Skip to main content

Smart Environments: Middleware Building Blocks for Pervasive Network Computing (A Position Paper)

  • Conference paper
  • First Online:
Developing an Infrastructure for Mobile and Wireless Systems (IMWS 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2538))

Included in the following conference series:

Abstract

With the explosive expansion of the Internet as the global information infrastructure, coupled with rapid advances in wireless technologies, a new vision for computing is emerging. A seamless, anywhere, anytime, untethered, pervasive computing paradigm is touted as the next major paradigm shift in the way we compute and communicate. In order to realize this vision, the complexity of this environment must be masked from its consumers (users) and producers alike (service providers). We believe that a middleware infrastructure that provides appropriate high-level abstractions for both users and service-providers is needed. Such a middleware infrastructure must allow powerful services to be easily deployed and permit users to interact with such services in a personalized, yet effortless manner. In this position paper, we introduce the notion of a “smart service” ‐ services with which users can dynamically interact in an automated and personalized manner, and can be composed to form “smart environments.” Smart environments present an integrated view of services to the user to enable much higher-level, domain-specific interactions and to support user customization. We present a system architecture for building smart services and smart environments, and the middleware research challenges that must be addressed to realize this architecture and the core abstractions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W. Adjie-Winoto, E. Schwartz, H. Balakrishnan, and J. Lilley. “The Design and Implementation of an Intentional Naming System.” In Proceedings of the Seventeenth Symposium on Operating Systems Principles, pp.186–201, Kiawah Island Resort, South Carolina, Dec. 1999.

    Google Scholar 

  2. G. Abowd, C. Atkeson, I. Essa, and K. Ramachandran. “Buidling a Large-Scale Ubiquitous Computing Interface.” 1998. A Proposal Submitted to the National Science Foundation Major Research Instrumentation Program, http://www.cc.gatech.edu/fce/pubs/BaLSUCI.pdf.

  3. G. Abowd. “Ubiquitous Computing: Research Themes and Open Issues from an Appications Perspective.” Technical Report GIT-GVU 96-24, GVU Center, Georgia Institute of Technology, Oct. 1996. Available from http://www.cc.gatech.edu/fce/publications.html.

  4. K. Arnold, B. O’sullivan, R.W. Scheifler, J. Waldo, and A. Wollrath. The Jini Specification. Addison-Wesley, 1999.

    Google Scholar 

  5. G. Banavar, J. Beck, E. Gluzberg, J. Munson, J. Sussman, and D. Zukowski. “Challenges: An Application Model for Pervasive Computing.” In Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom 2000).

    Google Scholar 

  6. E. Belani et al. “The CRISISWide Area Security Architecture.” In Proceedings of USENIX Security Symposium, 1998.

    Google Scholar 

  7. Bluetooth SIG. Specification of the Bluetooth System. Dec 1999, http://www.bluetooth.com.

  8. M. Brand and I. Essa. “Causal Analysis for Visual Gesture Understanding.” In Proceedings of AAAI Fall Symposium on Computational Models for Integrating Languages and Vision, 1995.

    Google Scholar 

  9. T. Bray, J. Paoli, C.M. Sperberg-McQueen. Extensible Markup Language (XML). W3C Proposed Recommendation, Dec. 1997. http://www.w3.org/TR/PR-xml-971208.

  10. L. Cardelle. “Abstractions for Mobile Computations.” In J. Vtek and C.D. Jensen, editors, Secure Internet Programming: Security Issues for Distributed and Mobile Objects. Vol. 1603 of Lecture Notes in Computer Science, pp.51–94, Springer-Verlag, 1999.

    Google Scholar 

  11. L. Cardelli and A. D. Gordon. “Mobile Ambients.” In M. Nivat, editor, Foundations of Software Science and Computational Structures. Vol. 1378 of Lecture Notes in Computer Science, pp.140–155, Springer-Verlag, 1998.

    Chapter  Google Scholar 

  12. L.M. Correia, R. Prasad. “An Overview of Wireless Broadband Communications.” IEEE Communications Magazine, pp.28–33, Jan. 1997.

    Google Scholar 

  13. S.E. Czerwinski, B.Y. Zhao, T.D. Hodes, A.D. Joseph, and R. H. Katz. “An Architecture for a Secure Service Discovery Service.” In Proceedings of the Fifth ACM/IEEE Internation Conference on Mobile Computing and Networking, pp.24–35, Seattle, Washington, Aug. 1999.

    Google Scholar 

  14. A. Dearle. “Towards Ubiquitous Environments for Mobile Users.” IEEE Internet Computing, pp.22–32, Jan.-Feb. 1998.

    Google Scholar 

  15. A. Dey, G. Abowd, and A. Wood. “Cyberdesk: A Framework for Providing Self-Integrating Context-Aware Services.” In Proceedings of the 1998 Intelligent User Interfaces Conference (IUI'98), pp.47–54, 1998.

    Google Scholar 

  16. IEEE 802.11. “Wireless Access Method and Physical Layer Specification.” New York, Sep. 1994.

    Google Scholar 

  17. I. Essa, S. Basu, T. Darrell, and A. Pentland. “Modeling, Tracking and Interactive Animation of Faces and Heads Using Input from Video.” In Proceedings of Computer Animation Conference 1996, pp.68–79. Jun. 1996.

    Google Scholar 

  18. I. Essa and A. Pentland. “Coding, Analysis, Interpretation, and Recognition of Facial Expressions.” IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7):757–763, 1997.

    Article  Google Scholar 

  19. E. Freeman, S. Hupfer, and K. Arnold. JavaSpaces Principles, Patterns, and Practice. Addison-Wesley, 1999.

    Google Scholar 

  20. D. Garlan. “Architecture for Pervasive Computing.” In Proceedings of the Workshop on Architectures for Ubiquitous Computing. Limerick, Ireland, June, 2000.

    Google Scholar 

  21. J. Gosling, B. Joy, and G. Steele. The Java Language Specification. Addison-Wesley, 1996.

    Google Scholar 

  22. R. Grimm, T. Anderson, B. Bershad, and D. Wetherall. “A System Architecture for Pervasive Computing.” In Proceedings of the 9th ACMSIGOPS European Workshop, pp.177–182, Kolding, Denmark, Sep. 2000.

    Google Scholar 

  23. R. Grimmet al. “System Directions for Pervasive Computing.” In Proceedings of Hot Topics in Operating Systems (HotOS-VIII), Elmau, Germany, May 2001.

    Google Scholar 

  24. O. Gruber and R. Konuru. “An Application Model and Environment for Personal Information Appliances.”

    Google Scholar 

  25. W. Honcharenko, J.P. Kruys, D. Y. lee, and N.J. Shah. “Broadband Wireless Access.” IEEE Communicatios Magazine, pp.20–26, Jan. 1997.

    Google Scholar 

  26. M. Esler, J. Hightower, T. Anderson, and G. Boriello. “Next Century Challenges: Data-Centric Networking for Invisible Computing.” In Proceedings of the Fifth ACM/IEEE Internation Conference on Mobile Computing and Networking, pp.256–262, Seattle, Washington, Aug. 1999.

    Google Scholar 

  27. J. Mankoff and G. D. Abowd. “Domisilica: Providing Ubiquitous Access to the Home.” Technical Report GIT-GVU-97-17, GVU Center, Georgia Institute of Technology, Sep. 1997. Available from http://www.cc.gatech.edu/fce/publications.html.

  28. J. Mankoff and G. D. Abowd. “Bringing People and Places Together.” In Proceedings of the 1998 Spring AAAI Symposium on Intelligent Environments, 1998.

    Google Scholar 

  29. R. Mettala. Bluetooth Protocol Architecture, Version 1.0. Bluetooth Special Interest Group, Aug. 199. http://www.bluetooth.com/v2/document.

  30. B.C. Neuman. “Proxy-Based Authorization and Accounting for Distributed Systems.” Proceedings of the 13th International Conference on Distributed Computing Systems, May 1993.

    Google Scholar 

  31. A. Pentland. “Smart Room.” Scientific American, 274(4):68–76, April 1996.

    Article  Google Scholar 

  32. C. Perkins, et al. “IP Mobility Support.” IETF RFC 2002, Oct. 1996.

    Google Scholar 

  33. T. Richardson, Q. Stafford-Fraser, K. Wood, and A. Hopper. “Virtual Network Computing.” IEEE Internet Computing, pp.33–38, Jan.-Feb., 1998.

    Google Scholar 

  34. R. L. Rivest and B. Lampson, “SDSI-A Simple Distributed Security Infrastructure.” http://www.theory.lcs.mit.edu/cis/sdsi.html, 1996.

  35. A. Smailagic and D.P. Siewioerk. “User-Centered Interdisciplinary Design of Wearable Computers.” ACM Mobile Computing and Communications Review, 3(3), 1999.

    Google Scholar 

  36. J. G. Steiner, et. al, “Kerberos: an authentication service for open network systems.” In Proceedings of USENIX, 1988.

    Google Scholar 

  37. A. Tripathi, T. Ahmed, and N. Karnik. “Experiences and Future Challenges inMobile Agent Programming.” Submitted to Microsystems, Oct. 2000.

    Google Scholar 

  38. A. Vahdat, T. Anderson, M. Dahlin, E. Belani, D. Culler, P. Eastham, and C. Yoshikawa. “WebOs: Operating System Services for Wide Area Applications.” In Proceedings of the Seventh IEEE International Symposium on High Performance Distributed Computing, pp.52–63, Chicago, Illinois, July 1998.

    Google Scholar 

  39. S. Verdu. “Wireless Bandwidth in the Making.” IEEE Communications Magazine, pp.53–58, Jul. 2000.

    Google Scholar 

  40. Z. Wang and D. Garlan. “Task-Driven Computing.” Technical Report CMU-CS-00-154, Carnegie Mellow University, School of Computer Science, May 2000.

    Google Scholar 

  41. M. Weiser. “The Computer for the 21st Century.” Scientific American, 265, 3 (September 1991), pp.94–104.

    Article  Google Scholar 

  42. A. Wood, A. Dey, and G. Abowd. “Cyberdesk: Automated Integration of Desktop and Network Services.” In Proceedings of the 1997 Conference on Human Factors in Computing Systems (CHI'97), pp.552–553, 1997.

    Google Scholar 

  43. P. Wyckoff, S.W. McLaughry, T.J. Lehman, and D.A. Ford. “T Spaces.” IBM System Journal, 37(3):454–474, 1998.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Weissman, J., Zhang, ZL. (2002). Smart Environments: Middleware Building Blocks for Pervasive Network Computing (A Position Paper). In: König-Ries, B., Makki, K., Pissinou, N., Makki, S., Scheuermann, P. (eds) Developing an Infrastructure for Mobile and Wireless Systems. IMWS 2001. Lecture Notes in Computer Science, vol 2538. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36257-6_9

Download citation

  • DOI: https://doi.org/10.1007/3-540-36257-6_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00289-5

  • Online ISBN: 978-3-540-36257-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics