SlideShare a Scribd company logo
1 of 29
Context Awareness in Mobile Computing
The Revolutionary Impact of Pervasive Mobile Computing




Bob Hardian
hardian@cs.ui.ac.id
Fakultas Ilmu Komputer, Universitas Indonesia




SRITI 2011
Seminar Riset Tenologi Informasi
                                                         1
Pervasive – Ubiquitous – Mobile Computing
                              Level of embeddedness
                                           High


                         Pervasive                Ubiquitous
                        Computing                 Computing

        Low                                                           High
                                                     Level of mobility
                        Traditional
                         Business                   Mobile
                        Computing                 Computing


                                           Low
[1]


SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                             2
Mobile Computing: the Next Decade

   Scenario 1: Lost Child




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  3
Mobile Computing: the Next Decade

   Scenario 2: Disaster Relief




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  4
Mobile Computing: the Next Decade

   Scenario 3: Cognitive Assistance




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  5
Mobile Computing: the Next Decade

   Scenario 4: Medical Consultation




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  6
Reflecting on these Scenarios [3]

   Embody a number of themes
      Rich sensors
      Crowd sourcing
      Near-real-time data consistency
      Opportunism
      Transient use of infrastructure
      User interaction




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  7
Reducing Distraction
   User attention is a precious resource

     The most successful mobile computing
     systems of the next decade will be those that
     are able to reduce or eliminate user
     interactions




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                     8
User Interaction with Mobile Device

   Mobile application autonomy can reduce user
    interaction.

   Mobile application should place greater dependence
    on contextual information




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                         9
Context Definitions
   Context defined variously as:
      An application/user’s environment or situation
      A combination of computing, user and physical features

   Definition from Dey & Abowd [2]:
         “Context is any information that can be used to characterise
         the situation of an entity. An entity is a person, place or
         object that is considered relevant to the interaction
         between a user and an application, including the user and
         the application themselves.”




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                        10
Context Awareness
   Context of computation may change

   Context of computation may be (partially) captured by context
    information

   Context information can be used to
      provide seamless computing
      provide relevant services to users




     Needed: Information about requirements and
     current status of computations and their
     environments



SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                    11
Context Information - Example
   user location, devices, applications

   user preferences and QoS requirements

   application QoS requirements and status

   device and network capabilities and their current status

   relationships between context information




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                               12
Context Awareness & Mobile Apps

   Context-aware applications tend to be enhanced
    mobile applications for the following reasons:
      User context changes frequently subject to the user’s
       mobility behavior
      The need for context-aware behavior is greater in a mobile
       environment (user location, network resources, and device
       capabilities)




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                    13
Context-Aware Logic Space [4]




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  14
Proximity selection
   Proximity selection is primarily based on the user location
    context

   Such context can be:
      resources and devices in the vicinity of the user
      places of interests closest to the user current position
      computational objects with which the mobile user is
       currently interacting




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                  15
Context Modeling
   Modeling context is a technique focuses on
    how to find and relate contextual information
    that better captures the observation of certain
    worlds of interest




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                      16
Context Modeling - Example

                                                                    has device
                                                  Person                                 Device
 Conceptual model (CML)                           (name)                                  (id)

                                                                    located at
                                                                                         Location
                                                                                          (name)


                                                      Maps to


                                                           HasDevice(Person, Device)
 Logical model (relational model)
                                                           LocatedAt(Person, Location)




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                                                    17
Disruption Level
                has disruption level           (name)



                                        has allow status              Allow Status
                                                                          (nr)
                 Profile
                 (code)                                    has divert status
                                                                                            Divert Status
                                                                                               (name)

         has profile
                                       has location type
                                                                     Location Type
                                                                        (Name)          has divert type

                                       has nearest base station
                 Device                                               Base Station
                  (id)                                                    (nr)

                                        has network strength
                                                                        Network
                                                                        Strength             Number Type
                                                                          (nr)                 (name)

                       has device


                                        has phone number                             has number type
                 Person                                             Phone Number
                 (name)                                                 (nr)


SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                                                            18
Context-Aware Application
  A Context-aware application should have a set of characteristics related
  to context modeling, handling, adaptation:

   Context acquisition                            Context adaptation

   Context aggregation                            Context reasoning

   Context consistency                            Context quality indicators

   Context discovery                              Context integration

   Context query




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                                 19
Typical Architecture

                           Context-Aware Applications

                                      Programming Toolkit




                                        Context Manager     Preference
              Middleware                                     Manager
                                              Context
                                               Model




                   Context Gathering & Processing Layer

                     Sensor                   Sensor        Sensor



SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                         20
User Control of
 Context-Aware Mobile Apps
   Context-aware mobile application may not always behave in
    the way users expected, due to
      Imperfect context information
      Incorrect user preferences
      Incorrect adaptation rules

   Users may feel loss of control over their application.

   The system must provide mechanisms to strike a suitable
    balance of control




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                21
Balance of User Control
   A continuum of user control versus application autonomy



       A                                          B                          C


                                                      Application autonomy
             User control




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                                 22
Providing Suitable Balance of Control

   Make users aware of reasons for application adaptation

   User may be able to correct undesirable actions

   Users may have varying levels of expertise




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                             23
Exposing the System’s view
   Exposing system’s view of the context and its corresponding
    actions provides a sufficient understanding to correct
    inappropriate action (increases user control)

   An appropriate modelling of context and preference is needed
    for revealing the information to the users


                Context-aware System
                                Context
                              Information         Interactions
         Adaptation                                              Users
           Logic
                                 User
                              Preferences




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                         24
Example Approach
                                                                                          Exposed
                          Context and                                                     application
                          preference                                                      state
                          change            Information Filter                            information
                                                    &
                                          Explanation Generator
      Programming Toolkit
                                                                                         Information
         Context &                                                                       request
         Preference                                                                      (scrutinize)
                                                                                                        USER
 Context  Manager           Traces
 Database                  Database
                                            Semantic Manager
                   User




                                                            Context Graph
                   Preference                Descriptions




                                                                            User Model
                User
             Preference
              Database



                                                                                         User feedback



SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                                                               25
User
                                                                                                   Outside World

                                                                                                             context
                                                                   User interaction                         changes
        Context-Aware Application

                                                                                                               Context
                                               Context                    Web
                                               Windows                  Interface                               Client


                                                                preferences                       context       context
                                                                 and profile                     changes       changes
                                                                information


                                                                                   Context and
                                                                                 Preference Proxy

                                inquiry                     revealed       context information
                             (scrutinizing)               information        and preference                     context and
                                                                            evaluation scores               preference changes


                                                                                          Context and
                                        Semantic Manager
                                                                                      Preference Manager



SRITI 2011                          - Seminar Riset Tenologi Informasi
                                                                                                                                 26
Summary
   User attention is a precious resource in mobile
    environment

   Mobile application should reduce user interaction

   Mobile application should place greater dependence
    on context

   Need balance of user control due to imperfect context
    information




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                            27
References
  [1] K. Lyytinen, Y. Yoo, Issues and Challenges in Ubiquitous Computing,
      CACM, Vol.4, No.12, 2002

  [2] A. K. Dey and G. D. Abowd, Towards a better understanding of context
      and context-awareness. In CHI 2000 Workshop on the What, Who,
      Where,vWhen and How of Context-Awareness. The Hague, April 2000.

  [3] M. Satyanarayanan, Mobile computing: the next decade, in MCS '10
      Proceedings of the 1st ACM Workshop on Mobile Cloud Computing &
      Services: Social Networks and Beyond, 2010

  [4] Christos B. Anagnostopoulos , Athanasios Tsounis , Stathes
      Hadjiefthymiades, Context Awareness in Mobile Computing
      Environments, Wireless Personal Communications: An International
      Journal, v.42 n.3, p.445-464, August 2007



SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                             28
TERIMA KASIH




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  29

More Related Content

What's hot

Middleware Basics
Middleware BasicsMiddleware Basics
Middleware BasicsVarun Arora
 
Contiki IoT simulation
Contiki IoT simulationContiki IoT simulation
Contiki IoT simulationnabati
 
Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI Deskala
 
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Selvaraj Seerangan
 
HCI 3e - Ch 12: Cognitive models
HCI 3e - Ch 12:  Cognitive modelsHCI 3e - Ch 12:  Cognitive models
HCI 3e - Ch 12: Cognitive modelsAlan Dix
 
Airline Reservation System - Software Engineering
Airline Reservation System - Software EngineeringAirline Reservation System - Software Engineering
Airline Reservation System - Software EngineeringDrishti Bhalla
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookiesanita gouda
 
Introduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesIntroduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesJason TC HOU (侯宗成)
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
COMPUTER NETWORKING (1).pdf
COMPUTER NETWORKING (1).pdfCOMPUTER NETWORKING (1).pdf
COMPUTER NETWORKING (1).pdfBeulahJayarani
 
Big Data Analytics for Real Time Systems
Big Data Analytics for Real Time SystemsBig Data Analytics for Real Time Systems
Big Data Analytics for Real Time SystemsKamalika Dutta
 
WML-Tutorial
WML-TutorialWML-Tutorial
WML-TutorialOPENLANE
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigmRipal Ranpara
 

What's hot (20)

Mobile hci
Mobile hciMobile hci
Mobile hci
 
Srs for banking system
Srs for banking systemSrs for banking system
Srs for banking system
 
Middleware Basics
Middleware BasicsMiddleware Basics
Middleware Basics
 
Contiki IoT simulation
Contiki IoT simulationContiki IoT simulation
Contiki IoT simulation
 
Manet
ManetManet
Manet
 
Unit2 hci
Unit2 hciUnit2 hci
Unit2 hci
 
Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI
 
Cloud applications
Cloud applicationsCloud applications
Cloud applications
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
Unit 2,3,4 _ Internet of Things A Hands-On Approach (Arshdeep Bahga, Vijay Ma...
 
HCI 3e - Ch 12: Cognitive models
HCI 3e - Ch 12:  Cognitive modelsHCI 3e - Ch 12:  Cognitive models
HCI 3e - Ch 12: Cognitive models
 
Airline Reservation System - Software Engineering
Airline Reservation System - Software EngineeringAirline Reservation System - Software Engineering
Airline Reservation System - Software Engineering
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookies
 
Introduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network IssuesIntroduction to Cloud Data Center and Network Issues
Introduction to Cloud Data Center and Network Issues
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
COMPUTER NETWORKING (1).pdf
COMPUTER NETWORKING (1).pdfCOMPUTER NETWORKING (1).pdf
COMPUTER NETWORKING (1).pdf
 
Big Data Analytics for Real Time Systems
Big Data Analytics for Real Time SystemsBig Data Analytics for Real Time Systems
Big Data Analytics for Real Time Systems
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
WML-Tutorial
WML-TutorialWML-Tutorial
WML-Tutorial
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
 

Viewers also liked

context aware computing
context aware computingcontext aware computing
context aware computingswati sonawane
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware ComputingMOHIT DADU
 
Creating Context-Aware Applications
Creating Context-Aware ApplicationsCreating Context-Aware Applications
Creating Context-Aware ApplicationsSimon Guest
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computinglogus2k
 
5 context aware services
5 context aware services5 context aware services
5 context aware servicesguest3cf4991
 
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...Joshwa Philip
 
A survey about context-aware middleware
A survey about context-aware middlewareA survey about context-aware middleware
A survey about context-aware middlewareLeonardo Bruni
 
Designing in Context
Designing in ContextDesigning in Context
Designing in ContextThomas Grill
 
Context-aware Recommendation: A Quick View
Context-aware Recommendation: A Quick ViewContext-aware Recommendation: A Quick View
Context-aware Recommendation: A Quick ViewYONG ZHENG
 
Context Aware Computing for Personalised Healthcare
Context Aware Computing for Personalised HealthcareContext Aware Computing for Personalised Healthcare
Context Aware Computing for Personalised HealthcareSaurav Gupta
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computingencircle.io
 
Thesis presentation final
Thesis presentation finalThesis presentation final
Thesis presentation finalRobin De Croon
 
Context awareness and Resilience Engineering
Context awareness and Resilience EngineeringContext awareness and Resilience Engineering
Context awareness and Resilience EngineeringHenry Muccini
 
[2C3]Developing context-aware applications
[2C3]Developing context-aware applications[2C3]Developing context-aware applications
[2C3]Developing context-aware applicationsNAVER D2
 
[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative Filtering[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative FilteringYONG ZHENG
 
Activity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone AccelerometersActivity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone AccelerometersIshara Amarasekera
 
Adaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homesAdaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homesambitlick
 

Viewers also liked (20)

context aware computing
context aware computingcontext aware computing
context aware computing
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computing
 
Creating Context-Aware Applications
Creating Context-Aware ApplicationsCreating Context-Aware Applications
Creating Context-Aware Applications
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
5 context aware services
5 context aware services5 context aware services
5 context aware services
 
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...
 
A survey about context-aware middleware
A survey about context-aware middlewareA survey about context-aware middleware
A survey about context-aware middleware
 
Designing in Context
Designing in ContextDesigning in Context
Designing in Context
 
Wifi Vs 3G-4G
Wifi Vs 3G-4GWifi Vs 3G-4G
Wifi Vs 3G-4G
 
my seminar in aits on mobile computing
my seminar in aits on mobile computingmy seminar in aits on mobile computing
my seminar in aits on mobile computing
 
Context-aware Recommendation: A Quick View
Context-aware Recommendation: A Quick ViewContext-aware Recommendation: A Quick View
Context-aware Recommendation: A Quick View
 
Context Aware Computing for Personalised Healthcare
Context Aware Computing for Personalised HealthcareContext Aware Computing for Personalised Healthcare
Context Aware Computing for Personalised Healthcare
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computing
 
Thesis presentation final
Thesis presentation finalThesis presentation final
Thesis presentation final
 
Context awareness and Resilience Engineering
Context awareness and Resilience EngineeringContext awareness and Resilience Engineering
Context awareness and Resilience Engineering
 
[2C3]Developing context-aware applications
[2C3]Developing context-aware applications[2C3]Developing context-aware applications
[2C3]Developing context-aware applications
 
[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative Filtering[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative Filtering
 
Activity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone AccelerometersActivity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone Accelerometers
 
Adaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homesAdaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homes
 
Context as a Service
Context as a ServiceContext as a Service
Context as a Service
 

Similar to Context Awareness in Mobile Computing

Building Task-Aware Mobile Applications
Building Task-Aware Mobile ApplicationsBuilding Task-Aware Mobile Applications
Building Task-Aware Mobile ApplicationsDave Kellogg
 
MuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 NovMuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 NovMartin Wolpers
 
A Resource Oriented Framework for Context-Aware Enterprise Applications
A Resource Oriented Framework for Context-Aware Enterprise ApplicationsA Resource Oriented Framework for Context-Aware Enterprise Applications
A Resource Oriented Framework for Context-Aware Enterprise Applicationsruyalarcon
 
Resource Identification Using Mobile Queries
Resource Identification Using Mobile QueriesResource Identification Using Mobile Queries
Resource Identification Using Mobile QueriesIDES Editor
 
A Context Aware Mobile Social Web
A Context Aware Mobile Social WebA Context Aware Mobile Social Web
A Context Aware Mobile Social Webwasvel
 
Towards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of ThingsTowards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of ThingsIJCSIS Research Publications
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloudreshmaroberts
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloudreshmaroberts
 
Caaa07 Presentation February Final
Caaa07 Presentation February FinalCaaa07 Presentation February Final
Caaa07 Presentation February Finalpbihler
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...DataCards
 
3 g be technologized by Dev yusmananda
3 g   be technologized by Dev yusmananda3 g   be technologized by Dev yusmananda
3 g be technologized by Dev yusmanandadev yusmananda
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingDaniel Kornev
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112Sharon Rozov
 
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...Sofia Eu
 
Mobile Internet - trends & possibilities
Mobile Internet - trends & possibilitiesMobile Internet - trends & possibilities
Mobile Internet - trends & possibilitiesFloor van Riet
 
20110918 Mobile-Wireless
20110918 Mobile-Wireless20110918 Mobile-Wireless
20110918 Mobile-Wirelesspetch243
 
Annotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting ApplicationsAnnotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting ApplicationsDavid Crowley
 
Web-service based Mobile Geospatial Application Development using Python
Web-service based Mobile Geospatial Application Development using PythonWeb-service based Mobile Geospatial Application Development using Python
Web-service based Mobile Geospatial Application Development using PythonPython Ireland
 
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD WorkshopZornitza Yovcheva
 

Similar to Context Awareness in Mobile Computing (20)

Building Task-Aware Mobile Applications
Building Task-Aware Mobile ApplicationsBuilding Task-Aware Mobile Applications
Building Task-Aware Mobile Applications
 
MuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 NovMuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 Nov
 
A Resource Oriented Framework for Context-Aware Enterprise Applications
A Resource Oriented Framework for Context-Aware Enterprise ApplicationsA Resource Oriented Framework for Context-Aware Enterprise Applications
A Resource Oriented Framework for Context-Aware Enterprise Applications
 
Resource Identification Using Mobile Queries
Resource Identification Using Mobile QueriesResource Identification Using Mobile Queries
Resource Identification Using Mobile Queries
 
Pre assessment
Pre assessment Pre assessment
Pre assessment
 
A Context Aware Mobile Social Web
A Context Aware Mobile Social WebA Context Aware Mobile Social Web
A Context Aware Mobile Social Web
 
Towards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of ThingsTowards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of Things
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloud
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloud
 
Caaa07 Presentation February Final
Caaa07 Presentation February FinalCaaa07 Presentation February Final
Caaa07 Presentation February Final
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...
 
3 g be technologized by Dev yusmananda
3 g   be technologized by Dev yusmananda3 g   be technologized by Dev yusmananda
3 g be technologized by Dev yusmananda
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
 
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
 
Mobile Internet - trends & possibilities
Mobile Internet - trends & possibilitiesMobile Internet - trends & possibilities
Mobile Internet - trends & possibilities
 
20110918 Mobile-Wireless
20110918 Mobile-Wireless20110918 Mobile-Wireless
20110918 Mobile-Wireless
 
Annotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting ApplicationsAnnotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting Applications
 
Web-service based Mobile Geospatial Application Development using Python
Web-service based Mobile Geospatial Application Development using PythonWeb-service based Mobile Geospatial Application Development using Python
Web-service based Mobile Geospatial Application Development using Python
 
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
 

Recently uploaded

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Recently uploaded (20)

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

Context Awareness in Mobile Computing

  • 1. Context Awareness in Mobile Computing The Revolutionary Impact of Pervasive Mobile Computing Bob Hardian hardian@cs.ui.ac.id Fakultas Ilmu Komputer, Universitas Indonesia SRITI 2011 Seminar Riset Tenologi Informasi 1
  • 2. Pervasive – Ubiquitous – Mobile Computing Level of embeddedness High Pervasive Ubiquitous Computing Computing Low High Level of mobility Traditional Business Mobile Computing Computing Low [1] SRITI 2011 - Seminar Riset Tenologi Informasi 2
  • 3. Mobile Computing: the Next Decade  Scenario 1: Lost Child SRITI 2011 - Seminar Riset Tenologi Informasi 3
  • 4. Mobile Computing: the Next Decade  Scenario 2: Disaster Relief SRITI 2011 - Seminar Riset Tenologi Informasi 4
  • 5. Mobile Computing: the Next Decade  Scenario 3: Cognitive Assistance SRITI 2011 - Seminar Riset Tenologi Informasi 5
  • 6. Mobile Computing: the Next Decade  Scenario 4: Medical Consultation SRITI 2011 - Seminar Riset Tenologi Informasi 6
  • 7. Reflecting on these Scenarios [3]  Embody a number of themes  Rich sensors  Crowd sourcing  Near-real-time data consistency  Opportunism  Transient use of infrastructure  User interaction SRITI 2011 - Seminar Riset Tenologi Informasi 7
  • 8. Reducing Distraction  User attention is a precious resource The most successful mobile computing systems of the next decade will be those that are able to reduce or eliminate user interactions SRITI 2011 - Seminar Riset Tenologi Informasi 8
  • 9. User Interaction with Mobile Device  Mobile application autonomy can reduce user interaction.  Mobile application should place greater dependence on contextual information SRITI 2011 - Seminar Riset Tenologi Informasi 9
  • 10. Context Definitions  Context defined variously as:  An application/user’s environment or situation  A combination of computing, user and physical features  Definition from Dey & Abowd [2]: “Context is any information that can be used to characterise the situation of an entity. An entity is a person, place or object that is considered relevant to the interaction between a user and an application, including the user and the application themselves.” SRITI 2011 - Seminar Riset Tenologi Informasi 10
  • 11. Context Awareness  Context of computation may change  Context of computation may be (partially) captured by context information  Context information can be used to  provide seamless computing  provide relevant services to users Needed: Information about requirements and current status of computations and their environments SRITI 2011 - Seminar Riset Tenologi Informasi 11
  • 12. Context Information - Example  user location, devices, applications  user preferences and QoS requirements  application QoS requirements and status  device and network capabilities and their current status  relationships between context information SRITI 2011 - Seminar Riset Tenologi Informasi 12
  • 13. Context Awareness & Mobile Apps  Context-aware applications tend to be enhanced mobile applications for the following reasons:  User context changes frequently subject to the user’s mobility behavior  The need for context-aware behavior is greater in a mobile environment (user location, network resources, and device capabilities) SRITI 2011 - Seminar Riset Tenologi Informasi 13
  • 14. Context-Aware Logic Space [4] SRITI 2011 - Seminar Riset Tenologi Informasi 14
  • 15. Proximity selection  Proximity selection is primarily based on the user location context  Such context can be:  resources and devices in the vicinity of the user  places of interests closest to the user current position  computational objects with which the mobile user is currently interacting SRITI 2011 - Seminar Riset Tenologi Informasi 15
  • 16. Context Modeling  Modeling context is a technique focuses on how to find and relate contextual information that better captures the observation of certain worlds of interest SRITI 2011 - Seminar Riset Tenologi Informasi 16
  • 17. Context Modeling - Example has device Person Device Conceptual model (CML) (name) (id) located at Location (name) Maps to HasDevice(Person, Device) Logical model (relational model) LocatedAt(Person, Location) SRITI 2011 - Seminar Riset Tenologi Informasi 17
  • 18. Disruption Level has disruption level (name) has allow status Allow Status (nr) Profile (code) has divert status Divert Status (name) has profile has location type Location Type (Name) has divert type has nearest base station Device Base Station (id) (nr) has network strength Network Strength Number Type (nr) (name) has device has phone number has number type Person Phone Number (name) (nr) SRITI 2011 - Seminar Riset Tenologi Informasi 18
  • 19. Context-Aware Application A Context-aware application should have a set of characteristics related to context modeling, handling, adaptation:  Context acquisition  Context adaptation  Context aggregation  Context reasoning  Context consistency  Context quality indicators  Context discovery  Context integration  Context query SRITI 2011 - Seminar Riset Tenologi Informasi 19
  • 20. Typical Architecture Context-Aware Applications Programming Toolkit Context Manager Preference Middleware Manager Context Model Context Gathering & Processing Layer Sensor Sensor Sensor SRITI 2011 - Seminar Riset Tenologi Informasi 20
  • 21. User Control of Context-Aware Mobile Apps  Context-aware mobile application may not always behave in the way users expected, due to  Imperfect context information  Incorrect user preferences  Incorrect adaptation rules  Users may feel loss of control over their application.  The system must provide mechanisms to strike a suitable balance of control SRITI 2011 - Seminar Riset Tenologi Informasi 21
  • 22. Balance of User Control  A continuum of user control versus application autonomy A B C Application autonomy User control SRITI 2011 - Seminar Riset Tenologi Informasi 22
  • 23. Providing Suitable Balance of Control  Make users aware of reasons for application adaptation  User may be able to correct undesirable actions  Users may have varying levels of expertise SRITI 2011 - Seminar Riset Tenologi Informasi 23
  • 24. Exposing the System’s view  Exposing system’s view of the context and its corresponding actions provides a sufficient understanding to correct inappropriate action (increases user control)  An appropriate modelling of context and preference is needed for revealing the information to the users Context-aware System Context Information Interactions Adaptation Users Logic User Preferences SRITI 2011 - Seminar Riset Tenologi Informasi 24
  • 25. Example Approach Exposed Context and application preference state change Information Filter information & Explanation Generator Programming Toolkit Information Context & request Preference (scrutinize) USER Context Manager Traces Database Database Semantic Manager User Context Graph Preference Descriptions User Model User Preference Database User feedback SRITI 2011 - Seminar Riset Tenologi Informasi 25
  • 26. User Outside World context User interaction changes Context-Aware Application Context Context Web Windows Interface Client preferences context context and profile changes changes information Context and Preference Proxy inquiry revealed context information (scrutinizing) information and preference context and evaluation scores preference changes Context and Semantic Manager Preference Manager SRITI 2011 - Seminar Riset Tenologi Informasi 26
  • 27. Summary  User attention is a precious resource in mobile environment  Mobile application should reduce user interaction  Mobile application should place greater dependence on context  Need balance of user control due to imperfect context information SRITI 2011 - Seminar Riset Tenologi Informasi 27
  • 28. References [1] K. Lyytinen, Y. Yoo, Issues and Challenges in Ubiquitous Computing, CACM, Vol.4, No.12, 2002 [2] A. K. Dey and G. D. Abowd, Towards a better understanding of context and context-awareness. In CHI 2000 Workshop on the What, Who, Where,vWhen and How of Context-Awareness. The Hague, April 2000. [3] M. Satyanarayanan, Mobile computing: the next decade, in MCS '10 Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, 2010 [4] Christos B. Anagnostopoulos , Athanasios Tsounis , Stathes Hadjiefthymiades, Context Awareness in Mobile Computing Environments, Wireless Personal Communications: An International Journal, v.42 n.3, p.445-464, August 2007 SRITI 2011 - Seminar Riset Tenologi Informasi 28
  • 29. TERIMA KASIH SRITI 2011 - Seminar Riset Tenologi Informasi 29

Editor's Notes

  1. notes
  2. 27/06/12