SlideShare a Scribd company logo
1 of 29
Context Awareness in Mobile Computing
The Revolutionary Impact of Pervasive Mobile Computing




Bob Hardian
hardian@cs.ui.ac.id
Fakultas Ilmu Komputer, Universitas Indonesia




SRITI 2011
Seminar Riset Tenologi Informasi
                                                         1
Pervasive – Ubiquitous – Mobile Computing
                              Level of embeddedness
                                           High


                         Pervasive                Ubiquitous
                        Computing                 Computing

        Low                                                           High
                                                     Level of mobility
                        Traditional
                         Business                   Mobile
                        Computing                 Computing


                                           Low
[1]


SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                             2
Mobile Computing: the Next Decade

   Scenario 1: Lost Child




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  3
Mobile Computing: the Next Decade

   Scenario 2: Disaster Relief




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  4
Mobile Computing: the Next Decade

   Scenario 3: Cognitive Assistance




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  5
Mobile Computing: the Next Decade

   Scenario 4: Medical Consultation




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  6
Reflecting on these Scenarios [3]

   Embody a number of themes
      Rich sensors
      Crowd sourcing
      Near-real-time data consistency
      Opportunism
      Transient use of infrastructure
      User interaction




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  7
Reducing Distraction
   User attention is a precious resource

     The most successful mobile computing
     systems of the next decade will be those that
     are able to reduce or eliminate user
     interactions




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                     8
User Interaction with Mobile Device

   Mobile application autonomy can reduce user
    interaction.

   Mobile application should place greater dependence
    on contextual information




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                         9
Context Definitions
   Context defined variously as:
      An application/user’s environment or situation
      A combination of computing, user and physical features

   Definition from Dey & Abowd [2]:
         “Context is any information that can be used to characterise
         the situation of an entity. An entity is a person, place or
         object that is considered relevant to the interaction
         between a user and an application, including the user and
         the application themselves.”




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                        10
Context Awareness
   Context of computation may change

   Context of computation may be (partially) captured by context
    information

   Context information can be used to
      provide seamless computing
      provide relevant services to users




     Needed: Information about requirements and
     current status of computations and their
     environments



SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                    11
Context Information - Example
   user location, devices, applications

   user preferences and QoS requirements

   application QoS requirements and status

   device and network capabilities and their current status

   relationships between context information




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                               12
Context Awareness & Mobile Apps

   Context-aware applications tend to be enhanced
    mobile applications for the following reasons:
      User context changes frequently subject to the user’s
       mobility behavior
      The need for context-aware behavior is greater in a mobile
       environment (user location, network resources, and device
       capabilities)




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                    13
Context-Aware Logic Space [4]




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  14
Proximity selection
   Proximity selection is primarily based on the user location
    context

   Such context can be:
      resources and devices in the vicinity of the user
      places of interests closest to the user current position
      computational objects with which the mobile user is
       currently interacting




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                  15
Context Modeling
   Modeling context is a technique focuses on
    how to find and relate contextual information
    that better captures the observation of certain
    worlds of interest




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                      16
Context Modeling - Example

                                                                    has device
                                                  Person                                 Device
 Conceptual model (CML)                           (name)                                  (id)

                                                                    located at
                                                                                         Location
                                                                                          (name)


                                                      Maps to


                                                           HasDevice(Person, Device)
 Logical model (relational model)
                                                           LocatedAt(Person, Location)




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                                                    17
Disruption Level
                has disruption level           (name)



                                        has allow status              Allow Status
                                                                          (nr)
                 Profile
                 (code)                                    has divert status
                                                                                            Divert Status
                                                                                               (name)

         has profile
                                       has location type
                                                                     Location Type
                                                                        (Name)          has divert type

                                       has nearest base station
                 Device                                               Base Station
                  (id)                                                    (nr)

                                        has network strength
                                                                        Network
                                                                        Strength             Number Type
                                                                          (nr)                 (name)

                       has device


                                        has phone number                             has number type
                 Person                                             Phone Number
                 (name)                                                 (nr)


SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                                                            18
Context-Aware Application
  A Context-aware application should have a set of characteristics related
  to context modeling, handling, adaptation:

   Context acquisition                            Context adaptation

   Context aggregation                            Context reasoning

   Context consistency                            Context quality indicators

   Context discovery                              Context integration

   Context query




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                                 19
Typical Architecture

                           Context-Aware Applications

                                      Programming Toolkit




                                        Context Manager     Preference
              Middleware                                     Manager
                                              Context
                                               Model




                   Context Gathering & Processing Layer

                     Sensor                   Sensor        Sensor



SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                         20
User Control of
 Context-Aware Mobile Apps
   Context-aware mobile application may not always behave in
    the way users expected, due to
      Imperfect context information
      Incorrect user preferences
      Incorrect adaptation rules

   Users may feel loss of control over their application.

   The system must provide mechanisms to strike a suitable
    balance of control




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                21
Balance of User Control
   A continuum of user control versus application autonomy



       A                                          B                          C


                                                      Application autonomy
             User control




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                                 22
Providing Suitable Balance of Control

   Make users aware of reasons for application adaptation

   User may be able to correct undesirable actions

   Users may have varying levels of expertise




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                             23
Exposing the System’s view
   Exposing system’s view of the context and its corresponding
    actions provides a sufficient understanding to correct
    inappropriate action (increases user control)

   An appropriate modelling of context and preference is needed
    for revealing the information to the users


                Context-aware System
                                Context
                              Information         Interactions
         Adaptation                                              Users
           Logic
                                 User
                              Preferences




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                         24
Example Approach
                                                                                          Exposed
                          Context and                                                     application
                          preference                                                      state
                          change            Information Filter                            information
                                                    &
                                          Explanation Generator
      Programming Toolkit
                                                                                         Information
         Context &                                                                       request
         Preference                                                                      (scrutinize)
                                                                                                        USER
 Context  Manager           Traces
 Database                  Database
                                            Semantic Manager
                   User




                                                            Context Graph
                   Preference                Descriptions




                                                                            User Model
                User
             Preference
              Database



                                                                                         User feedback



SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                                                               25
User
                                                                                                   Outside World

                                                                                                             context
                                                                   User interaction                         changes
        Context-Aware Application

                                                                                                               Context
                                               Context                    Web
                                               Windows                  Interface                               Client


                                                                preferences                       context       context
                                                                 and profile                     changes       changes
                                                                information


                                                                                   Context and
                                                                                 Preference Proxy

                                inquiry                     revealed       context information
                             (scrutinizing)               information        and preference                     context and
                                                                            evaluation scores               preference changes


                                                                                          Context and
                                        Semantic Manager
                                                                                      Preference Manager



SRITI 2011                          - Seminar Riset Tenologi Informasi
                                                                                                                                 26
Summary
   User attention is a precious resource in mobile
    environment

   Mobile application should reduce user interaction

   Mobile application should place greater dependence
    on context

   Need balance of user control due to imperfect context
    information




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                            27
References
  [1] K. Lyytinen, Y. Yoo, Issues and Challenges in Ubiquitous Computing,
      CACM, Vol.4, No.12, 2002

  [2] A. K. Dey and G. D. Abowd, Towards a better understanding of context
      and context-awareness. In CHI 2000 Workshop on the What, Who,
      Where,vWhen and How of Context-Awareness. The Hague, April 2000.

  [3] M. Satyanarayanan, Mobile computing: the next decade, in MCS '10
      Proceedings of the 1st ACM Workshop on Mobile Cloud Computing &
      Services: Social Networks and Beyond, 2010

  [4] Christos B. Anagnostopoulos , Athanasios Tsounis , Stathes
      Hadjiefthymiades, Context Awareness in Mobile Computing
      Environments, Wireless Personal Communications: An International
      Journal, v.42 n.3, p.445-464, August 2007



SRITI 2011   - Seminar Riset Tenologi Informasi
                                                                             28
TERIMA KASIH




SRITI 2011   - Seminar Riset Tenologi Informasi
                                                  29

More Related Content

What's hot

ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
 
ROS 2 AI Integration Working Group 1: ALMA, SustainML & ROS 2 use case
ROS 2 AI Integration Working Group 1: ALMA, SustainML & ROS 2 use case ROS 2 AI Integration Working Group 1: ALMA, SustainML & ROS 2 use case
ROS 2 AI Integration Working Group 1: ALMA, SustainML & ROS 2 use case eProsima
 
Arquitectura de Data Fabric: Clave en proyectos de Big Data y Machine Learning
Arquitectura de Data Fabric: Clave en proyectos de Big Data y Machine LearningArquitectura de Data Fabric: Clave en proyectos de Big Data y Machine Learning
Arquitectura de Data Fabric: Clave en proyectos de Big Data y Machine LearningDenodo
 
Ch 01 part 1 - basic elements of telecommunication systems
Ch 01   part 1 - basic elements of telecommunication systemsCh 01   part 1 - basic elements of telecommunication systems
Ch 01 part 1 - basic elements of telecommunication systemssakariachromabook
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
Stream All Things—Patterns of Modern Data Integration with Gwen Shapira
Stream All Things—Patterns of Modern Data Integration with Gwen ShapiraStream All Things—Patterns of Modern Data Integration with Gwen Shapira
Stream All Things—Patterns of Modern Data Integration with Gwen ShapiraDatabricks
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesTam Nguyen
 
Robots in retail key themes 2018
Robots in retail key themes 2018Robots in retail key themes 2018
Robots in retail key themes 2018Charlotte Brook
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 

What's hot (14)

ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 
ROS 2 AI Integration Working Group 1: ALMA, SustainML & ROS 2 use case
ROS 2 AI Integration Working Group 1: ALMA, SustainML & ROS 2 use case ROS 2 AI Integration Working Group 1: ALMA, SustainML & ROS 2 use case
ROS 2 AI Integration Working Group 1: ALMA, SustainML & ROS 2 use case
 
Arquitectura de Data Fabric: Clave en proyectos de Big Data y Machine Learning
Arquitectura de Data Fabric: Clave en proyectos de Big Data y Machine LearningArquitectura de Data Fabric: Clave en proyectos de Big Data y Machine Learning
Arquitectura de Data Fabric: Clave en proyectos de Big Data y Machine Learning
 
Ch 01 part 1 - basic elements of telecommunication systems
Ch 01   part 1 - basic elements of telecommunication systemsCh 01   part 1 - basic elements of telecommunication systems
Ch 01 part 1 - basic elements of telecommunication systems
 
Network upgrade
Network upgradeNetwork upgrade
Network upgrade
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Underwater Data Center
Underwater Data CenterUnderwater Data Center
Underwater Data Center
 
Stream All Things—Patterns of Modern Data Integration with Gwen Shapira
Stream All Things—Patterns of Modern Data Integration with Gwen ShapiraStream All Things—Patterns of Modern Data Integration with Gwen Shapira
Stream All Things—Patterns of Modern Data Integration with Gwen Shapira
 
SMAC
SMACSMAC
SMAC
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Robots in retail key themes 2018
Robots in retail key themes 2018Robots in retail key themes 2018
Robots in retail key themes 2018
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
IPT HSC Summary
IPT HSC SummaryIPT HSC Summary
IPT HSC Summary
 

Viewers also liked

context aware computing
context aware computingcontext aware computing
context aware computingswati sonawane
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware ComputingMOHIT DADU
 
Creating Context-Aware Applications
Creating Context-Aware ApplicationsCreating Context-Aware Applications
Creating Context-Aware ApplicationsSimon Guest
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computinglogus2k
 
5 context aware services
5 context aware services5 context aware services
5 context aware servicesguest3cf4991
 
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...Joshwa Philip
 
A survey about context-aware middleware
A survey about context-aware middlewareA survey about context-aware middleware
A survey about context-aware middlewareLeonardo Bruni
 
Designing in Context
Designing in ContextDesigning in Context
Designing in ContextThomas Grill
 
Context-aware Recommendation: A Quick View
Context-aware Recommendation: A Quick ViewContext-aware Recommendation: A Quick View
Context-aware Recommendation: A Quick ViewYONG ZHENG
 
Context Aware Computing for Personalised Healthcare
Context Aware Computing for Personalised HealthcareContext Aware Computing for Personalised Healthcare
Context Aware Computing for Personalised HealthcareSaurav Gupta
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computingencircle.io
 
Thesis presentation final
Thesis presentation finalThesis presentation final
Thesis presentation finalRobin De Croon
 
Context awareness and Resilience Engineering
Context awareness and Resilience EngineeringContext awareness and Resilience Engineering
Context awareness and Resilience EngineeringHenry Muccini
 
[2C3]Developing context-aware applications
[2C3]Developing context-aware applications[2C3]Developing context-aware applications
[2C3]Developing context-aware applicationsNAVER D2
 
[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative Filtering[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative FilteringYONG ZHENG
 
Activity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone AccelerometersActivity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone AccelerometersIshara Amarasekera
 
Adaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homesAdaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homesambitlick
 

Viewers also liked (20)

context aware computing
context aware computingcontext aware computing
context aware computing
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computing
 
Creating Context-Aware Applications
Creating Context-Aware ApplicationsCreating Context-Aware Applications
Creating Context-Aware Applications
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
5 context aware services
5 context aware services5 context aware services
5 context aware services
 
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...
OmniSuggest: A Ubiquitous Cloud-Based Context-Aware Recommendation System for...
 
A survey about context-aware middleware
A survey about context-aware middlewareA survey about context-aware middleware
A survey about context-aware middleware
 
Designing in Context
Designing in ContextDesigning in Context
Designing in Context
 
Wifi Vs 3G-4G
Wifi Vs 3G-4GWifi Vs 3G-4G
Wifi Vs 3G-4G
 
my seminar in aits on mobile computing
my seminar in aits on mobile computingmy seminar in aits on mobile computing
my seminar in aits on mobile computing
 
Context-aware Recommendation: A Quick View
Context-aware Recommendation: A Quick ViewContext-aware Recommendation: A Quick View
Context-aware Recommendation: A Quick View
 
Context Aware Computing for Personalised Healthcare
Context Aware Computing for Personalised HealthcareContext Aware Computing for Personalised Healthcare
Context Aware Computing for Personalised Healthcare
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computing
 
Thesis presentation final
Thesis presentation finalThesis presentation final
Thesis presentation final
 
Context awareness and Resilience Engineering
Context awareness and Resilience EngineeringContext awareness and Resilience Engineering
Context awareness and Resilience Engineering
 
[2C3]Developing context-aware applications
[2C3]Developing context-aware applications[2C3]Developing context-aware applications
[2C3]Developing context-aware applications
 
[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative Filtering[SOCRS2013]Differential Context Modeling in Collaborative Filtering
[SOCRS2013]Differential Context Modeling in Collaborative Filtering
 
Activity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone AccelerometersActivity Recognition using Cell Phone Accelerometers
Activity Recognition using Cell Phone Accelerometers
 
Adaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homesAdaptive middleware of context aware application in smart homes
Adaptive middleware of context aware application in smart homes
 
Context as a Service
Context as a ServiceContext as a Service
Context as a Service
 

Similar to Context Awareness in Mobile Computing

Building Task-Aware Mobile Applications
Building Task-Aware Mobile ApplicationsBuilding Task-Aware Mobile Applications
Building Task-Aware Mobile ApplicationsDave Kellogg
 
MuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 NovMuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 NovMartin Wolpers
 
A Resource Oriented Framework for Context-Aware Enterprise Applications
A Resource Oriented Framework for Context-Aware Enterprise ApplicationsA Resource Oriented Framework for Context-Aware Enterprise Applications
A Resource Oriented Framework for Context-Aware Enterprise Applicationsruyalarcon
 
Resource Identification Using Mobile Queries
Resource Identification Using Mobile QueriesResource Identification Using Mobile Queries
Resource Identification Using Mobile QueriesIDES Editor
 
A Context Aware Mobile Social Web
A Context Aware Mobile Social WebA Context Aware Mobile Social Web
A Context Aware Mobile Social Webwasvel
 
Towards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of ThingsTowards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of ThingsIJCSIS Research Publications
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloudreshmaroberts
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloudreshmaroberts
 
Caaa07 Presentation February Final
Caaa07 Presentation February FinalCaaa07 Presentation February Final
Caaa07 Presentation February Finalpbihler
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...DataCards
 
3 g be technologized by Dev yusmananda
3 g   be technologized by Dev yusmananda3 g   be technologized by Dev yusmananda
3 g be technologized by Dev yusmanandadev yusmananda
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingDaniel Kornev
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112Sharon Rozov
 
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...Sofia Eu
 
Mobile Internet - trends & possibilities
Mobile Internet - trends & possibilitiesMobile Internet - trends & possibilities
Mobile Internet - trends & possibilitiesFloor van Riet
 
20110918 Mobile-Wireless
20110918 Mobile-Wireless20110918 Mobile-Wireless
20110918 Mobile-Wirelesspetch243
 
Annotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting ApplicationsAnnotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting ApplicationsDavid Crowley
 
Web-service based Mobile Geospatial Application Development using Python
Web-service based Mobile Geospatial Application Development using PythonWeb-service based Mobile Geospatial Application Development using Python
Web-service based Mobile Geospatial Application Development using PythonPython Ireland
 
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD WorkshopZornitza Yovcheva
 

Similar to Context Awareness in Mobile Computing (20)

Building Task-Aware Mobile Applications
Building Task-Aware Mobile ApplicationsBuilding Task-Aware Mobile Applications
Building Task-Aware Mobile Applications
 
MuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 NovMuMe Slide M. Wolpers 18 Nov
MuMe Slide M. Wolpers 18 Nov
 
A Resource Oriented Framework for Context-Aware Enterprise Applications
A Resource Oriented Framework for Context-Aware Enterprise ApplicationsA Resource Oriented Framework for Context-Aware Enterprise Applications
A Resource Oriented Framework for Context-Aware Enterprise Applications
 
Resource Identification Using Mobile Queries
Resource Identification Using Mobile QueriesResource Identification Using Mobile Queries
Resource Identification Using Mobile Queries
 
Pre assessment
Pre assessment Pre assessment
Pre assessment
 
A Context Aware Mobile Social Web
A Context Aware Mobile Social WebA Context Aware Mobile Social Web
A Context Aware Mobile Social Web
 
Towards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of ThingsTowards a Semantic-based Context-as-a-Service for Internet of Things
Towards a Semantic-based Context-as-a-Service for Internet of Things
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloud
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloud
 
Caaa07 Presentation February Final
Caaa07 Presentation February FinalCaaa07 Presentation February Final
Caaa07 Presentation February Final
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...
 
3 g be technologized by Dev yusmananda
3 g   be technologized by Dev yusmananda3 g   be technologized by Dev yusmananda
3 g be technologized by Dev yusmananda
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
 
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
SOFIA - Experiences in Implementing a Cross-domain Use Case by Combining Sema...
 
Mobile Internet - trends & possibilities
Mobile Internet - trends & possibilitiesMobile Internet - trends & possibilities
Mobile Internet - trends & possibilities
 
20110918 Mobile-Wireless
20110918 Mobile-Wireless20110918 Mobile-Wireless
20110918 Mobile-Wireless
 
Annotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting ApplicationsAnnotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting Applications
 
Web-service based Mobile Geospatial Application Development using Python
Web-service based Mobile Geospatial Application Development using PythonWeb-service based Mobile Geospatial Application Development using Python
Web-service based Mobile Geospatial Application Development using Python
 
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
3D context-aware mobile maps for tourism - ENTER2011 PhD Workshop
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Context Awareness in Mobile Computing

  • 1. Context Awareness in Mobile Computing The Revolutionary Impact of Pervasive Mobile Computing Bob Hardian hardian@cs.ui.ac.id Fakultas Ilmu Komputer, Universitas Indonesia SRITI 2011 Seminar Riset Tenologi Informasi 1
  • 2. Pervasive – Ubiquitous – Mobile Computing Level of embeddedness High Pervasive Ubiquitous Computing Computing Low High Level of mobility Traditional Business Mobile Computing Computing Low [1] SRITI 2011 - Seminar Riset Tenologi Informasi 2
  • 3. Mobile Computing: the Next Decade  Scenario 1: Lost Child SRITI 2011 - Seminar Riset Tenologi Informasi 3
  • 4. Mobile Computing: the Next Decade  Scenario 2: Disaster Relief SRITI 2011 - Seminar Riset Tenologi Informasi 4
  • 5. Mobile Computing: the Next Decade  Scenario 3: Cognitive Assistance SRITI 2011 - Seminar Riset Tenologi Informasi 5
  • 6. Mobile Computing: the Next Decade  Scenario 4: Medical Consultation SRITI 2011 - Seminar Riset Tenologi Informasi 6
  • 7. Reflecting on these Scenarios [3]  Embody a number of themes  Rich sensors  Crowd sourcing  Near-real-time data consistency  Opportunism  Transient use of infrastructure  User interaction SRITI 2011 - Seminar Riset Tenologi Informasi 7
  • 8. Reducing Distraction  User attention is a precious resource The most successful mobile computing systems of the next decade will be those that are able to reduce or eliminate user interactions SRITI 2011 - Seminar Riset Tenologi Informasi 8
  • 9. User Interaction with Mobile Device  Mobile application autonomy can reduce user interaction.  Mobile application should place greater dependence on contextual information SRITI 2011 - Seminar Riset Tenologi Informasi 9
  • 10. Context Definitions  Context defined variously as:  An application/user’s environment or situation  A combination of computing, user and physical features  Definition from Dey & Abowd [2]: “Context is any information that can be used to characterise the situation of an entity. An entity is a person, place or object that is considered relevant to the interaction between a user and an application, including the user and the application themselves.” SRITI 2011 - Seminar Riset Tenologi Informasi 10
  • 11. Context Awareness  Context of computation may change  Context of computation may be (partially) captured by context information  Context information can be used to  provide seamless computing  provide relevant services to users Needed: Information about requirements and current status of computations and their environments SRITI 2011 - Seminar Riset Tenologi Informasi 11
  • 12. Context Information - Example  user location, devices, applications  user preferences and QoS requirements  application QoS requirements and status  device and network capabilities and their current status  relationships between context information SRITI 2011 - Seminar Riset Tenologi Informasi 12
  • 13. Context Awareness & Mobile Apps  Context-aware applications tend to be enhanced mobile applications for the following reasons:  User context changes frequently subject to the user’s mobility behavior  The need for context-aware behavior is greater in a mobile environment (user location, network resources, and device capabilities) SRITI 2011 - Seminar Riset Tenologi Informasi 13
  • 14. Context-Aware Logic Space [4] SRITI 2011 - Seminar Riset Tenologi Informasi 14
  • 15. Proximity selection  Proximity selection is primarily based on the user location context  Such context can be:  resources and devices in the vicinity of the user  places of interests closest to the user current position  computational objects with which the mobile user is currently interacting SRITI 2011 - Seminar Riset Tenologi Informasi 15
  • 16. Context Modeling  Modeling context is a technique focuses on how to find and relate contextual information that better captures the observation of certain worlds of interest SRITI 2011 - Seminar Riset Tenologi Informasi 16
  • 17. Context Modeling - Example has device Person Device Conceptual model (CML) (name) (id) located at Location (name) Maps to HasDevice(Person, Device) Logical model (relational model) LocatedAt(Person, Location) SRITI 2011 - Seminar Riset Tenologi Informasi 17
  • 18. Disruption Level has disruption level (name) has allow status Allow Status (nr) Profile (code) has divert status Divert Status (name) has profile has location type Location Type (Name) has divert type has nearest base station Device Base Station (id) (nr) has network strength Network Strength Number Type (nr) (name) has device has phone number has number type Person Phone Number (name) (nr) SRITI 2011 - Seminar Riset Tenologi Informasi 18
  • 19. Context-Aware Application A Context-aware application should have a set of characteristics related to context modeling, handling, adaptation:  Context acquisition  Context adaptation  Context aggregation  Context reasoning  Context consistency  Context quality indicators  Context discovery  Context integration  Context query SRITI 2011 - Seminar Riset Tenologi Informasi 19
  • 20. Typical Architecture Context-Aware Applications Programming Toolkit Context Manager Preference Middleware Manager Context Model Context Gathering & Processing Layer Sensor Sensor Sensor SRITI 2011 - Seminar Riset Tenologi Informasi 20
  • 21. User Control of Context-Aware Mobile Apps  Context-aware mobile application may not always behave in the way users expected, due to  Imperfect context information  Incorrect user preferences  Incorrect adaptation rules  Users may feel loss of control over their application.  The system must provide mechanisms to strike a suitable balance of control SRITI 2011 - Seminar Riset Tenologi Informasi 21
  • 22. Balance of User Control  A continuum of user control versus application autonomy A B C Application autonomy User control SRITI 2011 - Seminar Riset Tenologi Informasi 22
  • 23. Providing Suitable Balance of Control  Make users aware of reasons for application adaptation  User may be able to correct undesirable actions  Users may have varying levels of expertise SRITI 2011 - Seminar Riset Tenologi Informasi 23
  • 24. Exposing the System’s view  Exposing system’s view of the context and its corresponding actions provides a sufficient understanding to correct inappropriate action (increases user control)  An appropriate modelling of context and preference is needed for revealing the information to the users Context-aware System Context Information Interactions Adaptation Users Logic User Preferences SRITI 2011 - Seminar Riset Tenologi Informasi 24
  • 25. Example Approach Exposed Context and application preference state change Information Filter information & Explanation Generator Programming Toolkit Information Context & request Preference (scrutinize) USER Context Manager Traces Database Database Semantic Manager User Context Graph Preference Descriptions User Model User Preference Database User feedback SRITI 2011 - Seminar Riset Tenologi Informasi 25
  • 26. User Outside World context User interaction changes Context-Aware Application Context Context Web Windows Interface Client preferences context context and profile changes changes information Context and Preference Proxy inquiry revealed context information (scrutinizing) information and preference context and evaluation scores preference changes Context and Semantic Manager Preference Manager SRITI 2011 - Seminar Riset Tenologi Informasi 26
  • 27. Summary  User attention is a precious resource in mobile environment  Mobile application should reduce user interaction  Mobile application should place greater dependence on context  Need balance of user control due to imperfect context information SRITI 2011 - Seminar Riset Tenologi Informasi 27
  • 28. References [1] K. Lyytinen, Y. Yoo, Issues and Challenges in Ubiquitous Computing, CACM, Vol.4, No.12, 2002 [2] A. K. Dey and G. D. Abowd, Towards a better understanding of context and context-awareness. In CHI 2000 Workshop on the What, Who, Where,vWhen and How of Context-Awareness. The Hague, April 2000. [3] M. Satyanarayanan, Mobile computing: the next decade, in MCS '10 Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond, 2010 [4] Christos B. Anagnostopoulos , Athanasios Tsounis , Stathes Hadjiefthymiades, Context Awareness in Mobile Computing Environments, Wireless Personal Communications: An International Journal, v.42 n.3, p.445-464, August 2007 SRITI 2011 - Seminar Riset Tenologi Informasi 28
  • 29. TERIMA KASIH SRITI 2011 - Seminar Riset Tenologi Informasi 29

Editor's Notes

  1. notes
  2. 27/06/12