SlideShare a Scribd company logo
1 of 8
1
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (42)
Drilling Down - The Difficult Problems (19)
 4.5. Client Thickness – cont.2
 The minimum acceptable thickness of a client for a given app:
Determined by the worst-case conditions under which the app must
run satisfactorily
 A very thin client suffices if it has assured high-bandwidth, low-
latency wireless communication to nearby computing
infrastructure, and if batteries recharged/replaced easily
 If in even a single location visited by a user these assumptions do
not hold, the client must be thick enough to compensate at that
location
 This is especially true for interactive applications where crisp
response is important
… continued...
2
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (43)
Drilling Down - The Difficult Problems (20)
 4.5. Client Thickness – cont.3
 With a client of modest thickness, it may be possible to preserve
responsiveness by:
 Handling simple cases locally & relying on remote infrastructure
only for more compute-intensive situations
OR:
 Execute part of the application locally & ship a much-reduced
intermediate state over a weak wireless link to a remote compute
server for completion
 The hybrid mode of speech recognition in Odyssey [24] is an
example of this approach.
OR:
 Client recognizes that a key assumption is not being met, and
alerts its user with a message
 Client could also suggest possible corrective actions
 E.g., moving to a nearby location known “help” the application
 An extremely thin-client will be unsatisfactory for pervasive
computing in the foreseeable future
 Due to uneven conditioning of environments
At the same time, considerable merit in not having to carry or wear a
client thicker than absolutely necessary
3
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (44)
Drilling Down - The Difficult Problems (21)
 4.5. Client Thickness – some research questions:
 Can the concepts of client thickness and environmental
conditioning be quantified? Are there ‘‘sweet spots’’ in the
design space where a modest increase in client thickness
yields considerable improvement in performance and
usability?
 Can a proactive system alert a user in a timely manner
before he leaves a benign environment for a less
hospitable one?
 In that context, can an application be transparently
migrated between a thinner and a thicker client
whenever needed
 What are the kinds of applications for which such migration is
feasible and useful? What is the impact on usability?
4
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (45)
Drilling Down - The Difficult Problems (22)
 4.5. Client Thickness – some research questions – cont.
 Is it possible to build cost-effective modular computers
that can be physically reconfigured to serve as the optimal
mobile clients under diverse environmental conditions?
 Can a proactive system advise a user to reconfigure
when appropriate?
 E.g., knowing her travel plans, can such a system guide her in
configuring her system so that it is of adequate thickness at all
times?
 Can semi-portable infrastructure be carried with a user to
augment less hospitable environments?
 E.g., in a poorly conditioned environment, can a thin
body-worn computer extend its capabilities by wireless
access to a full-function laptop brought by the user?
 This is analogous to carrying both a briefcase and a wallet when you
travel; the briefcase is not physically on your person at all times, but
it is close enough to provide easy access to things too large to fit in
your wallet
 Is this a usable and practical strategy to cope with
uneven conditioning?
5
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (46)
Drilling Down - The Difficult Problems (23)
 4.6) Context Awareness
 Context-awareness is necessary for PERV to be minimally intrusive
 Context aware = cognizant of its user’s state and surroundings, and
modifying its behavior based on this information
 A user’s context
 Can be quite rich
 Some user’s attributes in user’s context:
Physical location / Physiological state (e.g., body temperature and heart
rate) /
Emotional state (e.g., angry, distraught, or calm) / Personal history /
Daily behavioral patterns / …
 A human assistant given such context would make decisions proactively
 Anticipating user needs
 The assistant would typically not disturb the user at inopportune
moments except in an emergency
 Can a pervasive computing system emulate such a human assistant?
 Key challenge: obtaining information needed to function in a context-
aware manner
 Desired information may be part of UPCS (user’s personal computing
space)
 E.g., UPCS has schedules, calendars, address books, to-do lists, …
 More dynamic information has to be sensed in real time from the user’s
environment
 E.g., position, orientation, the identities of people nearby, locally observable
objects and actions, emotional and physiological state, …
6
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (47)
Drilling Down - The Difficult Problems (24)
 4.6. Context Awareness – cont.
 Context Awareness – some research issues:
 How is context represented internally? How is this information
combined with system and application state? Where is context
stored?
 Does it reside locally, in the network, or both?
What are the relevant data structures and algorithms?
 How frequently does context information have to be consulted?
What is the overhead of using context? How to keep this overhead
low?
 What are the minimal services from an environment to provide to
make context-awareness feasible? What are reasonable fallback
positions if an environment does not provide such services? Is
historical context useful?
 What are the relative merits of different location-sensing
technologies?
 Under what circumstances should one be used in preference to
another?
 Should location information be treated just like any other context
information, or should it be handled differently?
 Is historical context useful?
7
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (48)
Drilling Down - The Difficult Problems (25)
 4.7) [LTL:] Proper Level of Transparency in
Proactivity [Paper: Balancing Proactivity and Transparency]
 Transparency = invisibility
 [LTL:] Proactivity can be visible or transparent (invisible )
 Visible when system asks user for specific behavior to
perform a proactive task
 E.g., Aura asking Jane to go to Gate 15 or warning Fred not to
show slides with sensitive data (in Scenario 1)
 Transparent when there is no system interaction with
user when system performs a proactive task
 E.g., Aura warms up projector without asking Fred (in
Scenario 2)
8
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (49)
Drilling Down - The Difficult Problems (26)
 4.7) [LTL:] Proactivity and Its Transparency [Paper: Balancing Proactivity and Transparency] – cont.1
 [LTL:] Visible system proactivity can annoy a user …
 … if system gives a bad advice
 Or the user just thinks that the advice is bad
 … if system interrupts a user too often with advice
 Annoyed even with the best advice
 And prone to ignore it
 [LTL:] Transparent system proactivity can annoy a user too
 E.g., if Aura warms up a projector in a wrong room,
and Fred has to wait for warm up in the right room
 If Aura told Fred in which room it watms up the projectoir
(visible), Fred would notice mistake &correct Aura’s action

More Related Content

Similar to Sec.0a--Intro to pervasive computing 7.ppt

Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Servicesijsptm
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingAnkita Gupta
 
Sec.0a--Intro to pervasive computing 3.ppt
Sec.0a--Intro to pervasive computing 3.pptSec.0a--Intro to pervasive computing 3.ppt
Sec.0a--Intro to pervasive computing 3.pptahmadfaisal744721
 
From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...Fread Mzee
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computinglogus2k
 
Software Engineering Challenges in Pervasive Computing: A review
Software Engineering Challenges in Pervasive Computing: A reviewSoftware Engineering Challenges in Pervasive Computing: A review
Software Engineering Challenges in Pervasive Computing: A reviewEditor IJCATR
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceRui M. Barreira
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...Amber Wheeler
 
Research in the Age of the Context Machine
Research in the Age of the Context MachineResearch in the Age of the Context Machine
Research in the Age of the Context MachineCarsten Keßler
 
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESSA HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESSIJNSA Journal
 
A Survey Of Context-Aware Mobile Computing Research
A Survey Of Context-Aware Mobile Computing ResearchA Survey Of Context-Aware Mobile Computing Research
A Survey Of Context-Aware Mobile Computing ResearchKelly Lipiec
 
DISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docxDISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docxvinaypandey170
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Caaa07 Presentation February Final
Caaa07 Presentation February FinalCaaa07 Presentation February Final
Caaa07 Presentation February Finalpbihler
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network ControlSara Alvarez
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceBRNSSPublicationHubI
 
Lecture03.pptx
Lecture03.pptxLecture03.pptx
Lecture03.pptxSaunya2
 
A survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sA survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sIOSR Journals
 

Similar to Sec.0a--Intro to pervasive computing 7.ppt (20)

Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Sec.0a--Intro to pervasive computing 3.ppt
Sec.0a--Intro to pervasive computing 3.pptSec.0a--Intro to pervasive computing 3.ppt
Sec.0a--Intro to pervasive computing 3.ppt
 
From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
Software Engineering Challenges in Pervasive Computing: A review
Software Engineering Challenges in Pervasive Computing: A reviewSoftware Engineering Challenges in Pervasive Computing: A review
Software Engineering Challenges in Pervasive Computing: A review
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...
 
Research in the Age of the Context Machine
Research in the Age of the Context MachineResearch in the Age of the Context Machine
Research in the Age of the Context Machine
 
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESSA HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
A HUMAN-CENTRIC APPROACH TO GROUP-BASED CONTEXT-AWARENESS
 
A Survey Of Context-Aware Mobile Computing Research
A Survey Of Context-Aware Mobile Computing ResearchA Survey Of Context-Aware Mobile Computing Research
A Survey Of Context-Aware Mobile Computing Research
 
DISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docxDISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docx
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Caaa07 Presentation February Final
Caaa07 Presentation February FinalCaaa07 Presentation February Final
Caaa07 Presentation February Final
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network Control
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient Intelligence
 
Lecture03.pptx
Lecture03.pptxLecture03.pptx
Lecture03.pptx
 
A survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sA survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’s
 

More from ahmadfaisal744721

Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdfIntroduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdfahmadfaisal744721
 
db design and maintenance part 1.pptx
db design and maintenance part 1.pptxdb design and maintenance part 1.pptx
db design and maintenance part 1.pptxahmadfaisal744721
 
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4  Network protocols and standards 2.pptxChapter 4v4  Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 2.pptxahmadfaisal744721
 
Chapter 4v4 Network protocols and standards 1.pptx
Chapter 4v4  Network protocols and standards 1.pptxChapter 4v4  Network protocols and standards 1.pptx
Chapter 4v4 Network protocols and standards 1.pptxahmadfaisal744721
 
Chapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxChapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxahmadfaisal744721
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptxahmadfaisal744721
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptxahmadfaisal744721
 

More from ahmadfaisal744721 (13)

Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdfIntroduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
 
Intoduction to Graph.pptx
Intoduction to Graph.pptxIntoduction to Graph.pptx
Intoduction to Graph.pptx
 
Introduction to Android.ppt
Introduction to Android.pptIntroduction to Android.ppt
Introduction to Android.ppt
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
 
db design and maintenance part 1.pptx
db design and maintenance part 1.pptxdb design and maintenance part 1.pptx
db design and maintenance part 1.pptx
 
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4  Network protocols and standards 2.pptxChapter 4v4  Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 2.pptx
 
Chapter 4v4 Network protocols and standards 1.pptx
Chapter 4v4  Network protocols and standards 1.pptxChapter 4v4  Network protocols and standards 1.pptx
Chapter 4v4 Network protocols and standards 1.pptx
 
Chapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxChapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptx
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
 
write no image.pptx
write no image.pptxwrite no image.pptx
write no image.pptx
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
 
javascript-basics.ppt
javascript-basics.pptjavascript-basics.ppt
javascript-basics.ppt
 

Recently uploaded

%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyAnusha Are
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfVishalKumarJha10
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 

Recently uploaded (20)

%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 

Sec.0a--Intro to pervasive computing 7.ppt

  • 1. 1 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (42) Drilling Down - The Difficult Problems (19)  4.5. Client Thickness – cont.2  The minimum acceptable thickness of a client for a given app: Determined by the worst-case conditions under which the app must run satisfactorily  A very thin client suffices if it has assured high-bandwidth, low- latency wireless communication to nearby computing infrastructure, and if batteries recharged/replaced easily  If in even a single location visited by a user these assumptions do not hold, the client must be thick enough to compensate at that location  This is especially true for interactive applications where crisp response is important … continued...
  • 2. 2 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (43) Drilling Down - The Difficult Problems (20)  4.5. Client Thickness – cont.3  With a client of modest thickness, it may be possible to preserve responsiveness by:  Handling simple cases locally & relying on remote infrastructure only for more compute-intensive situations OR:  Execute part of the application locally & ship a much-reduced intermediate state over a weak wireless link to a remote compute server for completion  The hybrid mode of speech recognition in Odyssey [24] is an example of this approach. OR:  Client recognizes that a key assumption is not being met, and alerts its user with a message  Client could also suggest possible corrective actions  E.g., moving to a nearby location known “help” the application  An extremely thin-client will be unsatisfactory for pervasive computing in the foreseeable future  Due to uneven conditioning of environments At the same time, considerable merit in not having to carry or wear a client thicker than absolutely necessary
  • 3. 3 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (44) Drilling Down - The Difficult Problems (21)  4.5. Client Thickness – some research questions:  Can the concepts of client thickness and environmental conditioning be quantified? Are there ‘‘sweet spots’’ in the design space where a modest increase in client thickness yields considerable improvement in performance and usability?  Can a proactive system alert a user in a timely manner before he leaves a benign environment for a less hospitable one?  In that context, can an application be transparently migrated between a thinner and a thicker client whenever needed  What are the kinds of applications for which such migration is feasible and useful? What is the impact on usability?
  • 4. 4 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (45) Drilling Down - The Difficult Problems (22)  4.5. Client Thickness – some research questions – cont.  Is it possible to build cost-effective modular computers that can be physically reconfigured to serve as the optimal mobile clients under diverse environmental conditions?  Can a proactive system advise a user to reconfigure when appropriate?  E.g., knowing her travel plans, can such a system guide her in configuring her system so that it is of adequate thickness at all times?  Can semi-portable infrastructure be carried with a user to augment less hospitable environments?  E.g., in a poorly conditioned environment, can a thin body-worn computer extend its capabilities by wireless access to a full-function laptop brought by the user?  This is analogous to carrying both a briefcase and a wallet when you travel; the briefcase is not physically on your person at all times, but it is close enough to provide easy access to things too large to fit in your wallet  Is this a usable and practical strategy to cope with uneven conditioning?
  • 5. 5 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (46) Drilling Down - The Difficult Problems (23)  4.6) Context Awareness  Context-awareness is necessary for PERV to be minimally intrusive  Context aware = cognizant of its user’s state and surroundings, and modifying its behavior based on this information  A user’s context  Can be quite rich  Some user’s attributes in user’s context: Physical location / Physiological state (e.g., body temperature and heart rate) / Emotional state (e.g., angry, distraught, or calm) / Personal history / Daily behavioral patterns / …  A human assistant given such context would make decisions proactively  Anticipating user needs  The assistant would typically not disturb the user at inopportune moments except in an emergency  Can a pervasive computing system emulate such a human assistant?  Key challenge: obtaining information needed to function in a context- aware manner  Desired information may be part of UPCS (user’s personal computing space)  E.g., UPCS has schedules, calendars, address books, to-do lists, …  More dynamic information has to be sensed in real time from the user’s environment  E.g., position, orientation, the identities of people nearby, locally observable objects and actions, emotional and physiological state, …
  • 6. 6 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (47) Drilling Down - The Difficult Problems (24)  4.6. Context Awareness – cont.  Context Awareness – some research issues:  How is context represented internally? How is this information combined with system and application state? Where is context stored?  Does it reside locally, in the network, or both? What are the relevant data structures and algorithms?  How frequently does context information have to be consulted? What is the overhead of using context? How to keep this overhead low?  What are the minimal services from an environment to provide to make context-awareness feasible? What are reasonable fallback positions if an environment does not provide such services? Is historical context useful?  What are the relative merits of different location-sensing technologies?  Under what circumstances should one be used in preference to another?  Should location information be treated just like any other context information, or should it be handled differently?  Is historical context useful?
  • 7. 7 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (48) Drilling Down - The Difficult Problems (25)  4.7) [LTL:] Proper Level of Transparency in Proactivity [Paper: Balancing Proactivity and Transparency]  Transparency = invisibility  [LTL:] Proactivity can be visible or transparent (invisible )  Visible when system asks user for specific behavior to perform a proactive task  E.g., Aura asking Jane to go to Gate 15 or warning Fred not to show slides with sensitive data (in Scenario 1)  Transparent when there is no system interaction with user when system performs a proactive task  E.g., Aura warms up projector without asking Fred (in Scenario 2)
  • 8. 8 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (49) Drilling Down - The Difficult Problems (26)  4.7) [LTL:] Proactivity and Its Transparency [Paper: Balancing Proactivity and Transparency] – cont.1  [LTL:] Visible system proactivity can annoy a user …  … if system gives a bad advice  Or the user just thinks that the advice is bad  … if system interrupts a user too often with advice  Annoyed even with the best advice  And prone to ignore it  [LTL:] Transparent system proactivity can annoy a user too  E.g., if Aura warms up a projector in a wrong room, and Fred has to wait for warm up in the right room  If Aura told Fred in which room it watms up the projectoir (visible), Fred would notice mistake &correct Aura’s action