Abstract
Context awareness enables applications to adapt themselves to their computing environment in order to better suit the needs of the user and the tasks. This paper describes a general middleware infrastructure for context collection and dissemination, realized as a Context Service. By way of two example applications, this paper also illustrates how context information provided by our context service can be exploited to enhance the user experience. These two applications are built upon the abstraction provided by the Context Service and thus help validate the design of this service. The first application, a Notification Dispatcher, uses context to route messages to the most appropriate communication device for a recipient. The second application, a context-aware content distribution system, uses context to predict users' access to web content, and uses these predictions to pre-process and pre-distribute content in order to reduce the access latency.
- Platform for Privacy Preferences (P3P) Project. http://www.w3.org/P3P.Google Scholar
- V. Bazinette, N.H. Cohen, M.R. Ebling, G.D.H. Hunt, H. Lei, A. Purakayastha, G. Stewart, L. Wong, and D.L. Yeh. An Intelligent Notification System. IBM Research Technical Report TR 22089.Google Scholar
- P. Castro and R. Muntz. Managing Context Data for Smart Spaces. IEEE Personal Communications, pages 44--46, October, 2000.Google ScholarCross Ref
- K. Cheverst, N. Davies, K. Mitchell, and A. Friday. Experiences of developing and deploying a context-aware tourist guide. Proceedings of the sixth annual international conference on Mobile computing and networking, August 2000. Google ScholarDigital Library
- N. Cohen, H. Lei, P. Castro, J. Davis II, and A. Purakayastha. Composing Pervasive Data Using iql. Fourth IEEE Workshop on Mobile Computing Systems and Applications, (Callicoon, NY), pages 94--104, June 2002. Google ScholarDigital Library
- P. Coy. Big Brother Pinned to your Chest. Business Week, 3279, August 17, 1992.Google Scholar
- A. K. Dey. Understanding and Using Context. Personal and Ubiquitous Computing, 5(1):4--7, 2001. Google ScholarDigital Library
- D.F. Ferraiolo, D.M. Gilbert, and N. Lynch. An Examination of Federal and Commercial Access Control Policy Needs. NIST-NCSC National Computer Security Conference, (Baltimore, MD), pages 107--116, September 1993.Google Scholar
- H. Gellersen, A. Schmidt, and M. Beigl. Adding context-awareness to mobile artifacts. IEEE Workshop on Mobile Computing Systems and Applications (WMCSA2000), Monterey, CA, December 2000.Google Scholar
- R. Hull, P. Neaves, and J. Bedford-Roberts. Towards situated computing. 1st International Symposium on Wearable Computers, (Cambridge, MA), Oct 1997. Google ScholarDigital Library
- IBM. Websphere Product Family. http://www.ibm.com/software/websevers/.Google Scholar
- M. Langheinrich. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. Proceedings of Ubicomp 2001, pages 273--291, 2001. Google ScholarDigital Library
- H. Lieberman and T. Selker. Out of Context: Computer Systems That Adapt to, and Learn From, Context. IBM Systems Journal, 39:3, 39:4:617--632, 2000. Google ScholarDigital Library
- IBM / Lotus. Lotus Sametime. http://www.lotus.com/products/lotussametime.nsf/wdocs/homepage.Google Scholar
- S.A. Macskassy, A.A. Dayanik, and H. Hirsh. Information Valets for Intelligent Information Access. AAAI Spring Symposia Series on Adaptive User Interfaces, (AUI-2000), 2000.Google Scholar
- P. Maniatis, Roussopoulos M, E. Swierk, K. Lai, G. Appenzeller, X. Zhao, and M. Baker. The Mobile People Architecture. ACM Mobile Computing and Communications Review (MC2R), July 1999. Google ScholarDigital Library
- J. Myllymaki and S. Edlund. Location Aggregation from Multiple Sources. International Conference on Mobile Data Management, (Singapore), Jan 2002. Google ScholarDigital Library
- N. Priyantha, A. Chakraborty, and H. Balakrishnan. The Cricket Location-Support System. In Proceedings of the Sixth ACM Annual International Conference on Mobile Computing and Networking (Boston, MA), pages 32--43, Aug 2000. Google ScholarDigital Library
- Composite Capabilities / Preferences Profiles. Requirements and Architecture. http://www.w3.org/TR/2000/WD-CCPP-ra-20000721/.Google Scholar
- M. Rabinovich and O. Spatscheck. Web Caching and Replication. Addison-Wesley, 2002. Google ScholarDigital Library
- B. Raman, R. Katz, and A. Joseph. Universal Inbox: Providing Extensible Personal Mobility and Service Mobility in an Integrated Communication Network. In Proceedings of the Third IEEE Workshop on Mobile Computing Systems and Applications (Monterey, CA), pages 95--106, Dec 2000. Google ScholarDigital Library
- D. Salber, A.K. Dey, and G.D. Abowd. The Context Toolkit: Aiding the Development of Context-Enabled Applications. In Proceedings of ACM CHI 99, Pittsburgh, PA, pages 434--441, May, 1999. Google ScholarDigital Library
- R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based Access Control Models. IEEE Computer, 29:2:38--47, February, 1996. Google ScholarDigital Library
- B. Schilit, N. Adams, and R. Want. Context-aware computing applications. Workshop on Mobile Computing Systems and Applications, December 8--9, 1994.Google ScholarDigital Library
- B. Schilit, M. Theimer, and B. Welch. Customizing mobile applications. USENIX Mobile and Location-Independent Computing Symposium, (Cambridge, MA), Aug 1993.Google Scholar
- M. Spreitzer and M. Theimer. Providing location information in a ubiquitous computing environment. 14th ACM Symposium on Operating System Principles, (Asheville, NC), Dec 1993. Google ScholarDigital Library
- D. Verma. Content Distribution Networks: An Engineering Approach. Wiley Inc, 2001. Google ScholarDigital Library
- R. Want, A. Hopper, V. Falcao, and J. Gibbons. The Active Badge Location System. ACM Transactions on Information Systems, 10:1:91--102, 1992. Google ScholarDigital Library
Index Terms
- The design and applications of a context service
Recommendations
A context-driven adaptation process for service-based applications
PESOS '10: Proceedings of the 2nd International Workshop on Principles of Engineering Service-Oriented SystemsWhen building service-oriented systems the evolution of requirements and context is the norm rather than the exception. Therefore, it is important to make sure that the system is able to evolve as well without necessarily starting a completely new ...
Context modeling and inference system for heterogeneous context aware service
Proceedings of the 2007 conference on Human interface: Part IIContext can be utilized as an effective source of information for supporting the user system interface under the ubiquitous environments. The context awareness function forms the basis of the studies regarding the ubiquitous computing environment for ...
Comments