Abstract
With the explosive expansion of the Internet as the global information infrastructure, coupled with rapid advances in wireless technologies, a new vision for computing is emerging. A seamless, anywhere, anytime, untethered, pervasive computing paradigm is touted as the next major paradigm shift in the way we compute and communicate. In order to realize this vision, the complexity of this environment must be masked from its consumers (users) and producers alike (service providers). We believe that a middleware infrastructure that provides appropriate high-level abstractions for both users and service-providers is needed. Such a middleware infrastructure must allow powerful services to be easily deployed and permit users to interact with such services in a personalized, yet effortless manner. In this position paper, we introduce the notion of a “smart service” ‐ services with which users can dynamically interact in an automated and personalized manner, and can be composed to form “smart environments.” Smart environments present an integrated view of services to the user to enable much higher-level, domain-specific interactions and to support user customization. We present a system architecture for building smart services and smart environments, and the middleware research challenges that must be addressed to realize this architecture and the core abstractions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
W. Adjie-Winoto, E. Schwartz, H. Balakrishnan, and J. Lilley. “The Design and Implementation of an Intentional Naming System.” In Proceedings of the Seventeenth Symposium on Operating Systems Principles, pp.186–201, Kiawah Island Resort, South Carolina, Dec. 1999.
G. Abowd, C. Atkeson, I. Essa, and K. Ramachandran. “Buidling a Large-Scale Ubiquitous Computing Interface.” 1998. A Proposal Submitted to the National Science Foundation Major Research Instrumentation Program, http://www.cc.gatech.edu/fce/pubs/BaLSUCI.pdf.
G. Abowd. “Ubiquitous Computing: Research Themes and Open Issues from an Appications Perspective.” Technical Report GIT-GVU 96-24, GVU Center, Georgia Institute of Technology, Oct. 1996. Available from http://www.cc.gatech.edu/fce/publications.html.
K. Arnold, B. O’sullivan, R.W. Scheifler, J. Waldo, and A. Wollrath. The Jini Specification. Addison-Wesley, 1999.
G. Banavar, J. Beck, E. Gluzberg, J. Munson, J. Sussman, and D. Zukowski. “Challenges: An Application Model for Pervasive Computing.” In Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom 2000).
E. Belani et al. “The CRISISWide Area Security Architecture.” In Proceedings of USENIX Security Symposium, 1998.
Bluetooth SIG. Specification of the Bluetooth System. Dec 1999, http://www.bluetooth.com.
M. Brand and I. Essa. “Causal Analysis for Visual Gesture Understanding.” In Proceedings of AAAI Fall Symposium on Computational Models for Integrating Languages and Vision, 1995.
T. Bray, J. Paoli, C.M. Sperberg-McQueen. Extensible Markup Language (XML). W3C Proposed Recommendation, Dec. 1997. http://www.w3.org/TR/PR-xml-971208.
L. Cardelle. “Abstractions for Mobile Computations.” In J. Vtek and C.D. Jensen, editors, Secure Internet Programming: Security Issues for Distributed and Mobile Objects. Vol. 1603 of Lecture Notes in Computer Science, pp.51–94, Springer-Verlag, 1999.
L. Cardelli and A. D. Gordon. “Mobile Ambients.” In M. Nivat, editor, Foundations of Software Science and Computational Structures. Vol. 1378 of Lecture Notes in Computer Science, pp.140–155, Springer-Verlag, 1998.
L.M. Correia, R. Prasad. “An Overview of Wireless Broadband Communications.” IEEE Communications Magazine, pp.28–33, Jan. 1997.
S.E. Czerwinski, B.Y. Zhao, T.D. Hodes, A.D. Joseph, and R. H. Katz. “An Architecture for a Secure Service Discovery Service.” In Proceedings of the Fifth ACM/IEEE Internation Conference on Mobile Computing and Networking, pp.24–35, Seattle, Washington, Aug. 1999.
A. Dearle. “Towards Ubiquitous Environments for Mobile Users.” IEEE Internet Computing, pp.22–32, Jan.-Feb. 1998.
A. Dey, G. Abowd, and A. Wood. “Cyberdesk: A Framework for Providing Self-Integrating Context-Aware Services.” In Proceedings of the 1998 Intelligent User Interfaces Conference (IUI'98), pp.47–54, 1998.
IEEE 802.11. “Wireless Access Method and Physical Layer Specification.” New York, Sep. 1994.
I. Essa, S. Basu, T. Darrell, and A. Pentland. “Modeling, Tracking and Interactive Animation of Faces and Heads Using Input from Video.” In Proceedings of Computer Animation Conference 1996, pp.68–79. Jun. 1996.
I. Essa and A. Pentland. “Coding, Analysis, Interpretation, and Recognition of Facial Expressions.” IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7):757–763, 1997.
E. Freeman, S. Hupfer, and K. Arnold. JavaSpaces Principles, Patterns, and Practice. Addison-Wesley, 1999.
D. Garlan. “Architecture for Pervasive Computing.” In Proceedings of the Workshop on Architectures for Ubiquitous Computing. Limerick, Ireland, June, 2000.
J. Gosling, B. Joy, and G. Steele. The Java Language Specification. Addison-Wesley, 1996.
R. Grimm, T. Anderson, B. Bershad, and D. Wetherall. “A System Architecture for Pervasive Computing.” In Proceedings of the 9th ACMSIGOPS European Workshop, pp.177–182, Kolding, Denmark, Sep. 2000.
R. Grimmet al. “System Directions for Pervasive Computing.” In Proceedings of Hot Topics in Operating Systems (HotOS-VIII), Elmau, Germany, May 2001.
O. Gruber and R. Konuru. “An Application Model and Environment for Personal Information Appliances.”
W. Honcharenko, J.P. Kruys, D. Y. lee, and N.J. Shah. “Broadband Wireless Access.” IEEE Communicatios Magazine, pp.20–26, Jan. 1997.
M. Esler, J. Hightower, T. Anderson, and G. Boriello. “Next Century Challenges: Data-Centric Networking for Invisible Computing.” In Proceedings of the Fifth ACM/IEEE Internation Conference on Mobile Computing and Networking, pp.256–262, Seattle, Washington, Aug. 1999.
J. Mankoff and G. D. Abowd. “Domisilica: Providing Ubiquitous Access to the Home.” Technical Report GIT-GVU-97-17, GVU Center, Georgia Institute of Technology, Sep. 1997. Available from http://www.cc.gatech.edu/fce/publications.html.
J. Mankoff and G. D. Abowd. “Bringing People and Places Together.” In Proceedings of the 1998 Spring AAAI Symposium on Intelligent Environments, 1998.
R. Mettala. Bluetooth Protocol Architecture, Version 1.0. Bluetooth Special Interest Group, Aug. 199. http://www.bluetooth.com/v2/document.
B.C. Neuman. “Proxy-Based Authorization and Accounting for Distributed Systems.” Proceedings of the 13th International Conference on Distributed Computing Systems, May 1993.
A. Pentland. “Smart Room.” Scientific American, 274(4):68–76, April 1996.
C. Perkins, et al. “IP Mobility Support.” IETF RFC 2002, Oct. 1996.
T. Richardson, Q. Stafford-Fraser, K. Wood, and A. Hopper. “Virtual Network Computing.” IEEE Internet Computing, pp.33–38, Jan.-Feb., 1998.
R. L. Rivest and B. Lampson, “SDSI-A Simple Distributed Security Infrastructure.” http://www.theory.lcs.mit.edu/cis/sdsi.html, 1996.
A. Smailagic and D.P. Siewioerk. “User-Centered Interdisciplinary Design of Wearable Computers.” ACM Mobile Computing and Communications Review, 3(3), 1999.
J. G. Steiner, et. al, “Kerberos: an authentication service for open network systems.” In Proceedings of USENIX, 1988.
A. Tripathi, T. Ahmed, and N. Karnik. “Experiences and Future Challenges inMobile Agent Programming.” Submitted to Microsystems, Oct. 2000.
A. Vahdat, T. Anderson, M. Dahlin, E. Belani, D. Culler, P. Eastham, and C. Yoshikawa. “WebOs: Operating System Services for Wide Area Applications.” In Proceedings of the Seventh IEEE International Symposium on High Performance Distributed Computing, pp.52–63, Chicago, Illinois, July 1998.
S. Verdu. “Wireless Bandwidth in the Making.” IEEE Communications Magazine, pp.53–58, Jul. 2000.
Z. Wang and D. Garlan. “Task-Driven Computing.” Technical Report CMU-CS-00-154, Carnegie Mellow University, School of Computer Science, May 2000.
M. Weiser. “The Computer for the 21st Century.” Scientific American, 265, 3 (September 1991), pp.94–104.
A. Wood, A. Dey, and G. Abowd. “Cyberdesk: Automated Integration of Desktop and Network Services.” In Proceedings of the 1997 Conference on Human Factors in Computing Systems (CHI'97), pp.552–553, 1997.
P. Wyckoff, S.W. McLaughry, T.J. Lehman, and D.A. Ford. “T Spaces.” IBM System Journal, 37(3):454–474, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Weissman, J., Zhang, ZL. (2002). Smart Environments: Middleware Building Blocks for Pervasive Network Computing (A Position Paper). In: König-Ries, B., Makki, K., Pissinou, N., Makki, S., Scheuermann, P. (eds) Developing an Infrastructure for Mobile and Wireless Systems. IMWS 2001. Lecture Notes in Computer Science, vol 2538. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36257-6_9
Download citation
DOI: https://doi.org/10.1007/3-540-36257-6_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00289-5
Online ISBN: 978-3-540-36257-9
eBook Packages: Springer Book Archive