SlideShare a Scribd company logo
1 of 29
Context Awareness in Mobile Computing
The Revolutionary Impact of Pervasive Mobile Computing




Bob Hardian
hardian@cs.ui.ac.id
Fakultas Ilmu Komputer, Universitas Indonesia




SRITI 2011
Seminar Riset Tenologi Informasi
                                                         1
Pervasive – Ubiquitous – Mobile Computing
                              Level of embeddedness
                                           High


                         Pervasive                Ubiquitous
                        Computing                 Computing

        Low                                                           High
                                                     Level of mobility
                        Traditional
                         Business                   Mobile
                        Computing                 Computing


                                           Low
[1]


SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                             2
Mobile Computing: the Next Decade

   Scenario 1: Lost Child




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  3
Mobile Computing: the Next Decade

   Scenario 2: Disaster Relief




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  4
Mobile Computing: the Next Decade

   Scenario 3: Cognitive Assistance




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  5
Mobile Computing: the Next Decade

   Scenario 4: Medical Consultation




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  6
Reflecting on these Scenarios [3]

   Embody a number of themes
      Rich sensors
      Crowd sourcing
      Near-real-time data consistency
      Opportunism
      Transient use of infrastructure
      User interaction




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  7
Reducing Distraction
   User attention is a precious resource

     The most successful mobile computing
     systems of the next decade will be those that
     are able to reduce or eliminate user
     interactions




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                     8
User Interaction with Mobile Device

   Mobile application autonomy can reduce user
    interaction.

   Mobile application should place greater dependence
    on contextual information




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                         9
Context Definitions
   Context defined variously as:
      An application/user’s environment or situation
      A combination of computing, user and physical features

   Definition from Dey & Abowd [2]:
         “Context is any information that can be used to characterise
         the situation of an entity. An entity is a person, place or
         object that is considered relevant to the interaction
         between a user and an application, including the user and
         the application themselves.”




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                        10
Context Awareness
   Context of computation may change

   Context of computation may be (partially) captured by context
    information

   Context information can be used to
      provide seamless computing
      provide relevant services to users




     Needed: Information about requirements and
     current status of computations and their
     environments



SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                    11
Context Information - Example
   user location, devices, applications

   user preferences and QoS requirements

   application QoS requirements and status

   device and network capabilities and their current status

   relationships between context information




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                               12
Context Awareness & Mobile Apps

   Context-aware applications tend to be enhanced
    mobile applications for the following reasons:
      User context changes frequently subject to the user’s
       mobility behavior
      The need for context-aware behavior is greater in a mobile
       environment (user location, network resources, and device
       capabilities)




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                    13
Context-Aware Logic Space [4]




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  14
Proximity selection
   Proximity selection is primarily based on the user location
    context

   Such context can be:
      resources and devices in the vicinity of the user
      places of interests closest to the user current position
      computational objects with which the mobile user is
       currently interacting




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                  15
Context Modeling
   Modeling context is a technique focuses on
    how to find and relate contextual information
    that better captures the observation of certain
    worlds of interest




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                      16
Context Modeling - Example

                                                                    has device
                                                  Person                                 Device
 Conceptual model (CML)                           (name)                                  (id)

                                                                    located at
                                                                                         Location
                                                                                          (name)


                                                      Maps to


                                                           HasDevice(Person, Device)
 Logical model (relational model)
                                                           LocatedAt(Person, Location)




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                                                    17
Disruption Level
                has disruption level           (name)



                                        has allow status              Allow Status
                                                                          (nr)
                 Profile
                 (code)                                    has divert status
                                                                                            Divert Status
                                                                                               (name)

         has profile
                                       has location type
                                                                     Location Type
                                                                        (Name)          has divert type

                                       has nearest base station
                 Device                                               Base Station
                  (id)                                                    (nr)

                                        has network strength
                                                                        Network
                                                                        Strength             Number Type
                                                                          (nr)                 (name)

                       has device


                                        has phone number                             has number type
                 Person                                             Phone Number
                 (name)                                                 (nr)


SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                                                            18
Context-Aware Application
  A Context-aware application should have a set of characteristics related
  to context modeling, handling, adaptation:

   Context acquisition                            Context adaptation

   Context aggregation                            Context reasoning

   Context consistency                            Context quality indicators

   Context discovery                              Context integration

   Context query




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                                 19
Typical Architecture

                           Context-Aware Applications

                                      Programming Toolkit




                                        Context Manager     Preference
              Middleware                                     Manager
                                              Context
                                               Model




                   Context Gathering & Processing Layer

                     Sensor                   Sensor        Sensor



SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                         20
User Control of
 Context-Aware Mobile Apps
   Context-aware mobile application may not always behave in
    the way users expected, due to
      Imperfect context information
      Incorrect user preferences
      Incorrect adaptation rules

   Users may feel loss of control over their application.

   The system must provide mechanisms to strike a suitable
    balance of control




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                21
Balance of User Control
   A continuum of user control versus application autonomy



       A                                          B                          C


                                                      Application autonomy
             User control




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                                 22
Providing Suitable Balance of Control

   Make users aware of reasons for application adaptation

   User may be able to correct undesirable actions

   Users may have varying levels of expertise




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                             23
Exposing the System’s view
   Exposing system’s view of the context and its corresponding
    actions provides a sufficient understanding to correct
    inappropriate action (increases user control)

   An appropriate modelling of context and preference is needed
    for revealing the information to the users


                Context-aware System
                                Context
                              Information         Interactions
         Adaptation                                              Users
           Logic
                                 User
                              Preferences




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                         24
Example Approach
                                                                                          Exposed
                          Context and                                                     application
                          preference                                                      state
                          change            Information Filter                            information
                                                    &
                                          Explanation Generator
      Programming Toolkit
                                                                                         Information
         Context &                                                                       request
         Preference                                                                      (scrutinize)
                                                                                                        USER
 Context  Manager           Traces
 Database                  Database
                                            Semantic Manager
                   User




                                                            Context Graph
                   Preference                Descriptions




                                                                            User Model
                User
             Preference
              Database



                                                                                         User feedback



SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                                                               25
User
                                                                                                   Outside World

                                                                                                             context
                                                                   User interaction                         changes
        Context-Aware Application

                                                                                                               Context
                                               Context                    Web
                                               Windows                  Interface                               Client


                                                                preferences                       context       context
                                                                 and profile                     changes       changes
                                                                information


                                                                                   Context and
                                                                                 Preference Proxy

                                inquiry                     revealed       context information
                             (scrutinizing)               information        and preference                     context and
                                                                            evaluation scores               preference changes


                                                                                          Context and
                                        Semantic Manager
                                                                                      Preference Manager



SRITI 2011                          - Seminar Riset Tenologi Informasi
                                                                                                                                 26
Summary
   User attention is a precious resource in mobile
    environment

   Mobile application should reduce user interaction

   Mobile application should place greater dependence
    on context

   Need balance of user control due to imperfect context
    information




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                            27
References
  [1] K. Lyytinen, Y. Yoo, Issues and Challenges in Ubiquitous Computing,
      CACM, Vol.4, No.12, 2002

  [2] A. K. Dey and G. D. Abowd, Towards a better understanding of context
      and context-awareness. In CHI 2000 Workshop on the What, Who,
      Where,vWhen and How of Context-Awareness. The Hague, April 2000.

  [3] M. Satyanarayanan, Mobile computing: the next decade, in MCS '10
      Proceedings of the 1st ACM Workshop on Mobile Cloud Computing &
      Services: Social Networks and Beyond, 2010

  [4] Christos B. Anagnostopoulos , Athanasios Tsounis , Stathes
      Hadjiefthymiades, Context Awareness in Mobile Computing
      Environments, Wireless Personal Communications: An International
      Journal, v.42 n.3, p.445-464, August 2007



SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                             28
TERIMA KASIH




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  29

More Related Content

What's hot

What's hot (20)

IoT for Healthcare
IoT for HealthcareIoT for Healthcare
IoT for Healthcare
 
COMP 4010 - Lecture 1: Introduction to Virtual Reality
COMP 4010 - Lecture 1: Introduction to Virtual RealityCOMP 4010 - Lecture 1: Introduction to Virtual Reality
COMP 4010 - Lecture 1: Introduction to Virtual Reality
 
Presence cloud
Presence cloudPresence cloud
Presence cloud
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 
Natural Interfaces for Augmented Reality
Natural Interfaces for Augmented RealityNatural Interfaces for Augmented Reality
Natural Interfaces for Augmented Reality
 
women safety
women safetywomen safety
women safety
 
IoT Cloud Overview
IoT Cloud OverviewIoT Cloud Overview
IoT Cloud Overview
 
Wearable computers - Types, Applications & Future?
Wearable computers - Types, Applications & Future?Wearable computers - Types, Applications & Future?
Wearable computers - Types, Applications & Future?
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Data Analytics for IoT
Data Analytics for IoT Data Analytics for IoT
Data Analytics for IoT
 
EyeRing PowerPoint Presentation
EyeRing PowerPoint PresentationEyeRing PowerPoint Presentation
EyeRing PowerPoint Presentation
 
Rover Technology ppt
Rover Technology pptRover Technology ppt
Rover Technology ppt
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
 
Rover technology.ppt
Rover technology.pptRover technology.ppt
Rover technology.ppt
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
VIVA QUESTIONS FOR DEVOPS.pdf
VIVA QUESTIONS FOR DEVOPS.pdfVIVA QUESTIONS FOR DEVOPS.pdf
VIVA QUESTIONS FOR DEVOPS.pdf
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
SIXTH SENSE TECHNOLOGY REPORT
SIXTH SENSE TECHNOLOGY REPORTSIXTH SENSE TECHNOLOGY REPORT
SIXTH SENSE TECHNOLOGY REPORT
 

Viewers also liked

Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware ComputingMOHIT DADU
 
Creating Context-Aware Applications
Creating Context-Aware ApplicationsCreating Context-Aware Applications
Creating Context-Aware ApplicationsSimon Guest
 
5 context aware services
5 context aware services5 context aware services
5 context aware servicesguest3cf4991
 
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...Joshwa Philip
 
A survey about context-aware middleware
A survey about context-aware middlewareA survey about context-aware middleware
A survey about context-aware middlewareLeonardo Bruni
 
Designing in Context
Designing in ContextDesigning in Context
Designing in ContextThomas Grill
 
Context-aware Recommendation: A Quick View
Context-aware Recommendation: A Quick ViewContext-aware Recommendation: A Quick View
Context-aware Recommendation: A Quick ViewYONG ZHENG
 
Context Aware Computing for Personalised Healthcare
Context Aware Computing for Personalised HealthcareContext Aware Computing for Personalised Healthcare
Context Aware Computing for Personalised HealthcareSaurav Gupta
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computingencircle.io
 
Thesis presentation final
Thesis presentation finalThesis presentation final
Thesis presentation finalRobin De Croon
 
Context awareness and Resilience Engineering
Context awareness and Resilience EngineeringContext awareness and Resilience Engineering
Context awareness and Resilience EngineeringHenry Muccini
 
[2C3]Developing context-aware applications
[2C3]Developing context-aware applications[2C3]Developing context-aware applications
[2C3]Developing context-aware applicationsNAVER D2
 
[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative Filtering[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative FilteringYONG ZHENG
 
Activity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone AccelerometersActivity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone AccelerometersIshara Amarasekera
 
Adaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homesAdaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homesambitlick
 
A short & brief introduction on context and context aware computing
A short & brief introduction on context and context aware computingA short & brief introduction on context and context aware computing
A short & brief introduction on context and context aware computingZohreh Dehghani Champiri
 

Viewers also liked (20)

Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computing
 
Creating Context-Aware Applications
Creating Context-Aware ApplicationsCreating Context-Aware Applications
Creating Context-Aware Applications
 
5 context aware services
5 context aware services5 context aware services
5 context aware services
 
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...
 
A survey about context-aware middleware
A survey about context-aware middlewareA survey about context-aware middleware
A survey about context-aware middleware
 
Designing in Context
Designing in ContextDesigning in Context
Designing in Context
 
Wifi Vs 3G-4G
Wifi Vs 3G-4GWifi Vs 3G-4G
Wifi Vs 3G-4G
 
my seminar in aits on mobile computing
my seminar in aits on mobile computingmy seminar in aits on mobile computing
my seminar in aits on mobile computing
 
Context-aware Recommendation: A Quick View
Context-aware Recommendation: A Quick ViewContext-aware Recommendation: A Quick View
Context-aware Recommendation: A Quick View
 
Context Aware Computing for Personalised Healthcare
Context Aware Computing for Personalised HealthcareContext Aware Computing for Personalised Healthcare
Context Aware Computing for Personalised Healthcare
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computing
 
Thesis presentation final
Thesis presentation finalThesis presentation final
Thesis presentation final
 
Context awareness and Resilience Engineering
Context awareness and Resilience EngineeringContext awareness and Resilience Engineering
Context awareness and Resilience Engineering
 
[2C3]Developing context-aware applications
[2C3]Developing context-aware applications[2C3]Developing context-aware applications
[2C3]Developing context-aware applications
 
[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative Filtering[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative Filtering
 
Activity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone AccelerometersActivity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone Accelerometers
 
Adaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homesAdaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homes
 
Context as a Service
Context as a ServiceContext as a Service
Context as a Service
 
Thesis Presentation
Thesis PresentationThesis Presentation
Thesis Presentation
 
A short & brief introduction on context and context aware computing
A short & brief introduction on context and context aware computingA short & brief introduction on context and context aware computing
A short & brief introduction on context and context aware computing
 

Similar to Context Awareness in Mobile Computing

Building Task-Aware Mobile Applications
Building Task-Aware Mobile ApplicationsBuilding Task-Aware Mobile Applications
Building Task-Aware Mobile ApplicationsDave Kellogg
 
MuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 NovMuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 NovMartin Wolpers
 
A Resource Oriented Framework for Context-Aware Enterprise Applications
A Resource Oriented Framework for Context-Aware Enterprise ApplicationsA Resource Oriented Framework for Context-Aware Enterprise Applications
A Resource Oriented Framework for Context-Aware Enterprise Applicationsruyalarcon
 
Resource Identification Using Mobile Queries
Resource Identification Using Mobile QueriesResource Identification Using Mobile Queries
Resource Identification Using Mobile QueriesIDES Editor
 
A Context Aware Mobile Social Web
A Context Aware Mobile Social WebA Context Aware Mobile Social Web
A Context Aware Mobile Social Webwasvel
 
Towards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of ThingsTowards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of ThingsIJCSIS Research Publications
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloudreshmaroberts
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloudreshmaroberts
 
Caaa07 Presentation February Final
Caaa07 Presentation February FinalCaaa07 Presentation February Final
Caaa07 Presentation February Finalpbihler
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...DataCards
 
3 g be technologized by Dev yusmananda
3 g   be technologized by Dev yusmananda3 g   be technologized by Dev yusmananda
3 g be technologized by Dev yusmanandadev yusmananda
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingDaniel Kornev
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112Sharon Rozov
 
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...Sofia Eu
 
Mobile Internet - trends & possibilities
Mobile Internet - trends & possibilitiesMobile Internet - trends & possibilities
Mobile Internet - trends & possibilitiesFloor van Riet
 
20110918 Mobile-Wireless
20110918 Mobile-Wireless20110918 Mobile-Wireless
20110918 Mobile-Wirelesspetch243
 
Annotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting ApplicationsAnnotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting ApplicationsDavid Crowley
 
Web-service based Mobile Geospatial Application Development using Python
Web-service based Mobile Geospatial Application Development using PythonWeb-service based Mobile Geospatial Application Development using Python
Web-service based Mobile Geospatial Application Development using PythonPython Ireland
 
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD WorkshopZornitza Yovcheva
 

Similar to Context Awareness in Mobile Computing (20)

Building Task-Aware Mobile Applications
Building Task-Aware Mobile ApplicationsBuilding Task-Aware Mobile Applications
Building Task-Aware Mobile Applications
 
MuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 NovMuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 Nov
 
A Resource Oriented Framework for Context-Aware Enterprise Applications
A Resource Oriented Framework for Context-Aware Enterprise ApplicationsA Resource Oriented Framework for Context-Aware Enterprise Applications
A Resource Oriented Framework for Context-Aware Enterprise Applications
 
Resource Identification Using Mobile Queries
Resource Identification Using Mobile QueriesResource Identification Using Mobile Queries
Resource Identification Using Mobile Queries
 
Pre assessment
Pre assessment Pre assessment
Pre assessment
 
A Context Aware Mobile Social Web
A Context Aware Mobile Social WebA Context Aware Mobile Social Web
A Context Aware Mobile Social Web
 
Towards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of ThingsTowards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of Things
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloud
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloud
 
Caaa07 Presentation February Final
Caaa07 Presentation February FinalCaaa07 Presentation February Final
Caaa07 Presentation February Final
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...
 
3 g be technologized by Dev yusmananda
3 g   be technologized by Dev yusmananda3 g   be technologized by Dev yusmananda
3 g be technologized by Dev yusmananda
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
 
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
 
Mobile Internet - trends & possibilities
Mobile Internet - trends & possibilitiesMobile Internet - trends & possibilities
Mobile Internet - trends & possibilities
 
20110918 Mobile-Wireless
20110918 Mobile-Wireless20110918 Mobile-Wireless
20110918 Mobile-Wireless
 
Annotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting ApplicationsAnnotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting Applications
 
Web-service based Mobile Geospatial Application Development using Python
Web-service based Mobile Geospatial Application Development using PythonWeb-service based Mobile Geospatial Application Development using Python
Web-service based Mobile Geospatial Application Development using Python
 
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
 

Recently uploaded

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Context Awareness in Mobile Computing

  • 1. Context Awareness in Mobile Computing The Revolutionary Impact of Pervasive Mobile Computing Bob Hardian hardian@cs.ui.ac.id Fakultas Ilmu Komputer, Universitas Indonesia SRITI 2011 Seminar Riset Tenologi Informasi 1
  • 2. Pervasive – Ubiquitous – Mobile Computing Level of embeddedness High Pervasive Ubiquitous Computing Computing Low High Level of mobility Traditional Business Mobile Computing Computing Low [1] SRITI 2011 - Seminar Riset Tenologi Informasi 2
  • 3. Mobile Computing: the Next Decade  Scenario 1: Lost Child SRITI 2011 - Seminar Riset Tenologi Informasi 3
  • 4. Mobile Computing: the Next Decade  Scenario 2: Disaster Relief SRITI 2011 - Seminar Riset Tenologi Informasi 4
  • 5. Mobile Computing: the Next Decade  Scenario 3: Cognitive Assistance SRITI 2011 - Seminar Riset Tenologi Informasi 5
  • 6. Mobile Computing: the Next Decade  Scenario 4: Medical Consultation SRITI 2011 - Seminar Riset Tenologi Informasi 6
  • 7. Reflecting on these Scenarios [3]  Embody a number of themes  Rich sensors  Crowd sourcing  Near-real-time data consistency  Opportunism  Transient use of infrastructure  User interaction SRITI 2011 - Seminar Riset Tenologi Informasi 7
  • 8. Reducing Distraction  User attention is a precious resource The most successful mobile computing systems of the next decade will be those that are able to reduce or eliminate user interactions SRITI 2011 - Seminar Riset Tenologi Informasi 8
  • 9. User Interaction with Mobile Device  Mobile application autonomy can reduce user interaction.  Mobile application should place greater dependence on contextual information SRITI 2011 - Seminar Riset Tenologi Informasi 9
  • 10. Context Definitions  Context defined variously as:  An application/user’s environment or situation  A combination of computing, user and physical features  Definition from Dey & Abowd [2]: “Context is any information that can be used to characterise the situation of an entity. An entity is a person, place or object that is considered relevant to the interaction between a user and an application, including the user and the application themselves.” SRITI 2011 - Seminar Riset Tenologi Informasi 10
  • 11. Context Awareness  Context of computation may change  Context of computation may be (partially) captured by context information  Context information can be used to  provide seamless computing  provide relevant services to users Needed: Information about requirements and current status of computations and their environments SRITI 2011 - Seminar Riset Tenologi Informasi 11
  • 12. Context Information - Example  user location, devices, applications  user preferences and QoS requirements  application QoS requirements and status  device and network capabilities and their current status  relationships between context information SRITI 2011 - Seminar Riset Tenologi Informasi 12
  • 13. Context Awareness & Mobile Apps  Context-aware applications tend to be enhanced mobile applications for the following reasons:  User context changes frequently subject to the user’s mobility behavior  The need for context-aware behavior is greater in a mobile environment (user location, network resources, and device capabilities) SRITI 2011 - Seminar Riset Tenologi Informasi 13
  • 14. Context-Aware Logic Space [4] SRITI 2011 - Seminar Riset Tenologi Informasi 14
  • 15. Proximity selection  Proximity selection is primarily based on the user location context  Such context can be:  resources and devices in the vicinity of the user  places of interests closest to the user current position  computational objects with which the mobile user is currently interacting SRITI 2011 - Seminar Riset Tenologi Informasi 15
  • 16. Context Modeling  Modeling context is a technique focuses on how to find and relate contextual information that better captures the observation of certain worlds of interest SRITI 2011 - Seminar Riset Tenologi Informasi 16
  • 17. Context Modeling - Example has device Person Device Conceptual model (CML) (name) (id) located at Location (name) Maps to HasDevice(Person, Device) Logical model (relational model) LocatedAt(Person, Location) SRITI 2011 - Seminar Riset Tenologi Informasi 17
  • 18. Disruption Level has disruption level (name) has allow status Allow Status (nr) Profile (code) has divert status Divert Status (name) has profile has location type Location Type (Name) has divert type has nearest base station Device Base Station (id) (nr) has network strength Network Strength Number Type (nr) (name) has device has phone number has number type Person Phone Number (name) (nr) SRITI 2011 - Seminar Riset Tenologi Informasi 18
  • 19. Context-Aware Application A Context-aware application should have a set of characteristics related to context modeling, handling, adaptation:  Context acquisition  Context adaptation  Context aggregation  Context reasoning  Context consistency  Context quality indicators  Context discovery  Context integration  Context query SRITI 2011 - Seminar Riset Tenologi Informasi 19
  • 20. Typical Architecture Context-Aware Applications Programming Toolkit Context Manager Preference Middleware Manager Context Model Context Gathering & Processing Layer Sensor Sensor Sensor SRITI 2011 - Seminar Riset Tenologi Informasi 20
  • 21. User Control of Context-Aware Mobile Apps  Context-aware mobile application may not always behave in the way users expected, due to  Imperfect context information  Incorrect user preferences  Incorrect adaptation rules  Users may feel loss of control over their application.  The system must provide mechanisms to strike a suitable balance of control SRITI 2011 - Seminar Riset Tenologi Informasi 21
  • 22. Balance of User Control  A continuum of user control versus application autonomy A B C Application autonomy User control SRITI 2011 - Seminar Riset Tenologi Informasi 22
  • 23. Providing Suitable Balance of Control  Make users aware of reasons for application adaptation  User may be able to correct undesirable actions  Users may have varying levels of expertise SRITI 2011 - Seminar Riset Tenologi Informasi 23
  • 24. Exposing the System’s view  Exposing system’s view of the context and its corresponding actions provides a sufficient understanding to correct inappropriate action (increases user control)  An appropriate modelling of context and preference is needed for revealing the information to the users Context-aware System Context Information Interactions Adaptation Users Logic User Preferences SRITI 2011 - Seminar Riset Tenologi Informasi 24
  • 25. Example Approach Exposed Context and application preference state change Information Filter information & Explanation Generator Programming Toolkit Information Context & request Preference (scrutinize) USER Context Manager Traces Database Database Semantic Manager User Context Graph Preference Descriptions User Model User Preference Database User feedback SRITI 2011 - Seminar Riset Tenologi Informasi 25
  • 26. User Outside World context User interaction changes Context-Aware Application Context Context Web Windows Interface Client preferences context context and profile changes changes information Context and Preference Proxy inquiry revealed context information (scrutinizing) information and preference context and evaluation scores preference changes Context and Semantic Manager Preference Manager SRITI 2011 - Seminar Riset Tenologi Informasi 26
  • 27. Summary  User attention is a precious resource in mobile environment  Mobile application should reduce user interaction  Mobile application should place greater dependence on context  Need balance of user control due to imperfect context information SRITI 2011 - Seminar Riset Tenologi Informasi 27
  • 28. References [1] K. Lyytinen, Y. Yoo, Issues and Challenges in Ubiquitous Computing, CACM, Vol.4, No.12, 2002 [2] A. K. Dey and G. D. Abowd, Towards a better understanding of context and context-awareness. In CHI 2000 Workshop on the What, Who, Where,vWhen and How of Context-Awareness. The Hague, April 2000. [3] M. Satyanarayanan, Mobile computing: the next decade, in MCS '10 Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, 2010 [4] Christos B. Anagnostopoulos , Athanasios Tsounis , Stathes Hadjiefthymiades, Context Awareness in Mobile Computing Environments, Wireless Personal Communications: An International Journal, v.42 n.3, p.445-464, August 2007 SRITI 2011 - Seminar Riset Tenologi Informasi 28
  • 29. TERIMA KASIH SRITI 2011 - Seminar Riset Tenologi Informasi 29

Editor's Notes

  1. notes
  2. 27/06/12