Skip to main content

Domino: Exploring Mobile Collaborative Software Adaptation

  • Conference paper
Pervasive Computing (Pervasive 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3968))

Included in the following conference series:

Abstract

Social Proximity Applications (SPAs) are a promising new area for ubicomp software that exploits the everyday changes in the proximity of mobile users. While a number of applications facilitate simple file sharing between co–present users, this paper explores opportunities for recommending and sharing software between users. We describe an architecture that allows the recommendation of new system components from systems with similar histories of use. Software components and usage histories are exchanged between mobile users who are in proximity with each other. We apply this architecture in a mobile strategy game in which players adapt and upgrade their game using components from other players, progressing through the game through sharing tools and history. More broadly, we discuss the general application of this technique as well as the security and privacy challenges to such an approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ackerman, M.S., Malone, T.W.: Answer Garden: A Tool for Growing Organisational Memory. In: Proc. ACM Conf. on Office Information Systems, pp. 31–33 (1990)

    Google Scholar 

  2. Ametller, J., Robles, S., Ortega-Ruiz, J.A.: Self-Protected Mobile Agents. In: Proc. Joint Conference on Autonomous Agents and Multiagent Systems, vol. 1 (2004)

    Google Scholar 

  3. Barkhuus, L., Chalmers, M., Tennent, P., Hall, M., Bell, M., Sherwood, S., Brown, B.: Picking pockets on the lawn: The development of tactics and strategies in a mobile game. In: Beigl, M., Intille, S.S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol. 3660, pp. 358–374. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Birsan, D.: On Plug-ins and Extensible Architectures. ACM Queue 3(2) (March 2005)

    Google Scholar 

  5. Chalmers, M., et al.: The Order of Things: Activity-Centred Information Access. In: Proc. WWW 1998, pp. 359–367 (1998)

    Google Scholar 

  6. Chen, F., Yeager, W.: Poblano: A Distributed Trust Model for Peer-to-Peer Networks. JXTA Security White Paper (2001)

    Google Scholar 

  7. Crow, D., Smith, B.: The role of built-in knowledge in adaptive interface systems. In: Proc. ACM IUI, pp. 97–104 (1993)

    Google Scholar 

  8. Cypher, A.: EAGER: programming repetitive tasks by example. In: ACM CHI 1991, pp. 33–39 (1991)

    Google Scholar 

  9. Demers, A., et al.: Epidemic algorithms for replicated database maintenance. In: Proc. 6th ACM Symposium on Principles of Distributed Computing (PODC), pp. 1–12 (1987)

    Google Scholar 

  10. Edjlali, G., Acharya, A., Chaudhary, V.: History-based Access Control for Mobile Code. In: Proc. ACM Computer and Communications Security, pp. 38–48 (1998)

    Google Scholar 

  11. Edwards, W.K., Grinter, R.: At home with ubiquitous computing: Seven challenges. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 256–272. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  12. Findlater, L., McGrenere, J.: A comparison of static, adaptive and adaptable menus. In: Proc. ACM CHI 2004, pp. 89–96 (2004)

    Google Scholar 

  13. Goldenberg, J., Shavitt, Y., Shir, E., Solomon, S.: Distributive immunization of networks against viruses using the ‘honey-pot’ architecture. Nature Physics 1(3), 184–188 (2005)

    Article  Google Scholar 

  14. Humble, J., Crabtree, A., Hemmings, T., Åkesson, K.-P., Koleva, B., Rodden, T., Hansson, P.: “Playing with the bits” user-configuration of ubiquitous domestic environments. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 256–263. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. Khelil, A., Becker, C., et al.: An Epidemic Model for Information Diffusion in MANETs. In: Proc. ACM MSWiM (2002)

    Google Scholar 

  16. Mackay, W.: Patterns of Sharing Customizable Software. In: Proc. ACM CSCW 1990, pp. 209–221 (1990)

    Google Scholar 

  17. Mackay, W.: Triggers and barriers to customizing software. In: Proc. ACM CHI 1991, pp. 153–160 (1991)

    Google Scholar 

  18. MacLean, A., et al.: User-Tailorable Systems: Pressing the Issues with Buttons. In: Proc. ACM CHI 1990, pp. 175–182 (1990)

    Google Scholar 

  19. Nardi, B.A., Miller, J.: Twinkling Lights and Nested Loops: Distributed Problem Solving and Spreadsheet Development. In: CSCW and Groupware, pp. 29–52. Academic Press, London (1991)

    Google Scholar 

  20. Newman, M., et al.: Designing for Serendipity: Supporting End-User Configurations of Ubiquitous Computing Environments. In: Proc. ACM DIS 2002, pp. 147–156 (2002)

    Google Scholar 

  21. Page, J., Zaslavsky, A., Indrawan, M.: A buddy model of security for mobile agent communities operating in pervasive scenarios. In: Proc. Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation. CRPIT, vol. 32 (2004)

    Google Scholar 

  22. Persson, P., Blom, J., Jung, Y.: DigiDress: A Field Trial of an Expressive Social Proximity Application. In: Beigl, M., Intille, S.S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol. 3660, pp. 195–212. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  23. Pfitzmann, A., Pfitzmann, B., Waidner, M.: Trusting Mobile User Devices and Security Modules. Computer 30(2), 61–68 (1997)

    Article  Google Scholar 

  24. Ravi, S., et al.: Security as a new dimension in embedded system design. In: Proc. Design Automation (June 2004)

    Google Scholar 

  25. Rodden, T., Benford, S.: The evolution of buildings and implications for the design of ubiquitous domestic environments. In: Proc. ACM CHI 2003, pp. 9–16 (2003)

    Google Scholar 

  26. Saeb, M., Hamza, M., Soliman, A.: Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree. In: Proc. sOc 2003 (2003)

    Google Scholar 

  27. Weld, D., et al.: Automatically personalizing user interfaces. In: Proc. IJCAI 2003, pp. 1613–1619. Morgan Kaufmann, San Francisco (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bell, M., Hall, M., Chalmers, M., Gray, P., Brown, B. (2006). Domino: Exploring Mobile Collaborative Software Adaptation. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds) Pervasive Computing. Pervasive 2006. Lecture Notes in Computer Science, vol 3968. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11748625_10

Download citation

  • DOI: https://doi.org/10.1007/11748625_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33894-9

  • Online ISBN: 978-3-540-33895-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics