1 / 9

A survey of Context-Aware Mobile Computing Research

A survey of Context-Aware Mobile Computing Research. Guanling Chen and David Kotz , Department of Computer Science Dartmouth College. Introduction. Two technologies allow users to move about with computing power and network resources at hand. portable computer, wireless communications

nicola
Télécharger la présentation

A survey of Context-Aware Mobile Computing Research

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Asurveyof Context-Aware Mobile Computing Research Guanling Chen and David Kotz, Department of Computer Science Dartmouth College

  2. Introduction • Two technologies allow users to move about with computing power and network resources at hand. • portable computer, wireless communications • Mobile-aware applications will be more effective and adaptive to user’s information needs without consuming too much of a user’s attention with awareness of dynamic environmental characteristics. (location, time, people nearby, light and noise level)

  3. Definition of Context • Categories of context • Computing context, User context, Physical context [SAW94] • Time context [This paper] • primary context -> secondary context (combining several primary context information) • The author’s definition • Context is the set of environmental states and settings that either determines an application’s behavior or in which an application event occurs and is interesting to the user.

  4. Context Aware Computing • Categories by applications [SAW94] • Proximate selection, automatic contextual reconfiguration, contextual information and commands, context-triggered actions • [this paper] • Active context awareness: an application automatically adapts to discovered context, by changing the application’s behavior. • Passive context awareness: an application presents the new or updated context to an interested user or makes the context persistent for the user to retrieve later

  5. Context aware applications • Surveyed focusing on applications what context they use and how contextual information is leveraged. • 13 applications. • few contexts other than location have been used in actual applications.

  6. Sensing the context • Sensing the location • Outdoor: GPS -> not working indoor, 10~20m granularity • Indoor: radio signal, ultrasonic signal -> no standards, 15cm granularity • Hybrid: medium granularity • -> no uniform way to track locations with fine granularity that works both indoors and outdoors -> uncertainty • Sensing other low level contexts • Time, Nearby objects, network bandwidth, orientation, and so on… • Sensing high-level contexts • machine vision • user calendar, schedule • AI techniques • very hard!!! • Sensing context changes • several projects tired to sensing context changes…

  7. Modeling Context Information • Location Model • symbolic model: representing location as abstract symbols • geometric model: representing location as coordinates • combined model: both, can be converted each other • Data Structure • Key-value pairs, Tagged encoding, Object-oriented model, Logic-based model • -> Seungseok’s Survey…

  8. System Infrastructure • To separate low-level sensor data processing from high-level applications -> need middleware layer • Centralized architecture • maintains all context information in one centralized place. • scalability problem • Distributed architecture • allows context be held at several places to avoid potential bottleneck.

  9. Security and Privacy have to be considered

More Related