Marknadens största urval
Snabb leverans

Böcker i Synthesis Lectures on Mobile & Pervasive Computing-serien

Filter
Filter
Sortera efterSortera Serieföljd
  • av Sumi Helal
    480,-

    This lecture presents a first compendium of established and emerging standards in pervasive computing systems. The lecture explains the role of each of the covered standards and explains the relationship and interplay among them. Hopefully, the lecture will help piece together the various standards into a sensible and clear landscape. The lecture is a digest, reorganization, and a compilation of several short articles that have been published in the ¿Standards and Emerging Technologies¿ department of the IEEE Pervasive Computing magazine. The articles have been edited and shortened or expanded to provide the necessary focus and uniform coverage depth. There are more standards and common practices in pervasive systems than the lecture could cover. However, systems perspective and programmability of pervasive spaces, which are the main foci of the lecture, set the scope and determined which standards should be included. The lecture explains what it means to program a pervasive space andintroduces the new requirements brought about by pervasive computing. Among the standards the lecture covers are sensors and device standards, service-oriented device standards, service discovery and delivery standards, service gateway standards, and standards for universal interactions with pervasive spaces. In addition, the emerging sensor platform and domestic robots technologies are covered and their essential new roles explained. The lecture also briefly covers a set of standards that represents an ecosystem for the emerging pervasive healthcare industry. Audiences who may benefit from this lecture include (1) academic and industrial researchers working on sensor-based, pervasive, or ubiquitous computing R&D; (2) system integrator consultants and firms, especially those concerned with integrating sensors, actuators, and devices to their enterprise and business systems; (3) device, smart chips, and sensor manufacturers; (4) government agencies; (5) the healthcare IT and pervasive health industries; and (6) other industries such as logistics, manufacturing, and the emerging smart grid and environment sustainability industries. Table of Contents: Preface / Acknowledgments / Introduction / Sensor and Device Standards / Service-Oriented Device Architecture (SODA) / Sensor Platforms / Service Discovery and Delivery Standards / The Open Services Gateway Initiative (OSGi ) / Universal Interactions / Domestic Robots for Smart Space Interactions / Continua: An Interoperable Personal Health Echosystem / References / Author Biography

  • av Carla Schlatter Ellis
    526,-

    This lecture provides an introduction to the problem of managing the energy demand of mobile devices. Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in mobile computing and wireless communication. The focus of this lecture is on a systems approach where software techniques exploit state-of-the-art architectural features rather than relying only upon advances in lower-power circuitry or the slow improvements in battery technology to solve the problem. Fortunately, there are many opportunities to innovate on managing energy demand at the higher levels of a mobile system. Increasingly, device components offer low power modes that enable software to directly affect the energy consumption of the system. The challenge is to design resource management policies to effectively use these capabilities. The lecture begins by providing the necessary foundations, including basic energy terminology and widely accepted metrics, system models of how power is consumed by a device, and measurement methods and tools available for experimental evaluation. For components that offer low power modes, management policies are considered that address the questions of when to power down to a lower power state and when to power back up to a higher power state. These policies rely on detecting periods when the device is idle as well as techniques for modifying the access patterns of a workload to increase opportunities for power state transitions. For processors with frequency and voltage scaling capabilities, dynamic scheduling policies are developed that determine points during execution when those settings can be changed without harming quality of service constraints. The interactions and tradeoffs among the power management policies of multiple devices are discussed. We explore how the effective power management on one component of a system may have either a positive or negative impact on overall energy consumption or on the design of policies for another component. The important role that application-level involvement may play in energy management is described, with several examples of cross-layer cooperation. Application program interfaces (APIs) that provide information flow across the application-OS boundary are valuable tools in encouraging development of energy-aware applications. Finally, we summarize the key lessons of this lecture and discuss future directions in managing energy demand.

  • av Dan Siewiorek
    480,-

    The confluence of decades of computer science and computer engineering research in multimodal interaction (e.g., speech and gesture recognition), machine learning (e.g., classification and feature extraction), software (e.g., web browsers, distributed agents), electronics (e.g., energy-efficient microprocessors, head-mounted displays), design methodology in user-centered design, and rapid prototyping have enabled a new class of computers-wearable computers. The lecture takes the viewpoint of a potential designer or researcher in wearable computing. Designing wearable computers requires attention to many different factors because of the computer's closeness to the body and its use while performing other tasks. For the purposes of discussion, we have created the UCAMP framework, which consists of the following factors: user, corporal, attention, manipulation, and perception. Each of these factors and their importance is described. A number of example prototypes developed by the authors, as well as by other researchers, are used to illustrate these concepts. Wearable computers have established their first foothold in several application domains, such as vehicle and aircraft maintenance and manufacturing, inspection, language translation, and other areas. The lecture continues by describing the next step in the evolution of wearable computers, namely, context awareness. Context-aware computing takes into account a user's state and surroundings, and the mobile computer modifies its behavior based on this information. A user's context can be quite rich, consisting of attributes such as physical location, physiological state, personal history, daily behavioral patterns, and so forth. If a human assistant were given such context, he or she would make decisions in a proactive fashion, anticipating user needs, and acting as a proactive assistant. The goal is to enable mobile computers to play an analogous role, exploiting context information to significantly reduce demands on human attention. Context-aware intelligent agents can deliver relevant information when a user needs that information. These data make possible many exciting new applications, such as augmented reality, context-aware collaboration, and augmented manufacturing. The combined studies and research reported in this lecture suggest a number of useful guidelines for designing wearable computing devices. Also included with the guidelines is a list of questions that designers should consider when beginning to design a wearable computer. The research directions section emphasizes remaining challenges and trends in the areas of user interface, modalities of interaction, and wearable cognitive augmentation. Finally, we summarize the most important challenges and conclude with a projection of future directions in wearable computing. Table of Contents: Introduction / The Wearable Computing UCAMP / Design Guidelines for Wearable Computing / Research Directions / Conclusions and Future Challenges

  • av Terry Douglas
    526,-

    Managing data in a mobile computing environment invariably involves caching or replication. In many cases, a mobile device has access only to data that is stored locally, and much of that data arrives via replication from other devices, PCs, and services. Given portable devices with limited resources, weak or intermittent connectivity, and security vulnerabilities, data replication serves to increase availability, reduce communication costs, foster sharing, and enhance survivability of critical information. Mobile systems have employed a variety of distributed architectures from client-server caching to peer-to-peer replication. Such systems generally provide weak consistency models in which read and update operations can be performed at any replica without coordination with other devices. The design of a replication protocol then centers on issues of how to record, propagate, order, and filter updates. Some protocols utilize operation logs, whereas others replicate state. Systems might provide best-effort delivery, using gossip protocols or multicast, or guarantee eventual consistency for arbitrary communication patterns, using recently developed pairwise, knowledge-driven protocols. Additionally, systems must detect and resolve the conflicts that arise from concurrent updates using techniques ranging from version vectors to read-write dependency checks. This lecture explores the choices faced in designing a replication protocol, with particular emphasis on meeting the needs of mobile applications. It presents the inherent trade-offs and implicit assumptions in alternative designs. The discussion is grounded by including case studies of research and commercial systems including Coda, Ficus, Bayou, Sybase's iAnywhere, and Microsoft's Sync Framework. Table of Contents: Introduction / System Models / Data Consistency / Replicated Data Protocols / Partial Replication / Conflict Management / Case Studies / Conclusions / Bibliography

  • av Nigel Davies
    526,-

    Fueled by falling display hardware costs and rising demand, digital signage and pervasive displays are becoming ever more ubiquitous. Such systems have traditionally been used for advertising and information dissemination, with digital signage commonplace in shopping malls, airports and public spaces. While advertising and broadcasting announcements remain important applications, developments in sensing and interaction technologies are enabling entirely new classes of display applications that tailor content to the situation and audience of the display. As a result, signage systems are beginning to transition from simple broadcast systems to rich platforms for communication and interaction. In this lecture, we provide an introduction to this emerging field for researchers and practitioners interested in creating state-of-the-art pervasive display systems. We begin by describing the history of pervasive display research, providing illustrations of key systems, from pioneering work on supporting collaboration to contemporary systems designed for personalized information delivery. We then consider what the near future might hold for display networks -- describing a series of compelling applications that are being postulated for future display networks. Creating such systems raises a wide range of challenges and requires designers to make a series of important trade-offs. We dedicate four chapters to key aspects of pervasive display design: audience engagement, display interaction, system software, and system evaluation. These chapters provide an overview of current thinking in each area. Finally, we present a series of case studies of display systems and our concluding remarks.

  • av Marc Langheinrich
    796,-

    It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly—making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives.In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of—and ability to enjoy—privacy, but also look at what constitutes "e;"e;privacy"e;"e; in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research.The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.

  • av Abhinav Mehrotra
    386,-

    Notifications provide a unique mechanism for increasing the effectiveness of real-time information delivery systems. However, notifications that demand users' attention at inopportune moments are more likely to have adverse effects and might become a cause of potential disruption rather than proving beneficial to users.In order to address these challenges a variety of intelligent notification mechanisms based on monitoring and learning users' behavior have been proposed. The goal of such mechanisms is maximizing users' receptivity to the delivered information by automatically inferring the right time and the right context for sending a certain type of information. This book presents an overview of the current state of the art in the area of intelligent notification mechanisms that rely on the awareness of users' context and preferences. We first present a survey of studies focusing on understanding and modeling users' interruptibility and receptivity to notifications from desktops and mobile devices. Then, we discuss the existing challenges and opportunities in developing mechanisms for intelligent notification systems in a variety of application scenarios.

  • av Peter Steenkiste
    706,-

    This book teaches readers how wireless networks work, why some of their properties impact wireless network performance at the application level, and what both network engineers and application developers can do to cope with these challenges. Internet users increasingly rely on wireless access links for diverse tasks such as web browsing, video conferencing, interactive games, and data sharing. Irrespective of how they access the Internet, they expect good performance and a high quality of experience. Unfortunately, wireless access networks are much more challenging to build than wired networks. In wired networks, signals used for communication are contained in a carefully engineered transmission medium. In contrast, wireless signals travel in our physical environment, where the presence of obstacles, interference, and mobility can affect communication. In addition, network performance can differ significantly across physical environments. As a result, the performance of wireless links is often lower and less predictable than that of wired links. The author structured the book according to the layers in the Internet protocol stack, similar to traditional network books. However, rather than presenting a general description of each layer, the focus is on wireless networks and how they differ from wired networks.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.