SlideShare uma empresa Scribd logo
1 de 28
Baixar para ler offline
6th and final plenary
AWARENESS workshop
Results and future on context-
aware mobile (health)
applications
20 March 2008
Maarten Wegdam
Telematica Instituut
AWARENESS workshop - 20 March 2008 2
AWARENESS – impressions movie
AWARENESS workshop - 20 March 2008 3
This talk
• AWARENESS very high level
• Highlights
• Lessons learned on context
AWARENESS workshop - 20 March 2008 4
Division of budget over partners
UT-CTIT
TI-WMC
Ericsson
Yucat
RRD
TMS-I
TICO
ALU
AWARENESS in one slide
• To research and design infrastructure support for context-
aware mobile applications, and validate this in the m-
health domain
• Collaborative research project (BSIK/Freeband)
• Alcatel-Lucent – Bell Labs
• Telematica Instituut
• University of Twente - CTIT
• Roessingh R&D
• Twente Institute for Wireless & Mobile Communications
• Ericsson
• Yucat
• TMS-I
• 2004-2008
• ~€11M budget, ~35FTE/y, ~116 Person year
AWARENESS workshop - 20 March 2008 5
Context-aware mobile applications
• Context awareness = adapt to situation of user
• Location, availability etc
• C-Meeting prototype
• See who is going to be late or absent for a meeting
• Integrated in Outlook
• Based on GSM cell-id
 Already present?
 Travelling to meeting location?
 Estimated time of arrival?
• Practice what you preach: live demo …
more on C-Meeting
•posters (outside auditorium)
•in Erik Meeuwissen’s talk
AWARENESS workshop - 20 March 2008 6
Context-aware mobile health
• M-health = health care independent of time and place
• Using UMTS, GPRS, WLAN etc
• Conveys health signals collected by Health Body Area
Network
• Goal: efficiency, effectiveness and quality of life
• AWARENESS adds context to m-health
• patients, voluntary caregivers and professional caregivers
• Selected applications
• Tele-monitoring of epileptic seizures
• Tele-treatment of patients with chronic pain
• Tele-monitoring of uncontrolled movements in spasticity
AWARENESS workshop - 20 March 2008 7
AWARENESS research highlights
• ~100 scientific papers (incl submissions …)
• 10 PhDs: 2 PhDs finished, 8 PhDs ongoing
• Workshop "Innovative ICT applications
for healthcare" at ICMCC 2005.
• EuroSSC 2006 conference
• CaT07 & CaT08 workshops
• Symposium: E-health - opportunities and barriers for
successful implementations (Dec 2007)
• MobileHCI 2008 together
with other Freeband projects
AWARENESS workshop - 20 March 2008 8
AWARENESS valorization highlights
• MobiHealth BV (UT)
• Roessingh Telezorg Centrum
• 3 patents
• WMC – Flame: meshing between network and MAC
layers
• ALU – route prediction based on cell ids
• ALU – quality of context calculus
• WWRF & standardization (OMA, IETF)
AWARENESS workshop - 20 March 2008 9
Other AWARENESS highlights
• “outstanding project” [Freeband external review June 2007]
• An integrated project !
• Two piloted integrated health demonstrators
 Epilepsy (including SmartSigns)
 Chronic pain
• Integrated office demonstrators
• Integrated context infrastructures
• Demo’s at: CeBIT 2005 and 2006, IST 2004, ICT Kenniscongres 2006,
EuroSSC 2006, CVA congress, ICMCC 2005 event, ICT Delta 2007,
Freeband zorg event 2006, Sentinels event 2005, EU CREST 2004, for
health insurance companies and members of parliament
• Three extensions
• Tele-treatment (2005)
• Business modeling tele-treatment (2007)
• 2008 extension
• Eight (or more?) articles in prof magazines
AWARENESS workshop - 20 March 2008 10
AWARENESS: an infrastructure based approach
• cost reduction
• handling complexity
• improved efficiency
• increased trust
AWARENESS context-aware infrastructure
network and system resources
m-health platformcontext-aware
mobilehealth
other
application
areas
m-health applicationsm-health applications
AWARENESS workshop - 20 March 2008 11
AWARENESS architecture
Context-aware
applications
sensors
Context
management
Contextinfrastructure
Other infrastructure
functions
Context
reasoning
M-health
application
components
Other
application
componentssensors
Privacy control
Local application support
enforcement
Access control Access control
[D0.3v4 Overall architecture of the AWARENESS infrastructure, Dec 2007]
wp1
wp2
wp3
wp4
AWARENESS workshop - 20 March 2008 12
Context Management
• Core of the infrastructure layer, handle dynamicity
• Discovering and exchanging context information
• Request-response, publish-subscribe and event-
condition-action
Lesson 1: Context management systems are
environment-specific. Since context-aware
applications need context from different environments,
they have to interoperate with different context
management systems.
more in Cristian
Hesselman’s talk
[Maarten Wegdam, Tom Broens, Bob Hulsebosch, Cristian Hesselman, Marten van Sinderen, Thijs Tönis
D0.1v4 - Lessons learned on context awareness in mobile applications
submitted to Elsevier’s Pervasive and Mobile Computing]
AWARENESS workshop - 20 March 2008 13
Context Modeling & Quality of Context
• Model raw context and high-level context
• Quality of Context describes quality attributes
• Precision, freshness, probability etc
Lesson 7: Explicitly modeling Quality of Context is
essential for application adaptation, privacy and
infrastructure efficiency.
Lesson 8: Higher Quality of Context allows more and
better application adaptivity.
AWARENESS workshop - 20 March 2008 14
Reasoning
• Putting intelligence in the infrastructure
• Combine context information to improve quality
• To derive ‘higher level’ context information
Lesson 6: Learning context patterns enables the
reasoning and prediction of context.
Lesson 5: Higher-level context reasoning requires,
besides statistical methods for pre-processing, fusion
and matching, rule-based methods to derive required
context.
more in Erik
Meeuwissen’s talk
AWARENESS workshop - 20 March 2008 15
Privacy
• Privacy & consent needed for user acceptance
• and legal reasons
• Context information can be anonymised or
obfuscated to reduce privacy sensitivity
Lesson 9: There is an inherent trade-off between
using context and keeping privacy, and users should
be empowered to control this trade-off themselves.
Lesson 10: The privacy preferences that control the
sharing of context information are context-aware
themselves.
AWARENESS workshop - 20 March 2008 16
Questions so far?
AWARENESS workshop - 20 March 2008 17
Agenda
• 10:35 – Demo session 1
• 11:20 – Coffee
• 11:40 – It’s better to seek forgiveness than to ask for permission
Hans Appel (SUN NL CTO / Hanzehogeschool)
• 12:25 – Lunch
• 13:25 – MobiHealth BV: putting care in motion
Peter Lems (MobiHealth BV)
• 13:45 – Demo session 2
• 14:30 – Coffee
• 14:50 – Context reasoning based on GSM cells
Erik Meeuwissen (Alcatel-Lucent / Bell Labs)
• 15:10 – Disclosure of Context Information across Domains
Cristian Hesselman (Telematica Instituut)
• 15:30 – Panel: AWARENESS highlights and opportunities for follow-ups
Advisory Board members, chair: Patrick Strating
• 16:10 – Informal gathering
AWARENESS workshop - 20 March 2008 18
office
Which demonstrations
Tele-monitoring of epileptic seizures
Thijs Tönis (Roessingh R&D) a.o
Tele-treatment of chronic pain
Marit van Weering (Roessingh R&D) a.o.
Colleague context viewer
Niels Snoeck (Telematica Instituut) a.o.
Context notes & communications
Frank Thiele (Yucat)
Hugo Zwaal (Ericsson) a.o.
health
AWARENESS workshop - 20 March 2008 19
Demonstrations – logistics – 2x2x20’
• EP - Epilepsy – A3.14
• CP - Chronic Pain – A0.05a
• CCV - Colleague Context Viewer – coffeecorner A2
• CNC - Context Notes & Communications – A2.05
group who morning afternoon
1st 2nd 1st 2nd
1 Henk EP CP CCV CNC
2 Bob CP EP CNC CCV
3 Cristian CCV CNC EP CP
4 Maarten CNC CCV CP EP
health
office
health
healthoffice
office
AWARENESS workshop - 20 March 2008 20
Agenda afternoon
• 13:25 – MobiHealth BV: putting care in motion
Peter Lems (MobiHealth BV)
• 13:45 – Demo session 2
• 14:30 – Coffee
• 14:50 – Context reasoning based on GSM cells
Erik Meeuwissen (Alcatel-Lucent / Bell Labs)
• 15:10 – Disclosure of Context Information across
Domains
Cristian Hesselman (Telematica Instituut)
• 15:30 – Panel: AWARENESS highlights and
opportunities for follow-ups
Advisory Board members, chair: Patrick Strating
• 16:10 – Informal gathering
AWARENESS workshop - 20 March 2008 21
Demonstrations – logistics afternoon
• EP - Epilepsy – A3.14
• CP - Chronic Pain – A0.05a
• CCV - Colleague Context Viewer – coffeecorner A2
• CNC - Context Notes & Communications – A2.05
group who 1st 2nd
1 Henk CCV CNC
2 Bob CNC CCV
3 Cristian EP CP
4 Maarten CP EP
health
office
office
health
AWARENESS workshop - 20 March 2008 22
backup
AWARENESS workshop - 20 March 2008 23
Context-aware security
• Context is mostly seen as security threat, but:
Lesson 12: Context awareness is not only a challenge
for security, but is also useful for security to make it
more flexible, stronger and user friendly
more Colleague
Context Viewer demo
AWARENESS workshop - 20 March 2008 24
AWARENESS key-words
infrastructure
mobile
health
context
AWARENESS workshop - 20 March 2008 25
AWARENESS vision on Context Awareness
• A human user is always and everywhere surrounded by a
networking environment that is able to determine automatically:
• the identity of the user, and
• the (upcoming) context information that is (or might
become) relevant to service provisioning
• so that applications adapt
themselves to the context of
the user
• and users have, anywhere,
anytime access to mobile
services
• in a secure and privacy-
sensitive manner.
Platform
User Context
Access Networks
Applications
Active Session
Devices
AWARENESS workshop - 20 March 2008 26
Context-aware mobile health
• M-health = health care independent of time and place
• Using UMTS, GPRS, WLAN etc
• Conveys health signals collected by Health Body Area
Network
• Goal: improve quality of life and reducing costs
• AWARENESS adds context to m-health
• the patient – where is the patient, what is he doing etc
• the voluntary caregivers
• the professional caregivers
• Selected applications
• Tele-monitoring of epileptic seizures
• Tele-monitoring of uncontrolled movements in spasticity
• Tele-treatment of patients with chronic pain
AWARENESS workshop - 20 March 2008 27
A perspective on …. context
• Context is a buzz word
• Some things are not context … Context  data !!!!
• context  data
• E.g.:
• my username/password are not context
• what I type when using Powerpoint is not context
• the amount of money I transfer using my Online Banking
• What are characteristics of context then ?
• Enables user centric adaptations
• Inherently vague (due to limits in sensors)
• Often needs to be reasoned
• Extremely dynamic
• Is privacy sensitive
WP1WP1
WP2
WP3
AWARENESS workshop - 20 March 2008 28
More Information
• AWARENESS website
http://awareness.freeband.nl
• Project Manager:
Maarten Wegdam
Lucent Technologies
Bell Labs Europe
wegdam@lucent.com
+31 35 6875720

Mais conteúdo relacionado

Destaque

cidSafe project, 23 September 2010, for EEMA event
cidSafe project, 23 September 2010, for EEMA eventcidSafe project, 23 September 2010, for EEMA event
cidSafe project, 23 September 2010, for EEMA eventwegdam
 
User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)wegdam
 
H1 N1 Virus with podcast
H1 N1 Virus with podcastH1 N1 Virus with podcast
H1 N1 Virus with podcastEmanstitch
 
Husband For A Day Inc Slide Show
Husband For A Day Inc Slide ShowHusband For A Day Inc Slide Show
Husband For A Day Inc Slide Showdale_leighton
 
User controlled privacy voor de SURFfederatie
User controlled privacy voor de SURFfederatieUser controlled privacy voor de SURFfederatie
User controlled privacy voor de SURFfederatiewegdam
 

Destaque (7)

Merry Christmas
Merry ChristmasMerry Christmas
Merry Christmas
 
cidSafe project, 23 September 2010, for EEMA event
cidSafe project, 23 September 2010, for EEMA eventcidSafe project, 23 September 2010, for EEMA event
cidSafe project, 23 September 2010, for EEMA event
 
User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)
 
H1 N1 Virus with podcast
H1 N1 Virus with podcastH1 N1 Virus with podcast
H1 N1 Virus with podcast
 
Merry Christmas
Merry ChristmasMerry Christmas
Merry Christmas
 
Husband For A Day Inc Slide Show
Husband For A Day Inc Slide ShowHusband For A Day Inc Slide Show
Husband For A Day Inc Slide Show
 
User controlled privacy voor de SURFfederatie
User controlled privacy voor de SURFfederatieUser controlled privacy voor de SURFfederatie
User controlled privacy voor de SURFfederatie
 

Semelhante a AWARENESS overview @ closing working - context-aware mobile health (March 2008)

CTIT and Innovation, Iddo Bante
CTIT and Innovation, Iddo BanteCTIT and Innovation, Iddo Bante
CTIT and Innovation, Iddo BanteIddo Bante
 
s2-01_pp7 (1).ppt
s2-01_pp7 (1).ppts2-01_pp7 (1).ppt
s2-01_pp7 (1).pptDunakanshon
 
EMuRgency: New approaches for resuscitation support and training. Overview ab...
EMuRgency: New approaches for resuscitation support and training. Overview ab...EMuRgency: New approaches for resuscitation support and training. Overview ab...
EMuRgency: New approaches for resuscitation support and training. Overview ab...Marco Kalz
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
 
MYREN and Telemedicine
MYREN and TelemedicineMYREN and Telemedicine
MYREN and TelemedicineSalem Omar
 
Wouter Joossen - Security
Wouter Joossen - SecurityWouter Joossen - Security
Wouter Joossen - Securityimec.archive
 
COMNET as a Capacity-Building Partner for Two African Institutions
COMNET as a Capacity-Building Partner for Two African InstitutionsCOMNET as a Capacity-Building Partner for Two African Institutions
COMNET as a Capacity-Building Partner for Two African InstitutionsProjectENhANCE
 
COMPUTERS IN NURSING -ANP.pptx
COMPUTERS IN NURSING -ANP.pptxCOMPUTERS IN NURSING -ANP.pptx
COMPUTERS IN NURSING -ANP.pptxManjunathaHR13
 
Provisioning Quality of Service of Wireless Telemedicine for E-health Services
Provisioning Quality of Service of Wireless  Telemedicine for E-health Services Provisioning Quality of Service of Wireless  Telemedicine for E-health Services
Provisioning Quality of Service of Wireless Telemedicine for E-health Services Mustafa Algaet
 
Deep-Learning and HPC to Boost Biomedical applications for health
Deep-Learning and HPC to Boost Biomedical applications for healthDeep-Learning and HPC to Boost Biomedical applications for health
Deep-Learning and HPC to Boost Biomedical applications for healthBig Data Value Association
 
Research Group 'Multimedia Communication' Presentation (March 2015)
Research Group 'Multimedia Communication' Presentation (March 2015)Research Group 'Multimedia Communication' Presentation (March 2015)
Research Group 'Multimedia Communication' Presentation (March 2015)hellwagner
 
GTU GeekDay Data Science and Applications
GTU GeekDay Data Science and ApplicationsGTU GeekDay Data Science and Applications
GTU GeekDay Data Science and ApplicationsKürşat İNCE
 
Bde sc3 2nd_workshop_2016_10_04_p00_welcome_agenda
Bde sc3 2nd_workshop_2016_10_04_p00_welcome_agendaBde sc3 2nd_workshop_2016_10_04_p00_welcome_agenda
Bde sc3 2nd_workshop_2016_10_04_p00_welcome_agendaBigData_Europe
 
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...CSCJournals
 

Semelhante a AWARENESS overview @ closing working - context-aware mobile health (March 2008) (20)

Cognitive Electronics (COEL) Project
Cognitive Electronics (COEL) ProjectCognitive Electronics (COEL) Project
Cognitive Electronics (COEL) Project
 
Intro: UBI-SERV
Intro: UBI-SERVIntro: UBI-SERV
Intro: UBI-SERV
 
CTIT and Innovation, Iddo Bante
CTIT and Innovation, Iddo BanteCTIT and Innovation, Iddo Bante
CTIT and Innovation, Iddo Bante
 
s2-01_pp7 (1).ppt
s2-01_pp7 (1).ppts2-01_pp7 (1).ppt
s2-01_pp7 (1).ppt
 
EMuRgency: New approaches for resuscitation support and training. Overview ab...
EMuRgency: New approaches for resuscitation support and training. Overview ab...EMuRgency: New approaches for resuscitation support and training. Overview ab...
EMuRgency: New approaches for resuscitation support and training. Overview ab...
 
Korhonen: UBI-SERV
Korhonen: UBI-SERVKorhonen: UBI-SERV
Korhonen: UBI-SERV
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living Environment
 
MYREN and Telemedicine
MYREN and TelemedicineMYREN and Telemedicine
MYREN and Telemedicine
 
Digitalization - the Catalyst for Social Care
Digitalization - the Catalyst for Social CareDigitalization - the Catalyst for Social Care
Digitalization - the Catalyst for Social Care
 
Wouter Joossen - Security
Wouter Joossen - SecurityWouter Joossen - Security
Wouter Joossen - Security
 
nedecinw.ppt
nedecinw.pptnedecinw.ppt
nedecinw.ppt
 
COMNET as a Capacity-Building Partner for Two African Institutions
COMNET as a Capacity-Building Partner for Two African InstitutionsCOMNET as a Capacity-Building Partner for Two African Institutions
COMNET as a Capacity-Building Partner for Two African Institutions
 
COMPUTERS IN NURSING -ANP.pptx
COMPUTERS IN NURSING -ANP.pptxCOMPUTERS IN NURSING -ANP.pptx
COMPUTERS IN NURSING -ANP.pptx
 
Provisioning Quality of Service of Wireless Telemedicine for E-health Services
Provisioning Quality of Service of Wireless  Telemedicine for E-health Services Provisioning Quality of Service of Wireless  Telemedicine for E-health Services
Provisioning Quality of Service of Wireless Telemedicine for E-health Services
 
11. teledentistry
11. teledentistry11. teledentistry
11. teledentistry
 
Deep-Learning and HPC to Boost Biomedical applications for health
Deep-Learning and HPC to Boost Biomedical applications for healthDeep-Learning and HPC to Boost Biomedical applications for health
Deep-Learning and HPC to Boost Biomedical applications for health
 
Research Group 'Multimedia Communication' Presentation (March 2015)
Research Group 'Multimedia Communication' Presentation (March 2015)Research Group 'Multimedia Communication' Presentation (March 2015)
Research Group 'Multimedia Communication' Presentation (March 2015)
 
GTU GeekDay Data Science and Applications
GTU GeekDay Data Science and ApplicationsGTU GeekDay Data Science and Applications
GTU GeekDay Data Science and Applications
 
Bde sc3 2nd_workshop_2016_10_04_p00_welcome_agenda
Bde sc3 2nd_workshop_2016_10_04_p00_welcome_agendaBde sc3 2nd_workshop_2016_10_04_p00_welcome_agenda
Bde sc3 2nd_workshop_2016_10_04_p00_welcome_agenda
 
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...
 

Mais de wegdam

Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...wegdam
 
Digital onboarding: selfie-check with passport, a case study
Digital onboarding: selfie-check with passport, a case studyDigital onboarding: selfie-check with passport, a case study
Digital onboarding: selfie-check with passport, a case studywegdam
 
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...wegdam
 
FIDOs place in the identity ecosystem
FIDOs place in the identity ecosystemFIDOs place in the identity ecosystem
FIDOs place in the identity ecosystemwegdam
 
#SNRD12 Maak student baas over eigen data
#SNRD12 Maak student baas over eigen data#SNRD12 Maak student baas over eigen data
#SNRD12 Maak student baas over eigen datawegdam
 
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobielNovay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobielwegdam
 
Cloud privacy & security - Een verkenning van tools en technieken
Cloud privacy & security - Een verkenning van tools en techniekenCloud privacy & security - Een verkenning van tools en technieken
Cloud privacy & security - Een verkenning van tools en techniekenwegdam
 
XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced ...
XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced ...XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced ...
XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced ...wegdam
 
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...wegdam
 
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...wegdam
 
The user perspective on consent for identity federations (TNC 2011)
The user perspective on consent for identity federations (TNC 2011)The user perspective on consent for identity federations (TNC 2011)
The user perspective on consent for identity federations (TNC 2011)wegdam
 
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...wegdam
 
2de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 292de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 29wegdam
 
cidSafe project overview (in Dutch!!!)
cidSafe project overview (in Dutch!!!)cidSafe project overview (in Dutch!!!)
cidSafe project overview (in Dutch!!!)wegdam
 
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...wegdam
 
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)wegdam
 
Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010wegdam
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009wegdam
 
User & Mobile Centric Identity
User & Mobile Centric IdentityUser & Mobile Centric Identity
User & Mobile Centric Identitywegdam
 
Identity federation & user centric identity
Identity federation & user centric identityIdentity federation & user centric identity
Identity federation & user centric identitywegdam
 

Mais de wegdam (20)

Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
 
Digital onboarding: selfie-check with passport, a case study
Digital onboarding: selfie-check with passport, a case studyDigital onboarding: selfie-check with passport, a case study
Digital onboarding: selfie-check with passport, a case study
 
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
 
FIDOs place in the identity ecosystem
FIDOs place in the identity ecosystemFIDOs place in the identity ecosystem
FIDOs place in the identity ecosystem
 
#SNRD12 Maak student baas over eigen data
#SNRD12 Maak student baas over eigen data#SNRD12 Maak student baas over eigen data
#SNRD12 Maak student baas over eigen data
 
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobielNovay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
 
Cloud privacy & security - Een verkenning van tools en technieken
Cloud privacy & security - Een verkenning van tools en techniekenCloud privacy & security - Een verkenning van tools en technieken
Cloud privacy & security - Een verkenning van tools en technieken
 
XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced ...
XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced ...XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced ...
XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced ...
 
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
 
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
 
The user perspective on consent for identity federations (TNC 2011)
The user perspective on consent for identity federations (TNC 2011)The user perspective on consent for identity federations (TNC 2011)
The user perspective on consent for identity federations (TNC 2011)
 
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
 
2de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 292de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 29
 
cidSafe project overview (in Dutch!!!)
cidSafe project overview (in Dutch!!!)cidSafe project overview (in Dutch!!!)
cidSafe project overview (in Dutch!!!)
 
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
 
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
 
Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
 
User & Mobile Centric Identity
User & Mobile Centric IdentityUser & Mobile Centric Identity
User & Mobile Centric Identity
 
Identity federation & user centric identity
Identity federation & user centric identityIdentity federation & user centric identity
Identity federation & user centric identity
 

Último

Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 

Último (20)

Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 

AWARENESS overview @ closing working - context-aware mobile health (March 2008)

  • 1. 6th and final plenary AWARENESS workshop Results and future on context- aware mobile (health) applications 20 March 2008 Maarten Wegdam Telematica Instituut
  • 2. AWARENESS workshop - 20 March 2008 2 AWARENESS – impressions movie
  • 3. AWARENESS workshop - 20 March 2008 3 This talk • AWARENESS very high level • Highlights • Lessons learned on context
  • 4. AWARENESS workshop - 20 March 2008 4 Division of budget over partners UT-CTIT TI-WMC Ericsson Yucat RRD TMS-I TICO ALU AWARENESS in one slide • To research and design infrastructure support for context- aware mobile applications, and validate this in the m- health domain • Collaborative research project (BSIK/Freeband) • Alcatel-Lucent – Bell Labs • Telematica Instituut • University of Twente - CTIT • Roessingh R&D • Twente Institute for Wireless & Mobile Communications • Ericsson • Yucat • TMS-I • 2004-2008 • ~€11M budget, ~35FTE/y, ~116 Person year
  • 5. AWARENESS workshop - 20 March 2008 5 Context-aware mobile applications • Context awareness = adapt to situation of user • Location, availability etc • C-Meeting prototype • See who is going to be late or absent for a meeting • Integrated in Outlook • Based on GSM cell-id  Already present?  Travelling to meeting location?  Estimated time of arrival? • Practice what you preach: live demo … more on C-Meeting •posters (outside auditorium) •in Erik Meeuwissen’s talk
  • 6. AWARENESS workshop - 20 March 2008 6 Context-aware mobile health • M-health = health care independent of time and place • Using UMTS, GPRS, WLAN etc • Conveys health signals collected by Health Body Area Network • Goal: efficiency, effectiveness and quality of life • AWARENESS adds context to m-health • patients, voluntary caregivers and professional caregivers • Selected applications • Tele-monitoring of epileptic seizures • Tele-treatment of patients with chronic pain • Tele-monitoring of uncontrolled movements in spasticity
  • 7. AWARENESS workshop - 20 March 2008 7 AWARENESS research highlights • ~100 scientific papers (incl submissions …) • 10 PhDs: 2 PhDs finished, 8 PhDs ongoing • Workshop "Innovative ICT applications for healthcare" at ICMCC 2005. • EuroSSC 2006 conference • CaT07 & CaT08 workshops • Symposium: E-health - opportunities and barriers for successful implementations (Dec 2007) • MobileHCI 2008 together with other Freeband projects
  • 8. AWARENESS workshop - 20 March 2008 8 AWARENESS valorization highlights • MobiHealth BV (UT) • Roessingh Telezorg Centrum • 3 patents • WMC – Flame: meshing between network and MAC layers • ALU – route prediction based on cell ids • ALU – quality of context calculus • WWRF & standardization (OMA, IETF)
  • 9. AWARENESS workshop - 20 March 2008 9 Other AWARENESS highlights • “outstanding project” [Freeband external review June 2007] • An integrated project ! • Two piloted integrated health demonstrators  Epilepsy (including SmartSigns)  Chronic pain • Integrated office demonstrators • Integrated context infrastructures • Demo’s at: CeBIT 2005 and 2006, IST 2004, ICT Kenniscongres 2006, EuroSSC 2006, CVA congress, ICMCC 2005 event, ICT Delta 2007, Freeband zorg event 2006, Sentinels event 2005, EU CREST 2004, for health insurance companies and members of parliament • Three extensions • Tele-treatment (2005) • Business modeling tele-treatment (2007) • 2008 extension • Eight (or more?) articles in prof magazines
  • 10. AWARENESS workshop - 20 March 2008 10 AWARENESS: an infrastructure based approach • cost reduction • handling complexity • improved efficiency • increased trust AWARENESS context-aware infrastructure network and system resources m-health platformcontext-aware mobilehealth other application areas m-health applicationsm-health applications
  • 11. AWARENESS workshop - 20 March 2008 11 AWARENESS architecture Context-aware applications sensors Context management Contextinfrastructure Other infrastructure functions Context reasoning M-health application components Other application componentssensors Privacy control Local application support enforcement Access control Access control [D0.3v4 Overall architecture of the AWARENESS infrastructure, Dec 2007] wp1 wp2 wp3 wp4
  • 12. AWARENESS workshop - 20 March 2008 12 Context Management • Core of the infrastructure layer, handle dynamicity • Discovering and exchanging context information • Request-response, publish-subscribe and event- condition-action Lesson 1: Context management systems are environment-specific. Since context-aware applications need context from different environments, they have to interoperate with different context management systems. more in Cristian Hesselman’s talk [Maarten Wegdam, Tom Broens, Bob Hulsebosch, Cristian Hesselman, Marten van Sinderen, Thijs Tönis D0.1v4 - Lessons learned on context awareness in mobile applications submitted to Elsevier’s Pervasive and Mobile Computing]
  • 13. AWARENESS workshop - 20 March 2008 13 Context Modeling & Quality of Context • Model raw context and high-level context • Quality of Context describes quality attributes • Precision, freshness, probability etc Lesson 7: Explicitly modeling Quality of Context is essential for application adaptation, privacy and infrastructure efficiency. Lesson 8: Higher Quality of Context allows more and better application adaptivity.
  • 14. AWARENESS workshop - 20 March 2008 14 Reasoning • Putting intelligence in the infrastructure • Combine context information to improve quality • To derive ‘higher level’ context information Lesson 6: Learning context patterns enables the reasoning and prediction of context. Lesson 5: Higher-level context reasoning requires, besides statistical methods for pre-processing, fusion and matching, rule-based methods to derive required context. more in Erik Meeuwissen’s talk
  • 15. AWARENESS workshop - 20 March 2008 15 Privacy • Privacy & consent needed for user acceptance • and legal reasons • Context information can be anonymised or obfuscated to reduce privacy sensitivity Lesson 9: There is an inherent trade-off between using context and keeping privacy, and users should be empowered to control this trade-off themselves. Lesson 10: The privacy preferences that control the sharing of context information are context-aware themselves.
  • 16. AWARENESS workshop - 20 March 2008 16 Questions so far?
  • 17. AWARENESS workshop - 20 March 2008 17 Agenda • 10:35 – Demo session 1 • 11:20 – Coffee • 11:40 – It’s better to seek forgiveness than to ask for permission Hans Appel (SUN NL CTO / Hanzehogeschool) • 12:25 – Lunch • 13:25 – MobiHealth BV: putting care in motion Peter Lems (MobiHealth BV) • 13:45 – Demo session 2 • 14:30 – Coffee • 14:50 – Context reasoning based on GSM cells Erik Meeuwissen (Alcatel-Lucent / Bell Labs) • 15:10 – Disclosure of Context Information across Domains Cristian Hesselman (Telematica Instituut) • 15:30 – Panel: AWARENESS highlights and opportunities for follow-ups Advisory Board members, chair: Patrick Strating • 16:10 – Informal gathering
  • 18. AWARENESS workshop - 20 March 2008 18 office Which demonstrations Tele-monitoring of epileptic seizures Thijs Tönis (Roessingh R&D) a.o Tele-treatment of chronic pain Marit van Weering (Roessingh R&D) a.o. Colleague context viewer Niels Snoeck (Telematica Instituut) a.o. Context notes & communications Frank Thiele (Yucat) Hugo Zwaal (Ericsson) a.o. health
  • 19. AWARENESS workshop - 20 March 2008 19 Demonstrations – logistics – 2x2x20’ • EP - Epilepsy – A3.14 • CP - Chronic Pain – A0.05a • CCV - Colleague Context Viewer – coffeecorner A2 • CNC - Context Notes & Communications – A2.05 group who morning afternoon 1st 2nd 1st 2nd 1 Henk EP CP CCV CNC 2 Bob CP EP CNC CCV 3 Cristian CCV CNC EP CP 4 Maarten CNC CCV CP EP health office health healthoffice office
  • 20. AWARENESS workshop - 20 March 2008 20 Agenda afternoon • 13:25 – MobiHealth BV: putting care in motion Peter Lems (MobiHealth BV) • 13:45 – Demo session 2 • 14:30 – Coffee • 14:50 – Context reasoning based on GSM cells Erik Meeuwissen (Alcatel-Lucent / Bell Labs) • 15:10 – Disclosure of Context Information across Domains Cristian Hesselman (Telematica Instituut) • 15:30 – Panel: AWARENESS highlights and opportunities for follow-ups Advisory Board members, chair: Patrick Strating • 16:10 – Informal gathering
  • 21. AWARENESS workshop - 20 March 2008 21 Demonstrations – logistics afternoon • EP - Epilepsy – A3.14 • CP - Chronic Pain – A0.05a • CCV - Colleague Context Viewer – coffeecorner A2 • CNC - Context Notes & Communications – A2.05 group who 1st 2nd 1 Henk CCV CNC 2 Bob CNC CCV 3 Cristian EP CP 4 Maarten CP EP health office office health
  • 22. AWARENESS workshop - 20 March 2008 22 backup
  • 23. AWARENESS workshop - 20 March 2008 23 Context-aware security • Context is mostly seen as security threat, but: Lesson 12: Context awareness is not only a challenge for security, but is also useful for security to make it more flexible, stronger and user friendly more Colleague Context Viewer demo
  • 24. AWARENESS workshop - 20 March 2008 24 AWARENESS key-words infrastructure mobile health context
  • 25. AWARENESS workshop - 20 March 2008 25 AWARENESS vision on Context Awareness • A human user is always and everywhere surrounded by a networking environment that is able to determine automatically: • the identity of the user, and • the (upcoming) context information that is (or might become) relevant to service provisioning • so that applications adapt themselves to the context of the user • and users have, anywhere, anytime access to mobile services • in a secure and privacy- sensitive manner. Platform User Context Access Networks Applications Active Session Devices
  • 26. AWARENESS workshop - 20 March 2008 26 Context-aware mobile health • M-health = health care independent of time and place • Using UMTS, GPRS, WLAN etc • Conveys health signals collected by Health Body Area Network • Goal: improve quality of life and reducing costs • AWARENESS adds context to m-health • the patient – where is the patient, what is he doing etc • the voluntary caregivers • the professional caregivers • Selected applications • Tele-monitoring of epileptic seizures • Tele-monitoring of uncontrolled movements in spasticity • Tele-treatment of patients with chronic pain
  • 27. AWARENESS workshop - 20 March 2008 27 A perspective on …. context • Context is a buzz word • Some things are not context … Context  data !!!! • context  data • E.g.: • my username/password are not context • what I type when using Powerpoint is not context • the amount of money I transfer using my Online Banking • What are characteristics of context then ? • Enables user centric adaptations • Inherently vague (due to limits in sensors) • Often needs to be reasoned • Extremely dynamic • Is privacy sensitive WP1WP1 WP2 WP3
  • 28. AWARENESS workshop - 20 March 2008 28 More Information • AWARENESS website http://awareness.freeband.nl • Project Manager: Maarten Wegdam Lucent Technologies Bell Labs Europe wegdam@lucent.com +31 35 6875720