Ubiquitous Computing
Ubiquitous Computing
LCD
Jacket
Sony Glasstron
Ubiquitous Computing: M. Sloman 9 Ubiquitous Computing: M. Sloman 10
See http://wearables.www.media.mit.edu/projects/wearables/mithril/index.html
Ubiquitous Computing: M. Sloman 11 Ubiquitous Computing: M. Sloman 12
Usability Brainwaves!
Common user interface for workstation and mobile
device applications
Adaptive information display
Gesture recognition
WAP phone is not a useable computing device!!
Remove human from loop – intelligent agents?
Hand tracking
Hand gestures
Arm gestures
From http://research.microsoft.com/easyliving/
Ubiquitous Computing: M. Sloman 39 Ubiquitous Computing: M. Sloman 40
Contents Adaptive Application Architecure
Remote
Sensors Application
Clients Local & Network
Intermediate Servers Servers
Ubiquitous Computing: M. Sloman 41 Ubiquitous Computing: M. Sloman 42
Authorisation policies
Rule governing choices in behaviour of the system Derived from trust relationships to define what
resources or services clients can access, what
Derived from trust relationships, enterprise goals and proxylets or code can be loaded into servers, or
Service level agreements what code loaded into the client can do.
Need to specify and modify policies without coding Obligation Policies
into automated agents Event-condition-action rules to trigger when to
Policies are persistent perform actions, what alarms to generate etc
But can be dynamically modified Ponder – declarative object-oriented language
for specifying policies.
ÎChange system behaviour without modifying See http://www-dse.doc.ic.ac.uk/Research/policies/
implementation – not new functionality
Ubiquitous Computing: M. Sloman 43 Ubiquitous Computing: M. Sloman 44
Example Authorisation Policy Obligation Policy
inst auth+ facilities { Defines what actions a subject must do
subject guests; Subject based Î subject interprets policy and
target gym + pool; performs actions on targets
action enter; Event triggered obligation
when time.between (“0900”, “2100”); Actions can be remote invocations or local scripts
}
Can specify sequencing or concurrency of actions
Conclusions References
Pervasive Computing
IEEE Pervasive Computing Magazine
Mobile computing
http://computer.org/dsonline/
http://www.mobileinfo.com
http://www.comp.lancs.ac.uk/computing/research/mpg/most/
Ubiquitous Computing: M. Sloman 55 Ubiquitous Computing: M. Sloman 56