skip to main content
article

The design and applications of a context service

Published:01 October 2002Publication History
Skip Abstract Section

Abstract

Context awareness enables applications to adapt themselves to their computing environment in order to better suit the needs of the user and the tasks. This paper describes a general middleware infrastructure for context collection and dissemination, realized as a Context Service. By way of two example applications, this paper also illustrates how context information provided by our context service can be exploited to enhance the user experience. These two applications are built upon the abstraction provided by the Context Service and thus help validate the design of this service. The first application, a Notification Dispatcher, uses context to route messages to the most appropriate communication device for a recipient. The second application, a context-aware content distribution system, uses context to predict users' access to web content, and uses these predictions to pre-process and pre-distribute content in order to reduce the access latency.

References

  1. Platform for Privacy Preferences (P3P) Project. http://www.w3.org/P3P.Google ScholarGoogle Scholar
  2. V. Bazinette, N.H. Cohen, M.R. Ebling, G.D.H. Hunt, H. Lei, A. Purakayastha, G. Stewart, L. Wong, and D.L. Yeh. An Intelligent Notification System. IBM Research Technical Report TR 22089.Google ScholarGoogle Scholar
  3. P. Castro and R. Muntz. Managing Context Data for Smart Spaces. IEEE Personal Communications, pages 44--46, October, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  4. K. Cheverst, N. Davies, K. Mitchell, and A. Friday. Experiences of developing and deploying a context-aware tourist guide. Proceedings of the sixth annual international conference on Mobile computing and networking, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. N. Cohen, H. Lei, P. Castro, J. Davis II, and A. Purakayastha. Composing Pervasive Data Using iql. Fourth IEEE Workshop on Mobile Computing Systems and Applications, (Callicoon, NY), pages 94--104, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P. Coy. Big Brother Pinned to your Chest. Business Week, 3279, August 17, 1992.Google ScholarGoogle Scholar
  7. A. K. Dey. Understanding and Using Context. Personal and Ubiquitous Computing, 5(1):4--7, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D.F. Ferraiolo, D.M. Gilbert, and N. Lynch. An Examination of Federal and Commercial Access Control Policy Needs. NIST-NCSC National Computer Security Conference, (Baltimore, MD), pages 107--116, September 1993.Google ScholarGoogle Scholar
  9. H. Gellersen, A. Schmidt, and M. Beigl. Adding context-awareness to mobile artifacts. IEEE Workshop on Mobile Computing Systems and Applications (WMCSA2000), Monterey, CA, December 2000.Google ScholarGoogle Scholar
  10. R. Hull, P. Neaves, and J. Bedford-Roberts. Towards situated computing. 1st International Symposium on Wearable Computers, (Cambridge, MA), Oct 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. IBM. Websphere Product Family. http://www.ibm.com/software/websevers/.Google ScholarGoogle Scholar
  12. M. Langheinrich. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. Proceedings of Ubicomp 2001, pages 273--291, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. Lieberman and T. Selker. Out of Context: Computer Systems That Adapt to, and Learn From, Context. IBM Systems Journal, 39:3, 39:4:617--632, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. IBM / Lotus. Lotus Sametime. http://www.lotus.com/products/lotussametime.nsf/wdocs/homepage.Google ScholarGoogle Scholar
  15. S.A. Macskassy, A.A. Dayanik, and H. Hirsh. Information Valets for Intelligent Information Access. AAAI Spring Symposia Series on Adaptive User Interfaces, (AUI-2000), 2000.Google ScholarGoogle Scholar
  16. P. Maniatis, Roussopoulos M, E. Swierk, K. Lai, G. Appenzeller, X. Zhao, and M. Baker. The Mobile People Architecture. ACM Mobile Computing and Communications Review (MC2R), July 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Myllymaki and S. Edlund. Location Aggregation from Multiple Sources. International Conference on Mobile Data Management, (Singapore), Jan 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. N. Priyantha, A. Chakraborty, and H. Balakrishnan. The Cricket Location-Support System. In Proceedings of the Sixth ACM Annual International Conference on Mobile Computing and Networking (Boston, MA), pages 32--43, Aug 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Composite Capabilities / Preferences Profiles. Requirements and Architecture. http://www.w3.org/TR/2000/WD-CCPP-ra-20000721/.Google ScholarGoogle Scholar
  20. M. Rabinovich and O. Spatscheck. Web Caching and Replication. Addison-Wesley, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. B. Raman, R. Katz, and A. Joseph. Universal Inbox: Providing Extensible Personal Mobility and Service Mobility in an Integrated Communication Network. In Proceedings of the Third IEEE Workshop on Mobile Computing Systems and Applications (Monterey, CA), pages 95--106, Dec 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. Salber, A.K. Dey, and G.D. Abowd. The Context Toolkit: Aiding the Development of Context-Enabled Applications. In Proceedings of ACM CHI 99, Pittsburgh, PA, pages 434--441, May, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based Access Control Models. IEEE Computer, 29:2:38--47, February, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. B. Schilit, N. Adams, and R. Want. Context-aware computing applications. Workshop on Mobile Computing Systems and Applications, December 8--9, 1994.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. B. Schilit, M. Theimer, and B. Welch. Customizing mobile applications. USENIX Mobile and Location-Independent Computing Symposium, (Cambridge, MA), Aug 1993.Google ScholarGoogle Scholar
  26. M. Spreitzer and M. Theimer. Providing location information in a ubiquitous computing environment. 14th ACM Symposium on Operating System Principles, (Asheville, NC), Dec 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. Verma. Content Distribution Networks: An Engineering Approach. Wiley Inc, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. R. Want, A. Hopper, V. Falcao, and J. Gibbons. The Active Badge Location System. ACM Transactions on Information Systems, 10:1:91--102, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The design and applications of a context service

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM SIGMOBILE Mobile Computing and Communications Review
            ACM SIGMOBILE Mobile Computing and Communications Review  Volume 6, Issue 4
            October 2002
            80 pages
            ISSN:1559-1662
            EISSN:1931-1222
            DOI:10.1145/643550
            Issue’s Table of Contents

            Copyright © 2002 Authors

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 October 2002

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader