Providing Location Information in a Ubiquitous Computing Environment

  • Mike Spreitzer
  • Marvin Theimer
Part of the The Kluwer International Series in Engineering and Computer Science book series (SECS, volume 353)


To take full advantage of the promise of ubiquitous computing requires the use of location information, yet people should have control over who may know their whereabouts. We present an architecture that achieves these goals for an interesting set of applications. Personal information is managed by User Agents, and a partially decentralized Location Query Service is used to facilitate location-based operations. This architecture gives users primary control over their location information, at the cost of making more expensive certain queries, such as those wherein location and identity closely interact. We also discuss various extensions to our architecture that offer users additional trade-offs between privacy and efficiency. Finally, we report some measurements of the unextended system in operation, focusing on how well the system is actually able to track people. Our system uses two kinds of location information, which turn out to provide partial and complementary coverage.


Location Information Ubiquitous Computing User Agent Multicast Group Location Program 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    N. Ackroyd and R. Lorimer. Global Navigation: A GPS User’s Guide. Lloyd’s of London Press, 1990.Google Scholar
  2. [2]
    D. Chaum. Security without identification: transaction systems to make big brother obsolete. CACM, 28(10):1030–1044, October 1985.Google Scholar
  3. [3]
    S. Elrod, G. Hall, R. Costanza, M. Dixon, and J. desRivieres. The responsive environment: Using ubiquitous computing for office comfort and energy management. Technical Report CSL-93-5, Xerox Palo Alto Research Center, 1993.Google Scholar
  4. [4]
    B.N. Schilit, M.M. Theimer, and B.B. Welch. Customizing mobile application. In Proceedings USENIX Symposium on Mobile & Location-Independent Computing, pages 129–138. USENIX Association, August 1993.Google Scholar
  5. [5]
    M. Spreitzer and M.M. Theimer. Scalable, secure, mobile computing with location information. CACM, 36(7):27, July 1993.Google Scholar
  6. [6]
    ruser manual entry of the SUNOS UNIX manual.Google Scholar
  7. [7]
    R. Want and A. Hopper. Active badges and personal interactive computing objects. Transactions on Consumer Electronics, 38(1), February 1992.Google Scholar
  8. [8]
    R. Want, A. Hopper, V. Falcao, and J. Gibbons. The active badge location system. Transactions on Information Systems, 10(1), January 1992.Google Scholar
  9. [9]
    M. Weiser. The computer for the twenty-first century. Scientific American, pages 94–104, September 1992.Google Scholar
  10. [10]
    M. Weiser. Some computer science problems in ubiquitous computing. CACM, 36(7):74–83, July 1993.Google Scholar

Copyright information

© the Association for Computing Machinery, Inc. 1993

Authors and Affiliations

  • Mike Spreitzer
    • 1
  • Marvin Theimer
    • 1
  1. 1.Xerox Palo Alto Research CenterPalo Alto

Personalised recommendations