Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)


In this chapter we start with a motivation for distributed context-aware systems. This is mainly related to the growing need for people to efficiently communicate with each other independently of specific tasks and location. Current widely used tools such as instant messaging and e-mail lack several characteristics of face-to-face communication often found on colocated teams. A promising approach is context-aware applications; these are able to adapt their operations to current context without explicit user intervention. Such applications raise the issue of context propagation which clearly poses several challenges regarding scalability and privacy. In this chapter we clarify such challenges and conclude by emphasizing the distinctive features of the survey in this book: basically, we describe the possible options that an application developer has to consider regarding distributed context-aware applications, instead of just enumerating the requirements.


Context-aware Applications Take Off Pounds Sensibly (TOPS) Context Fusion Network Virtual Tour Guides Require User Intervention 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a better understanding of context and context-awareness. In: Proceedings of the 1st International Symposium on Handheld and Ubiquitous Computing, HUC ’99, pp. 304–307. Springer, London (1999).
  2. 4.
    Allavena, A., Demers, A., Hopcroft, J.E.: Correctness of a gossip based membership protocol. In: Proceedings of the 24th Annual ACM Symposium on Principles of Distributed Computing, PODC ’05, pp. 292–301. ACM, New York (2005). doi:10.1145/1073814.1073871.
  3. 7.
    Baldauf, M., Dustdar, S., Rosenberg, F.: A survey on context- aware systems. Int. J. Ad Hoc Ubiquitous Comput. 2(4), 263–277 (2007). doi:10.1504/IJAHUC.2007.014070.
  4. 10.
    Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003). doi:10.1109/MPRV.2003.1186725CrossRefGoogle Scholar
  5. 11.
    Bjerrum, E., Bødker, S.: Learning and living in the ‘new office’. In: Kuutti, K., Karsten, E., Fitzpatrick, G., Dourish, P., Schmidt, K. (eds.) ECSCW 2003, pp. 199–218. Springer, Netherlands (2003). doi:10.1007/978-94-010-0068-0_11.
  6. 13.
    Bratskas, P., Paspallis, N., Papadopoulos, G.: An evaluation of the state of the art in context-aware architectures. In: The 16th International Conference on Information Systems Development (ISD 2007). Springer, Heidelberg (2007)Google Scholar
  7. 17.
    Castro, M., Druschel, P., Kermarrec, A.M., Rowstron, A.I.T.: Scribe: a large-scale and decentralized application-level multicast infrastructure. IEEE J. Sel. Area Comm. 20(8), 1489–1499 (2002). doi:10.1109/JSAC.2002.803069CrossRefGoogle Scholar
  8. 18.
    Castro, M., Jones, M., Kermarrec, A.M., Rowstron, A., Theimer, M., Wang, H., Wolman, A.: An evaluation of scalable application-level multicast built using peer-to-peer overlays. In: The 22nd Annual Joint Conference of the IEEE Computer and Communications, INFOCOM 2003, vol. 2, pp. 1510–1520. IEEE Societies, San Francisco (2003). doi:10.1109/INFCOM.2003.1208986Google Scholar
  9. 24.
    Chen, G., Li, M., Kotz, D.: Design and implementation of a large-scale context fusion network. In: Mobile and Ubiquitous Systems: Networking and Services, 2004. The 1st Annual International Conference on MOBIQUITOUS 2004, pp. 246–255 (2004). doi:10.1109/MOBIQ.2004.1331731Google Scholar
  10. 25.
    Cheverst, K., Mitchell, K., Davies, N.: Design of an object model for a context sensitive tourist {GUIDE}. Comput. Graph. 23(6), 883–891 (1999). doi:
  11. 34.
    Dourish, P., Bellotti, V.: Awareness and coordination in shared workspaces. In: Proceedings of the 1992 ACM Conference on Computer-Supported Cooperative Work, CSCW ’92, pp. 107–114. ACM, New York (1992). doi:10.1145/143457.143468.
  12. 37.
    Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.M.: The many faces of publish/subscribe. ACM Comput. Surv. 35(2), 114–131 (2003). doi:10.1145/857076.857078.
  13. 43.
    Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys ’03, pp. 31–42. ACM, New York (2003). doi:10.1145/1066116.1189037.
  14. 44.
    Gutwin, C., Schneider, K., Paquette, D., Penner, R.: Supporting group awareness in distributed software development. In: Bastide, R., Palanque, P., Roth, J. (eds.) Engineering Human Computer Interaction and Interactive Systems. Lecture Notes in Computer Science, vol. 3425, pp. 383–397. Springer, Berlin (2005). doi:10.1007/11431879_25.
  15. 45.
    Henricksen, K., Indulska, J., McFadden, T., Balasubramaniam, S.: Middleware for distributed context-aware systems. In: Meersman, R., Tari, Z. (eds.) On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. Lecture Notes in Computer Science, vol. 3760, pp. 846–863. Springer, Berlin (2005). doi:10.1007/11575771_53.
  16. 55.
    Lane, N., Miluzzo, E., Lu, H., Peebles, D., Choudhury, T., Campbell, A.: A survey of mobile phone sensing. IEEE Comm. Mag. 48(9), 140–150 (2010). doi:10.1109/MCOM.2010.5560598CrossRefGoogle Scholar
  17. 58.
    Mathur, A., Hall, R.W., Jahanian, F., Prakash, A., Rasmussen, C.: The publish/subscribe paradigm for scalable group collaboration systems. Department of Electrical Engineering and Computer Science University of Michigan. Ann Arbor MI 48109, CSE-TR-270-95 (1995)Google Scholar
  18. 59.
    Miluzzo, E., Lane, N.D., Fodor, K., Peterson, R., Lu, H., Musolesi, M., Eisenman, S.B., Zheng, X., Campbell, A.T.: Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application. In: Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, SenSys ’08, pp. 337–350. ACM, New York (2008). doi:10.1145/1460412.1460445.
  19. 69.
    Priyantha, B., Lymberopoulos, D., Liu, J.: Littlerock: enabling energy-efficient continuous sensing on mobile phones. IEEE Pervasive Comput. 10(2), 12–15 (2011). doi:10.1109/MPRV.2011.28CrossRefGoogle Scholar
  20. 72.
    Raento, M., Oulasvirta, A., Petit, R., Toivonen, H.: Contextphone: a prototyping platform for context-aware mobile applications. IEEE Pervasive Comput. 4(2), 51–59 (2005). doi:10.1109/MPRV.2005.29CrossRefGoogle Scholar
  21. 73.
    Rana, R.K., Chou, C.T., Kanhere, S.S., Bulusu, N., Hu, W.: Ear-phone: an end-to-end participatory urban noise mapping system. In: Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN ’10, pp. 105–116. ACM, New York (2010). doi:10.1145/1791212.1791226.
  22. 76.
    Reddy, S., Parker, A., Hyman, J., Burke, J., Estrin, D., Hansen, M.: Image browsing, processing, and clustering for participatory sensing: lessons from a dietsense prototype. In: Proceedings of the 4th Workshop on Embedded Networked Sensors, pp. 13–17. ACM, New York (2007).
  23. 80.
    Saito, Y., Shapiro, M.: Optimistic replication. ACM Comput. Surv. 37(1), 42–81 (2005). doi:10.1145/1057977.1057980.
  24. 81.
    Salber, D., Dey, A.K., Abowd, G.D.: The context toolkit: aiding the development of context-enabled applications. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’99, pp. 434–441. ACM, New York (1999). doi:10.1145/302979.303126.
  25. 84.
    Sawyer, S., Guinan, P.: Software development: processes and performance. IBM Syst. J. 37(4), 552–569 (1998). doi:10.1147/sj.374.0552CrossRefGoogle Scholar
  26. 85.
    Schilit, B., Adams, N., Want, R.: Context-aware computing applications. In: Proceedings of the 1st Workshop on Mobile Computing Systems and Applications 1994, WMCSA ’94, pp. 85–90. IEEE Computer Society, Washington (1994). doi:10.1109/WMCSA.1994.16.
  27. 87.
    Segall, B., Arnold, D.: Elvin has left the building: a publish/subscribe notification service with quenching. In: Proceedings AVVG 1997, Brisbane (1997)Google Scholar
  28. 90.
    Simão, J., Ribeiro, C., Ferreira, P., Veiga, L.: Jano: location-privacy enforcement in mobile and pervasive environments through declarative policies. J. Internet Serv. Appl. 3, 291–310 (2012). doi:10.1007/s13174-012-0065-z.
  29. 95.
    Wang, F.Y., Carley, K., Zeng, D., Mao, W.: Social computing: from social informatics to social intelligence. IEEE Intell. Syst. 22(2), 79–83 (2007). doi:10.1109/MIS.2007.41CrossRefGoogle Scholar

Copyright information

© The Author(s) 2014

Authors and Affiliations

  1. 1.INESC ID, Instituto Superior TécnicoUniversidade de LisboaLisboaPortugal

Personalised recommendations