This book constitutes the refereed proceedings of the 9th International Conference on Ubiquitous Computing, UbiComp 2007. It covers all current issues in ubiquitous, pervasive and handheld computing systems and their applications, including tools and techniques for designing, implementing, and evaluating ubiquitous computing systems; mobile, wireless, and ad hoc networking infrastructures for ubiquitous computing; privacy, security, and trust in ubiquitous and pervasive systems.
"...a must-read text that provides a historical lens to see how ubicomp has matured into a multidisciplinary endeavor. It will be an essential reference to researchers and those who want to learn more about this evolving field." -From the Foreword, Professor Gregory D. Abowd, Georgia Institute of Technology First introduced two decades ago, the term ubiquitous computing is now part of the common vernacular. Ubicomp, as it is commonly called, has grown not just quickly but broadly so as to encompass a wealth of concepts and technology that serves any number of purposes across all of human endeavor. While such growth is positive, the newest generation of ubicomp practitioners and researchers, isolated to specific tasks, are in danger of losing their sense of history and the broader perspective that has been so essential to the field’s creativity and brilliance. Under the guidance of John Krumm, an original ubicomp pioneer, Ubiquitous Computing Fundamentals brings together eleven ubiquitous computing trailblazers who each report on his or her area of expertise. Starting with a historical introduction, the book moves on to summarize a number of self-contained topics. Taking a decidedly human perspective, the book includes discussion on how to observe people in their natural environments and evaluate the critical points where ubiquitous computing technologies can improve their lives. Among a range of topics this book examines: How to build an infrastructure that supports ubiquitous computing applications Privacy protection in systems that connect personal devices and personal information Moving from the graphical to the ubiquitous computing user interface Techniques that are revolutionizing the way we determine a person’s location and understand other sensor measurements While we needn’t become expert in every sub-discipline of ubicomp, it is necessary that we appreciate all the perspectives that make up the field and understand how our work can influence and be influenced by those perspectives. This is important, if we are to encourage future generations to be as successfully innovative as the field’s originators.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2011, held in Copenhagen, Denmark, in December 2011. The 34 revised full papers presented were carefully reviewed and selected from numerous submissions. They cover a wide range of topics ranging from localization and tracking, search and discovery, classification and profiling, context awareness and architecture, location and activity recognition as well as a best paper session, an industry track, and poster and demo papers.
Ubiquitous sensors, devices, networks and information are paving the way toward a smart world in which computational intelligence is distributed throughout the physical environment to provide reliable and relevant services to people. This ubiquitous intelligence will change the computing landscape because it will enable new breeds of applications and systems to be developed, and the realm of computing possibilities will be significantly extended. By enhancing everyday objects with intelligence, many tasks and processes could be simplified, the physical spaces where people interact, like workplaces and homes, could become more efficient, safer and more enjoyable. Ubiquitous computing, or pervasive computing, uses these many “smart things” or “u-things” to create smart environments, services and applications. A smart thing can be endowed with different levels of intelligence, and may be c- text-aware, active, interactive, reactive, proactive, assistive, adaptive, automated, sentient, perceptual, cognitive, autonomic and/or thinking. Research on ubiquitous intelligence is an emerging research field covering many disciplines. A series of grand challenges exists to move from the current level of computing services to the smart world of adaptive and intelligent services. Started in 2005, the series of UIC conferences has been held in Taipei, Nagasaki, Three Gorges (China), Hong Kong, Oslo and Brisbane. The proceedings contain the papers presented at the 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010), held in Xi’an, China, October 26–29, 2010. The conference was accompanied by six vibrant workshops on a variety of research challenges within the area of ubiquitous intelligence and computing.
The ubiquitous nature of mobile and pervasive computing has begun to reshape and complicate our notions of space, time, and identity. In this collection, over thirty internationally recognized contributors reflect on ubiquitous computing’s implications for the ways in which we interact with our environments, experience time, and develop identities individually and socially. Interviews with working media artists lend further perspectives on these cultural transformations. Drawing on cultural theory, new media art studies, human-computer interaction theory, and software studies, this cutting-edge book critically unpacks the complex ubiquity-effects confronting us every day. The companion website can be found here: http://ubiquity.dk
This book constitutes the refereed proceedings of the 9th International Conference on Ubiquitous Computing, UbiComp 2007. It covers all current issues in ubiquitous, pervasive and handheld computing systems and their applications, including tools and techniques for designing, implementing, and evaluating ubiquitous computing systems; mobile, wireless, and ad hoc networking infrastructures for ubiquitous computing; privacy, security, and trust in ubiquitous and pervasive systems.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems, MobiQuitous 2010, held in Sydney, Australia, in December 2010. The 24 revised full papers presented were carefully reviewed and selected from 105 submissions. They cover a wide range of topics ranging from papers architectures to toolkits and mechanisms for privacy, energy efficiency and content awareness. In addition there are 11 work in progress papers and a selection of the best poster and workshop papers.
This volume contains the proceedings of the Second European Ambient Intelligence (AmI) Conference. The conference took place in Erlangen and Nürnberg, November 19–22, 2008. The concept of ambient intelligence (AmI) was introduced in the late 1990s as a novel paradigm for electronic environments for the years 2010-2020. It builds on the early visions of Weiser describing a novel mobile computing infrastr- ture integrated into the networked environment of people. According to early defi- tions, AmI refers to smart electronic surroundings that are sensitive and responsive to the presence of people. The added value for the multi-dimensional society we are living in lies in the fact that the large-scale integration of microelectronics into the environment enables people and objects to interact with this environment in a se- less, trustworthy, and natural manner. Obviously, AmI solutions deliver a new quality of communication and information exchange, they help people to fulfill their professional tasks with increasing efficiency, enable the older generation to stay much longer in the privacy of their own homes and the younger one to lead a healthy and responsible life. Smart mobile devices navigate in private apartments as well as in complex public or industrial environments in order to support people with a broad variety of services.
This volume contains the proceedings of UIC 2009, the 6th International C- ference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces. The UIC 2009 conference was technically co-sponsored by the IEEE and the IEEE Computer Society Technical Committee on Scalable Computing. The conference was also sponsored by the Australian Centre of - cellence in Information and Communication Technologies (NICTA). UIC 2009 was accompanied by six workshops on a variety of research challenges within the area of ubiquitous intelligence and computing. The conference was held in Brisbane, Australia, July 7–9, 2009. The event was the sixth meeting of this conference series. USW 2005 (First International Workshop on Ubiquitous Smart World), held in March 2005 in Taiwan, was the ?rst event in the series. This event was followed by UISW 2005 (Second International Symposium on Ubiquitous Intelligence and Smart Worlds) held in December 2005 in Japan. Since 2006, the conference has been held annually under the name UIC (International Conference on Ubiquitous Intelligence and Computing). UIC 2006 was held in September 2006 in Wuhan andThreeGorges,China,followedbyUIC2007heldinJuly2007inHongKong, and UIC 2008 held in June 2008 in Oslo, Norway. Ubiquitous sensors,computers, networksand informationare paving the way towardasmartworldinwhichcomputationalintelligenceisdistributedthrou- out the physical environment to provide reliable and relevant services to people.
Ubiquitous information systems (UIS) are proposed to represent a fundamental paradigm shift in information systems research. Despite the advantages of such systems, they also come with disadvantages, such as their increasing automation and opaqueness. When aiming to develop UIS that are readily adopted and used by their intended users, those disadvantages need to be addressed. A promising approach to overcome this challenge is fostering the users‘ trust in UIS. Matthias Söllner presents a method for deriving trust supporting components for UIS, based on existing insights from literature as well as a new theoretical approach on the formation of trust in UIS. The empirical evaluation of the method shows that the trust supporting components increase the users‘ trust as well as their intention to adopt a UIS. The book targets researchers, lecturers and students in information systems, business administration and human computer interaction. It also provides insights for practitioners who develop UIS.