Keynote 1: The golden age of pervasive computing

نویسنده

  • Roy Want
چکیده

The notion of Ubiquitous (or Pervasive) Computing was first eloquently described by Mark Weiser at Xerox PARC in the early 1990’s. He proposed a vision in which the personal computing model would evolve from one person using one computer, to many (perhaps hundreds) of computers per person; and that computing would become wirelessly embedded in the world around us, tacitly supporting our work practice. Today, twenty years later, we find ourselves surrounded by smartphones, tablets, and digital televisions much like the components of his vision: Tabs, Pads and LiveBoards. This talk will look back on what was envisioned, compare it with the reality of todays mobile market, examining what was correctly predicted, what worked and what did not. And then, reviewing key market trends, we will look forward to consider the future opportunities for pervasive computing, and some of the challenges and important use cases that we now need to consider.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Keynote: From labs to cities: Mapping the social impact of ubiquitous technologies

Pervasive and ubiquitous computing has come a long way in recent years, and our technologies and experimental prototypes are slowly moving out of the lab and into people’s everyday lives. In this talk I will provide an overview of such research conducted by my team over the past years, and outline the main challenges that we face in the future, particularly in terms of making our technology acc...

متن کامل

PerDis 2017

T he 6th ACM International Symposium on Pervasive Displays (PerDis 2017) took place from 7–9 June in Lugano, Switzerland. PerDis 2017 featured two tutorials, an opening keynote, 21 papers, two posters, five demos, and four videos. The general chair, Marc Langheinrich from the Università della Svizzera Italiana (USI), and the program chair, Sarah Clinch from the University of Manchester, opened ...

متن کامل

National Science Foundation ’ s Workshop on Trustworthy Computing

2 Keynote Talks 2 2.1 Keynote 1. Trustworthy Computing in the Clouds . . . . . . . . . . . . . . . . . . 2 2.2 Keynote 2. Architectures for Practical Client-Side Security . . . . . . . . . . . . . 2 2.3 Keynote 3. Daniel Geer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.4 Keynote 4. Whither Trustworthy Computing? A Short Summary of a Long History and Big Future Themes . ....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013