependent on designed scenarios • With this service, • Context locator service would be sampling sensor data • Context mining service would be discovering context 상황인식 2010 가을 12 주차 58
  • 19. Frameworks Context trigger engine: determines the sensor operations triggered, • using a combination of given context and sensor profiles • Action macros : a command or a combination of actual commands sent to sensors Context, Sensor group Other context information (Ex: current Request time,) about the system can be used. Context Context scheduler Put found action macro on the queue Actions Action macro to be scheduled for triggering. Data store Time-to-trigger The queue operates based on a time- to-trigger parameter Macro Decoder Decompose the macro into simpler instructions to be sent to the listening application running at a base station operations Action Action Interpreter Sensor ID operation Sensor DB profile Sensor control message Sensor command Context action data store: Relationship between context & its respective actions • 1-to-1 mapping, mapping with interdefined relationship 상황인식 2010 가을 12 주차 59
  • 20. Context-Aware Security 윤 용운 2010.11.25 상황인식 2010 가을 60