SlideShare a Scribd company logo
Siren: Context-aware
Computing for Firefighting
Xiaodong Jiang, Nicholas Chen, Jason Hong, Kevin Wang
University of California, Berkeley
Leila Takayama James Landay
Stanford University University of Washington
March 14, 2015 2Siren: Context-aware Computing for Firefighting
Motivation
 Firescause great harm
 1,755,000 firesin the United Statesin 1998
 4000 deaths, 25000 injuries, 100 firefighter
deaths/ year
 Information intensive task
 “Firefighting ismaking a lot of decisionson
very little information”
 Convergence of sensing and
communication
March 14, 2015 3Siren: Context-aware Computing for Firefighting
Research Overview
 Goal
 Support interaction between firefighters
working inside urban structures
 Approach: User-centered Design
Design Principles:
4 monthsof field study
Evaluation:
Quick feedback
Prototype Solution:
Off-the-shelf technology
March 14, 2015 4Siren: Context-aware Computing for Firefighting
Outline
 Field studiesresults
 From field to design
 Siren architecture
 Siren messaging application
 Evaluation
 Conclusion & Future work
March 14, 2015 5Siren: Context-aware Computing for Firefighting
Field Studies
 Method
 4 months, 3 depts
 Interviewsin
work environment
 1 field exercise
 2 emergency calls
 Participants
 1 assistant chief
 4 battalion chiefs
 2 captains, 2 engineers
 5 firefighters
March 14, 2015 6Siren: Context-aware Computing for Firefighting
Fieldwork Results
 Firefightershave an incomplete picture
 Situational assessment isdone by sending advanced
team into fires
 Individual firefighter confined to a limited space
 Current communication systemsare inadequate
 Require explicit control
 Broadcast and ephemeral
 Detached from information gathering
 Firefightersoperate in harsh environments
 Inherently unreliable nature of any infrastructure
March 14, 2015 7Siren: Context-aware Computing for Firefighting
Communication
“There isa lot of noise on the fire
ground. You’re inside; the fire is
burning; it makesnoise; there’s
breaking glass; there’schain saws
above your head where they’re
cutting a hole in the roof; there’s
other rigscoming in with sirens
blaring; lotsof radio traffic;
everybody trying to radio at the
same time.”
March 14, 2015 8Siren: Context-aware Computing for Firefighting
Need for Tacit Communication
 Context-dependent sharing of mission-
critical information
 “See through the eyesof fellow firefighters”
 Opportunistic, spontaneous, persistent
 When communication happensiscontext
dependent
 Often triggered by external events, without
human initiation
 Can be replayed and shared
March 14, 2015 9Siren: Context-aware Computing for Firefighting
Tacit Communication: An Example
C
A
B Abandon
March 14, 2015 10Siren: Context-aware Computing for Firefighting
From Field to Design
 Tacit communication
 Ad-hoc P2P
 Delayed multi-hop
 Context dependence
 Robustness: multiple levelsof redundancy
 Path redundancy
 Storage redundancy
 Version redundancy
 Feedback redundancy
March 14, 2015 11Siren: Context-aware Computing for Firefighting
Siren Architecture
Adapted Context Fabric (Hong et. al.) for a P2P
network of Wi-Fi-enabled Pocket PCs
Siren Modular Applications
Siren
Context Rule Engine
InfoSpace
Storage
Manager
Multi-hop
Communication
Manager
March 14, 2015 12Siren: Context-aware Computing for Firefighting
Storage Manager
 An InfoSpace consistsof tuples
 Each firefighter ownsan InfoSpace containing data
about himself, other peersand the environment
 Tagsto specify expiration
 InfoSpace snapshot
 A view maintained by each device of entitieson the
Siren network
 Snapshot taken by aggregating sensor readingsover
a given time window
 InfoSpace operators(insert, retrieve) unify
storage and communication
March 14, 2015 13Siren: Context-aware Computing for Firefighting
Multi-hop Communication Manager
 Message format
 XML over HTTP
 Semantic slots
 Time-based message queuing & routing
 One queue for each source
 Queue issorted by time
 Keep forwarding to all neighborsuntil all semantic
slotsexpire
 Version redundancy
 Not overwrite older messagesasnewer versions
arrive – why?
Message id: ….
Source: ….
Time_Created:
Semantic Slot 1:
Semantic Slot 2:
Semantic Slot 3:
Type: location
Value: 525 Soda Hall
Confidence: 70%
Expiration:
March 14, 2015 14Siren: Context-aware Computing for Firefighting
Context Rule Engine
 Take InfoSpace snapshotsasinput, generate
user alerts
 Production system consisting of “if-then” rules
 Currently supportsfive typesof alerts
 “dangerousplace”
 “danger to oneself”
 “next to dangerousplace”
 “othersin danger”
 “instructions”
IF (firefighter F IN room A) AND
(surrounding temperature > 1500F)
THEN (generate_alert (firefighter F1 in danger)) AND
(generate_alert (room A is a dangerous place))
March 14, 2015 15Siren: Context-aware Computing for Firefighting
Siren-based Messaging Application
for Firefighters
 Running on Wi-Fi-enabled Pocket PCs
 A set of context rules
 A map-based user interface
 Use of Berkeley motes
 Location beacon
 Mobile sensing
 Environmental sensing
March 14, 2015 16Siren: Context-aware Computing for Firefighting
Video
March 14, 2015 17Siren: Context-aware Computing for Firefighting
Evaluation
 Used by a group of four firefightersin their fire
house
 Positives
 Communication redundancy for large complex urban
structures(hospitals, high rises, warehouses)
 Location tracking enhance firefighter safety
 Like UI with no manual input
 Concerns
 Ruggednessof technology
 Risksof new technology
 Deployment issues
March 14, 2015 18Siren: Context-aware Computing for Firefighting
Ruggedness of Technology
“It’sgot to be tough; you’ve got
to be able to drop it; it’sgot to
be able to take extreme heat; it’s
got to be able to get wet.”
March 14, 2015 19Siren: Context-aware Computing for Firefighting
 Thermal Imaging Cameras
 PASSSystem
Risks of New Technologies
March 14, 2015 20Siren: Context-aware Computing for Firefighting
Deployment Issues
 Tighter integration with existing tools(use
in conjunction with thermal imager to
narrow search areas)
 Sensor deployment
 “Most effective toolsfor usare always
those we can directly accessand maintain”
March 14, 2015 21Siren: Context-aware Computing for Firefighting
Conclusion & Future Work
 Conclusion
 User-centered design of Siren
 Support tacit communication needs
 Siren messaging application & evaluation
 Future Work
 Dealing with uncertainty in sensor data
 Multimodal interaction techniques
 Deployment strategy
Thanks to:
Berkeley Fire Dept
El Cerrito Fire Dept
Alameda Fire Dept
NSFITR, CITRIS
Lawrence Leung Xiaodong Jiang
NicholasChen
Jason I. Hong
Kevin Wang
Leila A. Takayama
JamesA. Landay
http://guir.berkeley.edu/siren

More Related Content

Viewers also liked

Printertainment, at CHI 1999
Printertainment, at CHI 1999Printertainment, at CHI 1999
Printertainment, at CHI 1999
Jason Hong
 
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites, at WWW2007
CANTINA: A Content-Based Approach to  Detecting Phishing Web Sites, at WWW2007CANTINA: A Content-Based Approach to  Detecting Phishing Web Sites, at WWW2007
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites, at WWW2007
Jason Hong
 
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...
Jason Hong
 
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
Jason Hong
 
Intelligent Agents for Helping Humanity Reach Its Full Potential
Intelligent Agents for Helping Humanity Reach Its Full PotentialIntelligent Agents for Helping Humanity Reach Its Full Potential
Intelligent Agents for Helping Humanity Reach Its Full Potential
Jason Hong
 
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Jason Hong
 
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Jason Hong
 
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Jason Hong
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Jason Hong
 

Viewers also liked (9)

Printertainment, at CHI 1999
Printertainment, at CHI 1999Printertainment, at CHI 1999
Printertainment, at CHI 1999
 
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites, at WWW2007
CANTINA: A Content-Based Approach to  Detecting Phishing Web Sites, at WWW2007CANTINA: A Content-Based Approach to  Detecting Phishing Web Sites, at WWW2007
CANTINA: A Content-Based Approach to Detecting Phishing Web Sites, at WWW2007
 
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...
 
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
 
Intelligent Agents for Helping Humanity Reach Its Full Potential
Intelligent Agents for Helping Humanity Reach Its Full PotentialIntelligent Agents for Helping Humanity Reach Its Full Potential
Intelligent Agents for Helping Humanity Reach Its Full Potential
 
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
 
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
 
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
Big Data for Privacy, at NSF Workshop on Big Data and Privacy, April 2015
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
 

Similar to Siren: Context-aware Computing for Firefighting, at Pervasive2004

Design guidelines for human computer interfaces supporting fire emergency res...
Design guidelines for human computer interfaces supporting fire emergency res...Design guidelines for human computer interfaces supporting fire emergency res...
Design guidelines for human computer interfaces supporting fire emergency res...
Global Risk Forum GRFDavos
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationPrivacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal Information
Sven Wohlgemuth
 
Multimedia rescue 161018
Multimedia rescue 161018Multimedia rescue 161018
Multimedia rescue 161018
Ramesh Jain
 
Mechatronics for Homeland Security
Mechatronics for Homeland SecurityMechatronics for Homeland Security
Mechatronics for Homeland Security
ADGP, Public Grivences, Bangalore
 
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
RuleML
 
A Concept For Support Of Firefighter Frontline Communication
A Concept For Support Of Firefighter Frontline CommunicationA Concept For Support Of Firefighter Frontline Communication
A Concept For Support Of Firefighter Frontline Communication
Angel Evans
 
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDFSeven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDFTor Cannady
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management response
Jack Brown
 
Dsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhofer
Dsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhoferDsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhofer
Dsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhofer
Deltares
 
Digital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyDigital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy Autonomy
Francesco Flammini
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
AIRCC Publishing Corporation
 
Fredrik Bergstrand
Fredrik BergstrandFredrik Bergstrand
Fredrik Bergstrandguest1d4a4a0
 
Research Group 'Multimedia Communication' Presentation (March 2015)
Research Group 'Multimedia Communication' Presentation (March 2015)Research Group 'Multimedia Communication' Presentation (March 2015)
Research Group 'Multimedia Communication' Presentation (March 2015)
hellwagner
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
Marie Elisabeth Gaup Moe
 
A flexible network of sensors: case study
A flexible network of sensors: case studyA flexible network of sensors: case study
A flexible network of sensors: case study
streamspotter
 
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA (European Emergency Number Association)
 
Fire Zine120210
Fire Zine120210Fire Zine120210
Fire Zine120210JohnMcNeil
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
Susanne Tedrick
 
WoT framework and use cases
WoT framework and use casesWoT framework and use cases
WoT framework and use cases
Soumya Kanti Datta
 
90seconds Presentation
90seconds Presentation90seconds Presentation
90seconds Presentation
pbihler
 

Similar to Siren: Context-aware Computing for Firefighting, at Pervasive2004 (20)

Design guidelines for human computer interfaces supporting fire emergency res...
Design guidelines for human computer interfaces supporting fire emergency res...Design guidelines for human computer interfaces supporting fire emergency res...
Design guidelines for human computer interfaces supporting fire emergency res...
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationPrivacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal Information
 
Multimedia rescue 161018
Multimedia rescue 161018Multimedia rescue 161018
Multimedia rescue 161018
 
Mechatronics for Homeland Security
Mechatronics for Homeland SecurityMechatronics for Homeland Security
Mechatronics for Homeland Security
 
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
Challenge@RuleML2015 Developing Situation-Aware Applications for Disaster Man...
 
A Concept For Support Of Firefighter Frontline Communication
A Concept For Support Of Firefighter Frontline CommunicationA Concept For Support Of Firefighter Frontline Communication
A Concept For Support Of Firefighter Frontline Communication
 
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDFSeven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management response
 
Dsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhofer
Dsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhoferDsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhofer
Dsd int 2014 - open mi symposium -cipr-net and openmi, erick rome, fraunhofer
 
Digital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyDigital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy Autonomy
 
Recent trends in cloud computing articles
Recent trends in cloud computing articlesRecent trends in cloud computing articles
Recent trends in cloud computing articles
 
Fredrik Bergstrand
Fredrik BergstrandFredrik Bergstrand
Fredrik Bergstrand
 
Research Group 'Multimedia Communication' Presentation (March 2015)
Research Group 'Multimedia Communication' Presentation (March 2015)Research Group 'Multimedia Communication' Presentation (March 2015)
Research Group 'Multimedia Communication' Presentation (March 2015)
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
A flexible network of sensors: case study
A flexible network of sensors: case studyA flexible network of sensors: case study
A flexible network of sensors: case study
 
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
 
Fire Zine120210
Fire Zine120210Fire Zine120210
Fire Zine120210
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
WoT framework and use cases
WoT framework and use casesWoT framework and use cases
WoT framework and use cases
 
90seconds Presentation
90seconds Presentation90seconds Presentation
90seconds Presentation
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

Siren: Context-aware Computing for Firefighting, at Pervasive2004

  • 1. Siren: Context-aware Computing for Firefighting Xiaodong Jiang, Nicholas Chen, Jason Hong, Kevin Wang University of California, Berkeley Leila Takayama James Landay Stanford University University of Washington
  • 2. March 14, 2015 2Siren: Context-aware Computing for Firefighting Motivation  Firescause great harm  1,755,000 firesin the United Statesin 1998  4000 deaths, 25000 injuries, 100 firefighter deaths/ year  Information intensive task  “Firefighting ismaking a lot of decisionson very little information”  Convergence of sensing and communication
  • 3. March 14, 2015 3Siren: Context-aware Computing for Firefighting Research Overview  Goal  Support interaction between firefighters working inside urban structures  Approach: User-centered Design Design Principles: 4 monthsof field study Evaluation: Quick feedback Prototype Solution: Off-the-shelf technology
  • 4. March 14, 2015 4Siren: Context-aware Computing for Firefighting Outline  Field studiesresults  From field to design  Siren architecture  Siren messaging application  Evaluation  Conclusion & Future work
  • 5. March 14, 2015 5Siren: Context-aware Computing for Firefighting Field Studies  Method  4 months, 3 depts  Interviewsin work environment  1 field exercise  2 emergency calls  Participants  1 assistant chief  4 battalion chiefs  2 captains, 2 engineers  5 firefighters
  • 6. March 14, 2015 6Siren: Context-aware Computing for Firefighting Fieldwork Results  Firefightershave an incomplete picture  Situational assessment isdone by sending advanced team into fires  Individual firefighter confined to a limited space  Current communication systemsare inadequate  Require explicit control  Broadcast and ephemeral  Detached from information gathering  Firefightersoperate in harsh environments  Inherently unreliable nature of any infrastructure
  • 7. March 14, 2015 7Siren: Context-aware Computing for Firefighting Communication “There isa lot of noise on the fire ground. You’re inside; the fire is burning; it makesnoise; there’s breaking glass; there’schain saws above your head where they’re cutting a hole in the roof; there’s other rigscoming in with sirens blaring; lotsof radio traffic; everybody trying to radio at the same time.”
  • 8. March 14, 2015 8Siren: Context-aware Computing for Firefighting Need for Tacit Communication  Context-dependent sharing of mission- critical information  “See through the eyesof fellow firefighters”  Opportunistic, spontaneous, persistent  When communication happensiscontext dependent  Often triggered by external events, without human initiation  Can be replayed and shared
  • 9. March 14, 2015 9Siren: Context-aware Computing for Firefighting Tacit Communication: An Example C A B Abandon
  • 10. March 14, 2015 10Siren: Context-aware Computing for Firefighting From Field to Design  Tacit communication  Ad-hoc P2P  Delayed multi-hop  Context dependence  Robustness: multiple levelsof redundancy  Path redundancy  Storage redundancy  Version redundancy  Feedback redundancy
  • 11. March 14, 2015 11Siren: Context-aware Computing for Firefighting Siren Architecture Adapted Context Fabric (Hong et. al.) for a P2P network of Wi-Fi-enabled Pocket PCs Siren Modular Applications Siren Context Rule Engine InfoSpace Storage Manager Multi-hop Communication Manager
  • 12. March 14, 2015 12Siren: Context-aware Computing for Firefighting Storage Manager  An InfoSpace consistsof tuples  Each firefighter ownsan InfoSpace containing data about himself, other peersand the environment  Tagsto specify expiration  InfoSpace snapshot  A view maintained by each device of entitieson the Siren network  Snapshot taken by aggregating sensor readingsover a given time window  InfoSpace operators(insert, retrieve) unify storage and communication
  • 13. March 14, 2015 13Siren: Context-aware Computing for Firefighting Multi-hop Communication Manager  Message format  XML over HTTP  Semantic slots  Time-based message queuing & routing  One queue for each source  Queue issorted by time  Keep forwarding to all neighborsuntil all semantic slotsexpire  Version redundancy  Not overwrite older messagesasnewer versions arrive – why? Message id: …. Source: …. Time_Created: Semantic Slot 1: Semantic Slot 2: Semantic Slot 3: Type: location Value: 525 Soda Hall Confidence: 70% Expiration:
  • 14. March 14, 2015 14Siren: Context-aware Computing for Firefighting Context Rule Engine  Take InfoSpace snapshotsasinput, generate user alerts  Production system consisting of “if-then” rules  Currently supportsfive typesof alerts  “dangerousplace”  “danger to oneself”  “next to dangerousplace”  “othersin danger”  “instructions” IF (firefighter F IN room A) AND (surrounding temperature > 1500F) THEN (generate_alert (firefighter F1 in danger)) AND (generate_alert (room A is a dangerous place))
  • 15. March 14, 2015 15Siren: Context-aware Computing for Firefighting Siren-based Messaging Application for Firefighters  Running on Wi-Fi-enabled Pocket PCs  A set of context rules  A map-based user interface  Use of Berkeley motes  Location beacon  Mobile sensing  Environmental sensing
  • 16. March 14, 2015 16Siren: Context-aware Computing for Firefighting Video
  • 17. March 14, 2015 17Siren: Context-aware Computing for Firefighting Evaluation  Used by a group of four firefightersin their fire house  Positives  Communication redundancy for large complex urban structures(hospitals, high rises, warehouses)  Location tracking enhance firefighter safety  Like UI with no manual input  Concerns  Ruggednessof technology  Risksof new technology  Deployment issues
  • 18. March 14, 2015 18Siren: Context-aware Computing for Firefighting Ruggedness of Technology “It’sgot to be tough; you’ve got to be able to drop it; it’sgot to be able to take extreme heat; it’s got to be able to get wet.”
  • 19. March 14, 2015 19Siren: Context-aware Computing for Firefighting  Thermal Imaging Cameras  PASSSystem Risks of New Technologies
  • 20. March 14, 2015 20Siren: Context-aware Computing for Firefighting Deployment Issues  Tighter integration with existing tools(use in conjunction with thermal imager to narrow search areas)  Sensor deployment  “Most effective toolsfor usare always those we can directly accessand maintain”
  • 21. March 14, 2015 21Siren: Context-aware Computing for Firefighting Conclusion & Future Work  Conclusion  User-centered design of Siren  Support tacit communication needs  Siren messaging application & evaluation  Future Work  Dealing with uncertainty in sensor data  Multimodal interaction techniques  Deployment strategy
  • 22. Thanks to: Berkeley Fire Dept El Cerrito Fire Dept Alameda Fire Dept NSFITR, CITRIS Lawrence Leung Xiaodong Jiang NicholasChen Jason I. Hong Kevin Wang Leila A. Takayama JamesA. Landay http://guir.berkeley.edu/siren

Editor's Notes

  1. Shouldn’t just reading the bullets
  2. Cite CHI2004 first Incomplete pic of situation
  3. Summarize here Communication is hard Communication is not currently well managed, but is a focal point of training Much communication is about timely information and resource allocations
  4. Better graphics Scott, Jimmy Text too small North, south (up/down)
  5. Instead of trying to “blast” sufficient bandwidth through a building using bulky, high-powered, amplified radio
  6. Context Fabric Delete “5000 lines” Text box “communciation” too small Introduction to SIREN: SIREN is a peer-to-peer infrastructure running on PDAs carried by firefighters. Each firefighter’s PDA is a peer on the network. SIREN consists of three components: 1. A storage manager that maintains data stored using the infospace programming model 2. a communication manager to facilitate message passing between between PDAs and 3. A context rule engine that allows the application to define context-dependant behavior. Applications running on top of SIREN consist of 1. A user interface (more needed?) and 2. a set of context rules for the context rule engine. Peers exchange data via Infospace operators, which we have termed the “Infospace API” What is a peer in the network? What is the infrastructure and what is the application. Siren infrastructure responsible for things in the diagram. The application 1. specific set of rules, 2. User Interface. Application interfaces to the SIREN components through the infospace API
  7. Better define snapshot Weakly consistent? Didn’t get talked about The storage manager manages the contents within a firefighter’s Infospace. Each firefighter maintains a personal infospace about himself and his environment. To avoid populating an infospace with outdated data, tuples can contain fields such as an expiration time, The storage manager acts on this information to constantly update a firefighter’s infospace. Periodically, the storage manager takes snapshots of the infospace. What is a snapshot? A snapshot is everything a firefighter’s infospace has collected about the Why snapshots? Over a given time window, one may receive multiple readings from the same sources, aggregation is important. For example, might be as simple as taking the last reading, but can also be taking the mean, or the mode. How are expiration times set? User defined preference file, with some type of configuration UI. Weakly consistent meaning that different firefighters’s PDAs may have
  8. Discussion didn’t follow the bullets well. – fix! The primary goal of Siren is to support tacit (automatic) communication between firefighters in hostile environments. We have designed the communication component of Siren with this goal in mind. Messages are sent via XML over HTTP. The message Id, source, timestamp and other Semantic slots containing different attributes for the data are tagged with XML markup. Siren contains a multi-hop communication manager to overcome some of the obstacles in communicating inside buildings. First, since communication may not always possible, because of range, or physical obstructions, a queue is maintained on each PDA for messages received from every other PDA. Messages in the queue, as well as newly incoming messages, are forwarded to neighboring devices that are in range. This offers increased redundancy by allowing messages to take separate routes to their destination.
  9. A is variable, not a particular room! SIREN would be very boring if all it did was collect and hoard data. Siren uses the picture of the environment painted by infospace snapshots to perform context-aware behavior. The context rule engine allows an application to define sets of context rules, so that SIREN performs certain actions when various conditions are satisfied. Context rules are formatted as if-then statements. Currently the alerts that SIREN is able to generate are … but those can easily be changed.
  10. The PDAs on which we are running SIREN are Wi-Fi enabled and are able to communicate with each other. They also contain an attached Berkeley mote sensor board to receive data from other motes in the environment. A number of different applications can be created on top of Siren, as an application is only a user interface and a set of context rules. To demonstrate how SIREN interoperates with an application built on top of it, we have created an application that assists firefighters in fighting structural fires. Using data collected by the PDA’s own sensor board as well as those of firefighters that are nearby, the application generates context-aware messages alerting the firefighter to imminent danger.
  11. Cut intro and conclusion in video No credits needed either
  12. We demoed a prototype of the application created on top of SIREN for a group of local firefighters. In general the response was positive. The firefighters were the most excited about the communications redundancy because radio interruption is a frequent problem when they are in large buildings, basements, and shielded areas such as hospitals. The firefighters also praised the location tracking capabilities. Originally, we were not entirely sure how firefighters would deploy sensor motes within buildings. However, after speaking with the firefighters, they suggested that an advance team of firefighters (usually sent into the building to assess the situation) could also place the sensors while inside the building. The fact that the UI for the application required no direct manipulation was also a big plus. One firefighter explained that he was not a “techno-wizard”. Concerns the firefighters had were usually regarding the ruggedness of the technology. First, whether it would hold up in a fire and also the durability in the long run. The firefighters we spoke with were wary of equipment they can’t maintain themselves. Also, they would like to see an increased integration between our application and other tools that they use. Appreciated that Feeback (e.g. location-aware display) was automatic – no need to manually enter data.
  13. New technologies for firefighters cannot be invasive, bulky, fragile, or distracting Carrying lots of equipment (40+ lbs) Use pockets in the coats to carry equipment, strap gear to body, belts Darkness: Crawling on ground Stay near hose lines Guide ropes Right-hand searches However technologies for the IC will not be put into environments of such harsh conditions and stresses Reasons to focus on the IC = We just described their environments of work…
  14. There are also lessons to be learned from the use of current technologies. SCBA Air Monitors One good design: face mask shakes when getting low on air Bad design: tiny whistle Cultural resistance to technology in the field of fire fighting
  15. Uncertainty is inherent in the data, how to resolve? Should it be the user’s responsibility, or should the system automatically deal with it. Additional Input and output mechanisms. Largely focus on different ways of outputting information, as increased user input is not entirely desirable. How to deploy these sensors. A) firefighters send in people ahead of time. B) deploying them while firefighters are completing their task, such as attaching them to water hoses, or door stops. Finally, since this is a slide about the future,