Automated Generation of Information Presentation for Pervasive Environments

نویسندگان

  • Keith Houck
  • Michelle Zhou
چکیده

One of the most challenging but largely unaddressed problems in pervasive computing is that of efficiently creating interactive information summaries that are individually tailored to a wide variety of pervasive devices and contexts. We are developing a new software entity to address this problem that will dynamically generate appropriate interactive information summaries that can be communicated by various devices in different contexts. Here we give a summary of our approach in the perspective of software engineering and stress several fundamental issues encountered in our research endeavor. RESEARCH FOCUS & AN EXAMPLE SCENARIO While other research in pervasive computing generally focuses on building hand-crafted information presentation for a specific environment [4], our work is unique in its emphasis on automating the creation of interactive information summaries tailored to a wide variety of pervasive devices. In particular, we employ pervasive devices individually or in a group to create a coordinated, interactive multimedia environment where users can take full advantage of their perception in information processing abilities. Before describing our approach, we first present an example scenario to illustrate how our system will work. Policeman Bob was on his routine patrol in his car, when the monitor near the front seat alerted him about a possible home invasion nearby. While the car navigator automatically displayed the route to the location, Bob asked for more information about the neighborhood (e.g., residents’ information). Upon Bob’s request, our system found the neighborhood information and summarized it using a geographical format (e.g., information overlaid on a map). When approaching the destination, Bob noticed a suspicious vehicle parked in the driveway. To read the car license plate, Bob got out of his car with his radio-PDA. Nobody was in the car, and Bob used his radio to request a license plate check and indicated that the result be sent to his wrist watch. Bob input the plate number and also silenced his radio so as not to alert the suspect. By sending only visual alarms to his wrist watch, our system alerted Bob that the car was reportedly stolen by an extremely dangerous suspect. Since our system also knew that Bob sent the request using his radio, it notifies Bob that the suspect’s picture can now be seen on his radio PDA. In addition, our system also knew that Bob has a desk-top computer in his office, so it then prepared a detailed multimedia information summary about the suspect and sent it to his office computer. In the meantime, Bob examined the suspect’s picture on his radio-PDA and used his wrist watch to request backups silently. Since Bob and his backups could not find the suspect nearby, he went back to the police station. To finish his paper work, Bob reviewed the multimedia summaries about the suspect sent earlier by our system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

The dynamic adaptation of security policies in pervasive environments, with contextual information as the catalyst

The concept of exploiting context information to produce dynamically adapting, accurate and timely security policies for pervasive environments and the entities of these environments are discussed briefly in this paper. The challenges relating to the effective establishment and enforcement of security policies in unpredictable pervasive environments are outlines, along with issues faced in the ...

متن کامل

A Roadmap to the Introduction of Pervasive Information Systems in Healthcare

Pervasive healthcare is an emerging research discipline, which focuses on the development of pervasive and ubiquitous computing technology for healthcare environments. Information and Communication Technologies have dramatically evolved during the last decade, laying a solid foundation for the future generation of Ubiquitous Internet access. As a result, current efforts in research and developm...

متن کامل

Towards intelligent networked video surveillance for the detection of suspicious behaviours

Video camera surveillance is becoming increasingly pervasive in both outdoor city environments and indoor complexes. Indeed, it is reckoned that a central Londoner is captured on well over 300 videos on an average day. With the generation of this vast repository of visual data come the challenges of automated real-time detection of key events and retrieval of salient recorded information. The l...

متن کامل

Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing

People enjoy the convenience of on-line services, Automated Teller Machines (ATMs), and pervasive computing, but online environments, ATMs, and pervasive computing may bring many risks. In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose a virtual password concept involving a small amount of human computing to secure users’ passwords in on-line...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000