What makes for good application - led research in ubiquitous computing ?
نویسندگان
چکیده
This position paper presents a vision of Pervasive Computing as a complex and user-centric research and development object. Emphasis is put on an “augmented emulation” as a core toolkit for development and assessment of future work and we will place our proposal in the frame of some tools and work that we have undergone. We believe that developing a use-case/scenario methodology on top of this toolkit will allow evaluation of the developed technologies by using a combination of real products, prototype softwares, emulated softwares, hardware and environment in interaction with real users or agents. Those scenarios are ways of describing application needs. The refinement of elements of those large-scale real-time augmented simulations should rely on standard metric (domain specific) and user-related metrics, and will lead to more refined scenarios in a global process.
منابع مشابه
An Application-led Approach for Security Research in Ubicomp
The difficulties of scoping security-related research within ubiquitous and pervasive computing are discussed. The paper provides a condensed background to this research domain, and shows how a generalized, application-oriented research methodology is being applied to a thesis on Intrusion Detection, such that a good balance of theory, technology and scenarios may be obtained.
متن کاملApplication-led Research in Ubiquitous Computing: a Wireless Sensor Network Perspective
The broad vision of ubiquitous/pervasive computing has inspired several fields of more narrowly defined research, among them wireless sensor networks. Although more narrowly defined, the field of wireless sensor networks is nonetheless stuck in a similar application limbo. In what follows, we discuss this problem in more detail, suggest possible routes of escape, and relate the lessons learned ...
متن کاملEmbodied Technology and the Paradigm of Ubiquitous Computing
Since the human race began, human invents technology: technology invents humans. The characteristics that make us human will continue to be manifest in our relationship with technology. Shifting boundaries between computers and everyday world. The more we depend on technologies to carry out or mediate our everyday activities, the more we will need to trust than to do so. New technologies like, ...
متن کاملDeploy or Die: A Choice for Application-Led Ubiquitous Computing Research
For the past fifteen years Ubiquitous Computing researchers have been exploring how computing can be pushed beyond the traditional desktop environment and seamlessly “woven into the fabric of our everyday lives” [13]. Yet, despite such grand vision, the vast majority of UbiComp research is published and forgotten long before it has any impact on everyday life, let alone woven into its fabric. I...
متن کاملSecurity for Ubiquitous Computing
Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security ...
متن کامل