What makes for good application - led research in ubiquitous computing ?

نویسندگان

  • George Coulouris
  • Tim Kindberg
  • Bernt Schiele
  • Kasim Rehman
  • Florian Michahelles
چکیده

This position paper presents a vision of Pervasive Computing as a complex and user-centric research and development object. Emphasis is put on an “augmented emulation” as a core toolkit for development and assessment of future work and we will place our proposal in the frame of some tools and work that we have undergone. We believe that developing a use-case/scenario methodology on top of this toolkit will allow evaluation of the developed technologies by using a combination of real products, prototype softwares, emulated softwares, hardware and environment in interaction with real users or agents. Those scenarios are ways of describing application needs. The refinement of elements of those large-scale real-time augmented simulations should rely on standard metric (domain specific) and user-related metrics, and will lead to more refined scenarios in a global process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Application-led Approach for Security Research in Ubicomp

The difficulties of scoping security-related research within ubiquitous and pervasive computing are discussed. The paper provides a condensed background to this research domain, and shows how a generalized, application-oriented research methodology is being applied to a thesis on Intrusion Detection, such that a good balance of theory, technology and scenarios may be obtained.

متن کامل

Application-led Research in Ubiquitous Computing: a Wireless Sensor Network Perspective

The broad vision of ubiquitous/pervasive computing has inspired several fields of more narrowly defined research, among them wireless sensor networks. Although more narrowly defined, the field of wireless sensor networks is nonetheless stuck in a similar application limbo. In what follows, we discuss this problem in more detail, suggest possible routes of escape, and relate the lessons learned ...

متن کامل

Embodied Technology and the Paradigm of Ubiquitous Computing

Since the human race began, human invents technology: technology invents humans. The characteristics that make us human will continue to be manifest in our relationship with technology. Shifting boundaries between computers and everyday world. The more we depend on technologies to carry out or mediate our everyday activities, the more we will need to trust than to do so. New technologies like, ...

متن کامل

Deploy or Die: A Choice for Application-Led Ubiquitous Computing Research

For the past fifteen years Ubiquitous Computing researchers have been exploring how computing can be pushed beyond the traditional desktop environment and seamlessly “woven into the fabric of our everyday lives” [13]. Yet, despite such grand vision, the vast majority of UbiComp research is published and forgotten long before it has any impact on everyday life, let alone woven into its fabric. I...

متن کامل

Security for Ubiquitous Computing

Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005