SlideShare a Scribd company logo
1 of 8
1
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (50)
Drilling Down - The Difficult Problems (27)
 4.7) [LTL:] Proactivity and Its Transparency [Paper: Balancing Proactivity and Transparency] – cont.2
 [LTL:] Hypothesis: Talking about “balancing proactivity and
transparency” (see the paper) seems author’s mistake
 Balancing of X an Y is needed only when:
 More X can be obtained by reducing Y AND More Y can be obtained
by reducing X
 Here can have 100% proactivity with either 0% or 100%
transparency
 [LTL:] Finding (“balancing”) proper level of transparency for
proactivity
 If too little or too much of proactivity transparency annoys a user
 => The goal of proactivity transparency is defeated
 Need careful PERV design
 Finding the proper transparency level by:
 System’s self-tuning
 A mobile user’s need & tolerance for proactivity (UNTP) are likely
to be closely related to his level of expertise on a task & his
familiarity with his environment
 A system that can infer UNTP by observing user behavior &
context is better positioned to find the proper balance
2
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (51)
Drilling Down - The Difficult Problems (28)
 4.7) [LTL:] Proactivity and Its Transparency [Paper: Balancing Proactivity and Transparency] – cont3
 Historically, transparency (not just for proactivity) was the ideal
in system design
 E.g., caching is attractive in distributed file systems because it is
completely transparent
 Ironically, sometimes users are hurt/annoyed by complete
transparency
 E.g., servicing a cache miss on a large file over a low-bandwidth
wireless network — so slow that most users would rather be
asked first by the system if they really need the file
 However, too many questions from file system can annoy the user
That is, again annoyed by too low level of transparency
 A solution to this dilemma (suggested by Coda File System [21])
 On a cache miss, Coda consults an internally-maintained user
patience model to predict whether the user will not be
annoyed by a transparent fetch request
 If so, the fetch is handled transparently (user interaction is
suppressed)
 Many subtle problems arise in designing a system that walks
the fine line between annoying visibility & inscrutable (hard to
understand) transparency
3
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (52)
Drilling Down - The Difficult Problems (29)
 4.7. Balancing Transparency in Proactivity – some research
problems:
 How are individual user preferences and tolerances specified and
taken into account?
 Are these static or do they change dynamically?
 What cues can such a system use to determine if [LTL:] transparency
level is too low/high?
 Is explicit interaction with the user to obtain this information acceptable?
 Or, would such explicit interaction to obtain be an annoyance too?
 Can one provide systematic design guidelines to application designers
to help in this task?
 Can one retrofit [transparency] balancing mechanisms into existing
applications?
4
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (53)
Drilling Down - The Difficult Problems (30)
 4.8) Privacy and Trust
 Privacy is greatly complicated by PERV
 Was already a thorny problem in DISTR and MOBI
 Some PERV mechanisms “spy” on user actions on an
almost continuous basis
 E.g., location tracking, smart spaces, use of surrogates
 As a user becomes more dependent on PERV =>
PERV obtains more information about the user
 I.e., about user’s movements, behavior patterns, habit, …
 Exploiting this information is critical to successful
proactivity & self-tuning
 Unless use of information is strictly controlled, it can hurt the user
 Illegitimate uses ranging from targeted spam to blackmail.
 Potential for serious loss of privacy may deter knowledgeable
users from using a PERV system
5
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (54)
Drilling Down - The Difficult Problems (31)
 4.8) Privacy and Trust - cont.
 Mutual trust between infrastructure & users in PERV
 Greater reliance on infrastructure => users must trust
infrastructure to a considerable extent
 Conversely, the infrastructure needs to be confident of
the users’ identity and authorization levels before
responding to their requests
 It is a difficult challenge to establish this mutual trust with
minimal intrusiveness (= mimnimal visibility & thus maximum
transparency)
 System identifies/authorizes users in intrusive (visible)
way
6
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (55)
Drilling Down - The Difficult Problems (32)
 4.8. Privacy and Trust - cont
 Privacy and trust are likely to be enduring problems in
pervasive computing
 Privacy and trust – some research questions:
 How does one strike the right balance between seamless system
behavior and the need to alert users to potential loss of privacy?
 What are the mechanisms, techniques and design principles relevant
to this problem? How often should the system remind a user that his
actions are being recorded? When and how can a user turn off
monitoring in a smart space?
 What are the authentication techniques best suited to PERV?
 Are password-based challenge-response protocols such as Kerberos
[36] adequate or are more exotic techniques such as biometric
authentication [15] necessary?
 What role, if any, can smart cards [14] play?
 How does one express generic identities in access control?
 E.g., how does one express security constraints such as ‘‘Only the
person currently using the projector in this room can set its lighting
level?’’ Or: ‘‘Only employees of our partner companies can negotiate
QoS properties in this smart space?’’
7
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (56)
Drilling Down - The Difficult Problems (33)
 4.9) Impact on Layering [of the System]
 A recurring theme in this paper: the merging of
information from diverse layers of a PERV system to
produce an effective response
 E.g., Scenario 1 shows the value of combining low-level resource
information (network bandwidth) with high-level context
information (airport gate information)
 Proactivity and adaptation based on corrective actions =>
exposure of much more information across layers
 Much more than is typical in systems today
 We want layering – it has benefits
 Cleanly separates abstraction from implementation
 Thus consistent with sound software engineering
 Conducive to standardization
 Encourages the creation of modular software components
8
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (57)
Drilling Down - The Difficult Problems (34)
 4.9) Impact on Layering [of the System] – cont.
 Deciding how to decompose a complex system into layers
or modules is nontrivial
 Remains very much an art rather than a science
 The two most widely-used guidelines for layering
 Parnas’ principle of information hiding [26]
 Saltzer et al.’s end-to-end principle[28]
Both developed long before pervasive computing was
conceived
 Parnas’ - early 1970’s
 Saltzer et al.’s - early 1980’s

More Related Content

Similar to Sec.0a--Intro to pervasive computing 8.ppt

Lecture03.pptx
Lecture03.pptxLecture03.pptx
Lecture03.pptxSaunya2
 
DISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docxDISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docxvinaypandey170
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...Amber Wheeler
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes SAhammedShakil
 
Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT Jaipur
Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT JaipurDistributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT Jaipur
Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT JaipurDrNilam Choudhary
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed SystemSunita Sahu
 
Lecture 1 distriubted computing
Lecture 1 distriubted computingLecture 1 distriubted computing
Lecture 1 distriubted computingARTHURDANIEL12
 
01 - Introduction to Distributed Systems
01 - Introduction to Distributed Systems01 - Introduction to Distributed Systems
01 - Introduction to Distributed SystemsDilum Bandara
 
Chap 01 lecture 1distributed computer lecture
Chap 01 lecture 1distributed computer lectureChap 01 lecture 1distributed computer lecture
Chap 01 lecture 1distributed computer lectureMuhammad Arslan
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...christophefeltus
 
Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...IJNSA Journal
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkchristophefeltus
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network ControlSara Alvarez
 
An agent based approach for building complex software systems
An agent based approach for building complex software systemsAn agent based approach for building complex software systems
An agent based approach for building complex software systemsIcaro Santos
 

Similar to Sec.0a--Intro to pervasive computing 8.ppt (20)

Lecture03.pptx
Lecture03.pptxLecture03.pptx
Lecture03.pptx
 
DISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docxDISTRIBUTED SYSTEM.docx
DISTRIBUTED SYSTEM.docx
 
Intro ds 1
Intro ds 1Intro ds 1
Intro ds 1
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes
 
Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT Jaipur
Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT JaipurDistributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT Jaipur
Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT Jaipur
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
Lecture 1 distriubted computing
Lecture 1 distriubted computingLecture 1 distriubted computing
Lecture 1 distriubted computing
 
01 - Introduction to Distributed Systems
01 - Introduction to Distributed Systems01 - Introduction to Distributed Systems
01 - Introduction to Distributed Systems
 
DS Unit I to III MKU Questions.pdf
DS Unit I to III MKU Questions.pdfDS Unit I to III MKU Questions.pdf
DS Unit I to III MKU Questions.pdf
 
9fcfd50a69d9647585
9fcfd50a69d96475859fcfd50a69d9647585
9fcfd50a69d9647585
 
Chap 01 lecture 1distributed computer lecture
Chap 01 lecture 1distributed computer lectureChap 01 lecture 1distributed computer lecture
Chap 01 lecture 1distributed computer lecture
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
 
Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network Control
 
An agent based approach for building complex software systems
An agent based approach for building complex software systemsAn agent based approach for building complex software systems
An agent based approach for building complex software systems
 

More from ahmadfaisal744721

Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdfIntroduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdfahmadfaisal744721
 
db design and maintenance part 1.pptx
db design and maintenance part 1.pptxdb design and maintenance part 1.pptx
db design and maintenance part 1.pptxahmadfaisal744721
 
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4  Network protocols and standards 2.pptxChapter 4v4  Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 2.pptxahmadfaisal744721
 
Chapter 4v4 Network protocols and standards 1.pptx
Chapter 4v4  Network protocols and standards 1.pptxChapter 4v4  Network protocols and standards 1.pptx
Chapter 4v4 Network protocols and standards 1.pptxahmadfaisal744721
 
Chapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxChapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxahmadfaisal744721
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptxahmadfaisal744721
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptxahmadfaisal744721
 
Sec.0a--Intro to pervasive computing 3.ppt
Sec.0a--Intro to pervasive computing 3.pptSec.0a--Intro to pervasive computing 3.ppt
Sec.0a--Intro to pervasive computing 3.pptahmadfaisal744721
 

More from ahmadfaisal744721 (14)

Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdfIntroduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
 
Intoduction to Graph.pptx
Intoduction to Graph.pptxIntoduction to Graph.pptx
Intoduction to Graph.pptx
 
Introduction to Android.ppt
Introduction to Android.pptIntroduction to Android.ppt
Introduction to Android.ppt
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
 
db design and maintenance part 1.pptx
db design and maintenance part 1.pptxdb design and maintenance part 1.pptx
db design and maintenance part 1.pptx
 
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4  Network protocols and standards 2.pptxChapter 4v4  Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 2.pptx
 
Chapter 4v4 Network protocols and standards 1.pptx
Chapter 4v4  Network protocols and standards 1.pptxChapter 4v4  Network protocols and standards 1.pptx
Chapter 4v4 Network protocols and standards 1.pptx
 
Chapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxChapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptx
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
 
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptxChapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
 
Sec.0a--Intro to pervasive computing 3.ppt
Sec.0a--Intro to pervasive computing 3.pptSec.0a--Intro to pervasive computing 3.ppt
Sec.0a--Intro to pervasive computing 3.ppt
 
write no image.pptx
write no image.pptxwrite no image.pptx
write no image.pptx
 
Topics-Ch4Ch5.ppt
Topics-Ch4Ch5.pptTopics-Ch4Ch5.ppt
Topics-Ch4Ch5.ppt
 
javascript-basics.ppt
javascript-basics.pptjavascript-basics.ppt
javascript-basics.ppt
 

Recently uploaded

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 

Recently uploaded (20)

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 

Sec.0a--Intro to pervasive computing 8.ppt

  • 1. 1 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (50) Drilling Down - The Difficult Problems (27)  4.7) [LTL:] Proactivity and Its Transparency [Paper: Balancing Proactivity and Transparency] – cont.2  [LTL:] Hypothesis: Talking about “balancing proactivity and transparency” (see the paper) seems author’s mistake  Balancing of X an Y is needed only when:  More X can be obtained by reducing Y AND More Y can be obtained by reducing X  Here can have 100% proactivity with either 0% or 100% transparency  [LTL:] Finding (“balancing”) proper level of transparency for proactivity  If too little or too much of proactivity transparency annoys a user  => The goal of proactivity transparency is defeated  Need careful PERV design  Finding the proper transparency level by:  System’s self-tuning  A mobile user’s need & tolerance for proactivity (UNTP) are likely to be closely related to his level of expertise on a task & his familiarity with his environment  A system that can infer UNTP by observing user behavior & context is better positioned to find the proper balance
  • 2. 2 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (51) Drilling Down - The Difficult Problems (28)  4.7) [LTL:] Proactivity and Its Transparency [Paper: Balancing Proactivity and Transparency] – cont3  Historically, transparency (not just for proactivity) was the ideal in system design  E.g., caching is attractive in distributed file systems because it is completely transparent  Ironically, sometimes users are hurt/annoyed by complete transparency  E.g., servicing a cache miss on a large file over a low-bandwidth wireless network — so slow that most users would rather be asked first by the system if they really need the file  However, too many questions from file system can annoy the user That is, again annoyed by too low level of transparency  A solution to this dilemma (suggested by Coda File System [21])  On a cache miss, Coda consults an internally-maintained user patience model to predict whether the user will not be annoyed by a transparent fetch request  If so, the fetch is handled transparently (user interaction is suppressed)  Many subtle problems arise in designing a system that walks the fine line between annoying visibility & inscrutable (hard to understand) transparency
  • 3. 3 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (52) Drilling Down - The Difficult Problems (29)  4.7. Balancing Transparency in Proactivity – some research problems:  How are individual user preferences and tolerances specified and taken into account?  Are these static or do they change dynamically?  What cues can such a system use to determine if [LTL:] transparency level is too low/high?  Is explicit interaction with the user to obtain this information acceptable?  Or, would such explicit interaction to obtain be an annoyance too?  Can one provide systematic design guidelines to application designers to help in this task?  Can one retrofit [transparency] balancing mechanisms into existing applications?
  • 4. 4 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (53) Drilling Down - The Difficult Problems (30)  4.8) Privacy and Trust  Privacy is greatly complicated by PERV  Was already a thorny problem in DISTR and MOBI  Some PERV mechanisms “spy” on user actions on an almost continuous basis  E.g., location tracking, smart spaces, use of surrogates  As a user becomes more dependent on PERV => PERV obtains more information about the user  I.e., about user’s movements, behavior patterns, habit, …  Exploiting this information is critical to successful proactivity & self-tuning  Unless use of information is strictly controlled, it can hurt the user  Illegitimate uses ranging from targeted spam to blackmail.  Potential for serious loss of privacy may deter knowledgeable users from using a PERV system
  • 5. 5 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (54) Drilling Down - The Difficult Problems (31)  4.8) Privacy and Trust - cont.  Mutual trust between infrastructure & users in PERV  Greater reliance on infrastructure => users must trust infrastructure to a considerable extent  Conversely, the infrastructure needs to be confident of the users’ identity and authorization levels before responding to their requests  It is a difficult challenge to establish this mutual trust with minimal intrusiveness (= mimnimal visibility & thus maximum transparency)  System identifies/authorizes users in intrusive (visible) way
  • 6. 6 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (55) Drilling Down - The Difficult Problems (32)  4.8. Privacy and Trust - cont  Privacy and trust are likely to be enduring problems in pervasive computing  Privacy and trust – some research questions:  How does one strike the right balance between seamless system behavior and the need to alert users to potential loss of privacy?  What are the mechanisms, techniques and design principles relevant to this problem? How often should the system remind a user that his actions are being recorded? When and how can a user turn off monitoring in a smart space?  What are the authentication techniques best suited to PERV?  Are password-based challenge-response protocols such as Kerberos [36] adequate or are more exotic techniques such as biometric authentication [15] necessary?  What role, if any, can smart cards [14] play?  How does one express generic identities in access control?  E.g., how does one express security constraints such as ‘‘Only the person currently using the projector in this room can set its lighting level?’’ Or: ‘‘Only employees of our partner companies can negotiate QoS properties in this smart space?’’
  • 7. 7 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (56) Drilling Down - The Difficult Problems (33)  4.9) Impact on Layering [of the System]  A recurring theme in this paper: the merging of information from diverse layers of a PERV system to produce an effective response  E.g., Scenario 1 shows the value of combining low-level resource information (network bandwidth) with high-level context information (airport gate information)  Proactivity and adaptation based on corrective actions => exposure of much more information across layers  Much more than is typical in systems today  We want layering – it has benefits  Cleanly separates abstraction from implementation  Thus consistent with sound software engineering  Conducive to standardization  Encourages the creation of modular software components
  • 8. 8 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (57) Drilling Down - The Difficult Problems (34)  4.9) Impact on Layering [of the System] – cont.  Deciding how to decompose a complex system into layers or modules is nontrivial  Remains very much an art rather than a science  The two most widely-used guidelines for layering  Parnas’ principle of information hiding [26]  Saltzer et al.’s end-to-end principle[28] Both developed long before pervasive computing was conceived  Parnas’ - early 1970’s  Saltzer et al.’s - early 1980’s