Sec.0a--Intro to pervasive computing (1)
Sec.0a--Intro to pervasive computing (1)
Section 0.A:
Introduction to Pervasive
Computing
Dr. Leszek Lilien
Department of Computer Science
Western Michigan University
Slides based on the article “Pervasive Computing: Vision and
Challenges”
by Prof. M. Satyanarayanan, Carnegie Mellon University,
IEEE Personal Communications, 2001
[Possible mistakes and omissions are all mine. – LTL]
Slides are © 2007 by Leszek T. Lilien
Requests to use original slides for non-profit purposes will be gladly granted upon a written
request.
1. Introduction
Vision of pervasive computing /ubiquitous
computing [Mark Weiser, 1991]
‘‘The most profound technologies are those that
disappear. They weave themselves into the fabric of
everyday life until they are indistinguishable from it.’’
The essence of that vision:
Creation of environments saturated with computing and
communication capabilities, yet gracefully integrated with
human users
A vision too far ahead of its time (1991)
The required hardware technology simply did not
exist
The implementation attempted by Weiser and his
colleagues at Xerox PARC fell short
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 2
Introduction (2)
Next:
Sort out complex intellectual relationship
Between problems/solutions for DIST, MOBI,
PERV
Develop a taxonomy of research issues for
each phase of the evolution (DIST -> MOBI ->
PERV)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 6
Pervasive Computing vs. Distributed Systems & Mobile Computing (3)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 11
Pervasive Computing vs. Distributed Systems & Mobile Computing (8)
Pervasive Computing (2)
…
Research in pervasive computing goes
much further
PERV includes four additional research thrusts
Effective Use of Smart Spaces
Invisibility
Localized Scalability
Masking Uneven Conditioning
See Figure 1 (next slide)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 12
Pervasive Computing vs. Distributed Systems & Mobile Computing (9)
Pervasive Computing (3)
Figure 1: Taxonomy of Computer Systems Research Problems
in PERV
1) New problems are
encountered as one moves
from left to right in this
figure.
2) Solution of many
previously-encountered
problems becomes more
complex.
As the modulation symbols
suggest, this increase in
complexity is multiplicative
rather than additive
it is very much more difficult to
design and implement a
pervasive computing system
than a simple distributed system
of comparable robustness and
maturity.
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 14
Pervasive Computing vs. Distributed Systems & Mobile Computing (11)
Pervasive Computing (5)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 15
Pervasive Computing vs. Distributed Systems & Mobile Computing (12)
Pervasive Computing (6)
2.3.2) Invisibility
The ideal expressed by Weiser: complete
disappearance of pervasive computing technology
from a user’s consciousness = invisible computing
A reasonable approximation: minimal user
distraction ([LTL:] = minimal visibility)
If a PERV environment continuously meets user
expectations and rarely presents him with surprises, it
allows him to interact almost at a subconscious level [46]
BUT:
Getting too close to the ideal might not be perfect:
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 17
Pervasive Computing vs. Distributed Systems & Mobile Computing (14)
Pervasive Computing (8)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 18
Pervasive Computing vs. Distributed Systems & Mobile Computing (15)
Pervasive Computing (9)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 19
Pervasive Computing vs. Distributed Systems & Mobile Computing (16)
Pervasive Computing (10)
Well-equipped conference room, office, or classroom
smarter than other locations
Space smartness depends on:
Technical factors
How well the space is saturated with smart devices
Non-technical factors
Organizational structure, economics and business
models, …
Uniform ‘‘smartness’’ of spaces is years or decades
away (if ever achieved)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 20
Pervasive Computing vs. Distributed Systems & Mobile Computing (17)
Pervasive Computing (11)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 21
Pervasive Computing vs. Distributed Systems & Mobile Computing (18)
3. Example Scenarios
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 23
Pervasive Computing vs. Distributed Systems & Mobile Computing (19)
Example Scenarios (2)
3.1) Scenario 1
Jane is at Gate 23 in the Pittsburgh airport, waiting for her
flight.
She has edited many large documents, and would like to use
her wireless connection to e-mail them. Unfortunately,
bandwidth is miserable since many passengers at Gate 23
and nearby gates are surfing the web.
Aura observes that at the current bandwidth Jane won’t be
able to finish sending her documents before her flight
departs.
Consulting the airport network’s flight schedule service, Aura
discovers that wireless bandwidth is excellent at Gate 15, and
that there are no departing or arriving flights at nearby gates
for 30 min.
Aura displays a dialog box on Jane’s screen suggesting that
she goes to Gate 15, which is only three minutes away. It also
asks her to prioritize her e-mail, so that the most critical
messages are transmitted first.
Jane accepts Aura’s advice and walks to Gate 15. She
watches CNN on the TV there until Aura informs her that it is
close to being done with her messages, and that she can
start walking back.
Jane starts walking back to Gate 23.
The last message is transmitted during her walk,
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications,
and she is
© 2007 by Leszek T. Lilien 24
Pervasive Computing vs. Distributed Systems & Mobile Computing (20)
Example Scenarios (3)
3.2) Scenario 2
Fred is in his office, frantically preparing for a meeting at which
he will give a presentation and a software demonstration. The
meeting room is a 10-minute walk across campus.
It is time to leave, but Fred is not quite ready. He grabs his
PalmXXII wireless handheld computer & walks out of the door.
Aura transfers the state of his work from his desktop to his
handheld, & allows him to make edits using voice commands
during his walk.
Aura infers where Fred is going from his calendar & the campus
location tracking service. It downloads the presentation & the
demonstration software to the projection computer, & warms up
the projector.
Fred finishes his edits just before he enters the meeting room.
As he walks in, Aura transfers his final changes to the projection
computer.
As the presentation proceeds, Fred is about to display a slide
with highly sensitive budget information. Aura senses that this
might be a mistake: the room’s face detection and recognition
capability indicates that there are some unfamiliar faces present.
It therefore warns Fred.
Realizing that Aura is right, Fred skips the slide. He moves on to
other topics and ends on a high note, leaving the audience
impressed by his polished presentation.
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 25
Pervasive Computing vs. Distributed Systems & Mobile Computing (21)
Example Scenarios (4)
Proactivity
Jane able to e-mail her work only because Aura predicts
(estimates) how long the whole process would take
Jane able to begin walking back to her departure gate
before transmission completes because Aura looks ahead
on her behalf
Combining knowledge from different layers of the system
Information on wireless congestion comes from a low level
of the system
Knowledge of boarding time is a high-level (application- or
user-level) information
Aura helps Jane only by combining these disparate pieces of
knowledge
Smart space
Aura is able to obtain from the smart environment
information on wireless conditions at other gates, flight
arrival/departure times at different gates, and distances
between gates
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 26
Pervasive Computing vs. Distributed Systems & Mobile Computing (22)
Example Scenarios (5)
Missing capabilities needed for implementing PERV – cont. 1
Scenario 2 illustrates importance of:
Moving execution state effortlessly across diverse platforms
Moving from a desktop to a handheld machine
Moving from the handheld to a projection computer
Self-tuning (=automatically adjusting behavior to fit circumstances)
Ability to edit on the handheld using speech input rather than
keyboard and mouse.
Proactivity
Inferring that Fred is headed for the room across campus,
warming up the projector, transferring the presentation and
demonstration
Anticipating that the budget slide might be displayed next,
and sensing danger by combining this knowledge with the
inferred presence of strangers in the room.
Smart space
The location tracking and online calendar services are what
enable Aura to infer where Fred is heading
The software-controlled projector enables warmup ahead of
time
The camera-equipped room with continuous face recognition
Management
4.5. Client Thickness / 4.6. Context Awareness
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 30
Pervasive Computing vs. Distributed Systems & Mobile Computing (25)
Drilling Down - The Difficult Problems (2)
Assumed:
Each user immersed in a user’s personal
computing space (UPCS) that accompanies him
everywhere and mediates all interactions with the
pervasive computing elements in her surroundings
UPCS likely implemented on a body-worn or handheld
computer (or a collection of these acting as a single
entity)
UPCS is a ‘‘client’’ of its PERV environment
Even though many of its interactions may be peer-to-
peer rather than strictly client-server
Client needs to be quite sophisticated hence complex
As indicated by the discussion below
Must be lightweight = small, light, with small and light battery
Compromises computing capabilities
Must have powerful comp/comm capabilities
Ever-growing expectations of mobile users
Well beyond capabilities of a lightweight mobile computer
How to reconcile contradictory requirements?
Difficult to reconcile
Idea: use cyber foraging
forage [fawr-ij] … 3. the act of searching for provisions of any
kind.
[cf. Dictionary.com]
Cyber foraging:
Dynamically augment the computing resources of a
wireless mobile computer by exploiting wired hardware
infrastructure [LTL: of the surrounding smart space]
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 36
Pervasive Computing vs. Distributed Systems & Mobile Computing (30)
Drilling Down - The Difficult Problems (7)
4.2. Cyber Foraging – cont.1
Need infrastructure facilitating cyber foraging
Need smart public spaces
Equipped with compute servers or data staging servers
Much as table lamps [or power outlets] are today
Connected to the wired Internet through high-bandwidth
networks
‘‘Wasting’’ smart infrastructure when not in use
We can afford this ‘‘waste’’ to improve user experience
Could ensure that never wasted - always in use
E.g., run SETI program / sell time slices to others
Surrogate of a mobile computer:
Hardware in the wired infrastructure temporarily
supporting cyber foraging for the mobile computer
[LTL:] Compare this limited cyber foraging with
more extensive foraging (by employing helpers) in
opportunistic networks (oppnets). After we discuss
oppnets (soon), see how oppnets’ approach differs.37
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien
Pervasive Computing vs. Distributed Systems & Mobile Computing (31)
Drilling Down - The Difficult Problems (8)
surrogates?
Of the many proposed service discovery mechanisms
such as JINI, UPnP, and BlueTooth proximity detection,
which is best suited for this purpose? Can one build a
discovery mechanism that subsumes all of them for
greatest flexibility?
How to handle the issue of trust?
How does one establish an appropriate level of trust in a
surrogate? What are useful levels of trust in practice?
How applicable and useful is the concept of caching trust
[29]? Can one amortize the cost of establishing trust
across many surrogates in a neighborhood?
How is load balancing on surrogates done?
Is surrogate allocation based on an admission control
approach, or a best-effort approach? How relevant is
previous work on load balancing on networks of
workstations?
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 39
Pervasive Computing vs. Distributed Systems & Mobile Computing (33)
Drilling Down - The Difficult Problems (10)
Cyber foraging – some important research questions – cont.
Issues for corrective strategy
Is corrective adaptation practically feasible? Do users find it
intrusive or annoying? What is the best way to
communicate potential corrective actions to users? What
are the programming models and APIs necessary to support
corrective actions?
Legacy problem: Can existing applications use this
approach? If so, how substantial are the modifications to
them?
E.g., Infopad [6, 40], SLIM [33]
Can’t operate in isolation
Little more than high-resolution displays connected
through high-bandwidth wireless links to nearby
compute servers
In-between: Midsize clients
Handheld computers
E.g., PalmPilot
Can operate in isolation
But run a limited range of applications
Other apps run on compute servers of smart spaces
The other extreme: Full-function clients
Wearable computers and laptops
E.g., the Navigator family of wearable computers [34],
laptops running as clients of the Coda File System [17]
Capable of standalone or disconnected operation
Make use of wireless connectivity when available
Not critically dependent on it
“Pervasive Computing: Vision and Challenges,” IEEE Personal Communications,
Based on: M. Satyanarayanan, © 2007 by Leszek T. Lilien 48
Pervasive Computing vs. Distributed Systems & Mobile Computing (42)
Drilling Down - The Difficult Problems (19)
… continued...
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 49
Pervasive Computing vs. Distributed Systems & Mobile Computing (43)
Drilling Down - The Difficult Problems (20)
4.5. Client Thickness – cont.3
With a client of modest thickness, it may be possible to
preserve responsiveness by:
Handling simple cases locally & relying on remote
infrastructure only for more compute-intensive situations
OR:
Execute part of the application locally & ship a much-
reduced intermediate state over a weak wireless link to a
remote compute server for completion
The hybrid mode of speech recognition in Odyssey [24] is an
example of this approach.
OR:
Client recognizes that a key assumption is not being met,
and alerts its user with a message
Client could also suggest possible corrective actions
E.g., moving to a nearby location known “help” the application
An extremely thin-client will be unsatisfactory for pervasive
computing in the foreseeable future
Due to uneven conditioning of environments
At the same time, considerable merit in not having to carry
or wear a client thicker than absolutely necessary
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 50
Pervasive Computing vs. Distributed Systems & Mobile Computing (44)
Drilling Down - The Difficult Problems (21)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 51
Pervasive Computing vs. Distributed Systems & Mobile Computing (45)
Drilling Down - The Difficult Problems (22)
4.5. Client Thickness – some research questions – cont.
Is it possible to build cost-effective modular
computers that can be physically reconfigured to
serve as the optimal mobile clients under diverse
environmental conditions?
Can a proactive system advise a user to
reconfigure when appropriate?
E.g., knowing her travel plans, can such a system guide her in
configuring her system so that it is of adequate thickness at all
times?
Can semi-portable infrastructure be carried with a
user to augment less hospitable environments?
E.g., in a poorly conditioned environment, can a
thin body-worn computer extend its capabilities
by wireless access to a full-function laptop
brought by the user?
This is analogous to carrying both a briefcase and a wallet
when you travel; the briefcase is not physically on your person
at all times, but it is close enough to provide easy access to
things too large to fit in your wallet
Is this a usable and practical strategy to cope with52
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien
Pervasive Computing vs. Distributed Systems & Mobile Computing (46)
Drilling Down - The Difficult Problems (23)
4.6) Context Awareness
Context-awareness is necessary for PERV to be minimally
intrusive
Context aware = cognizant of its user’s state and surroundings, and
modifying its behavior based on this information
A user’s context
Can be quite rich
Some user’s attributes in user’s context:
Physical location / Physiological state (e.g., body temperature and
heart rate) /
Emotional state (e.g., angry, distraught, or calm) / Personal history /
Daily behavioral patterns / …
A human assistant given such context would make decisions
proactively
Anticipating user needs
The assistant would typically not disturb the user at inopportune
moments except in an emergency
Can a pervasive computing system emulate such a human assistant?
Key challenge: obtaining information needed to function in a
context-aware manner
Desired information may be part of UPCS (user’s personal
computing space)
E.g., UPCS has schedules, calendars, address books, to-do lists, …
More dynamic information has to be sensed in real time from the
user’s environment
E.g., position, orientation, the identities of people nearby, locally
observable
Based on: M. Satyanarayanan, objects
“Pervasive Computing: and
Vision actions,
and Challenges,” IEEE emotional and physiological
Personal Communications, © 2007 by Leszek state,
T. Lilien … 53
Pervasive Computing vs. Distributed Systems & Mobile Computing (47)
Drilling Down - The Difficult Problems (24)
4.6. Context Awareness – cont.
Context Awareness – some research issues:
How is context represented internally? How is this
information combined with system and application state?
Where is context stored?
Does it reside locally, in the network, or both?
What are the relevant data structures and algorithms?
How frequently does context information have to be
consulted? What is the overhead of using context? How to
keep this overhead low?
What are the minimal services from an environment to
provide to make context-awareness feasible? What are
reasonable fallback positions if an environment does not
provide such services? Is historical context useful?
What are the relative merits of different location-sensing
technologies?
Under what circumstances should one be used in preference
to another?
Should location information be treated just like any other
context information, or should it be handled differently?
Is historical context useful?
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 54
Pervasive Computing vs. Distributed Systems & Mobile Computing (48)
Drilling Down - The Difficult Problems (25)
Transparent when there is no system interaction
with user when system performs a proactive task
E.g., Aura warms up projector without asking Fred (in
Scenario 2)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 55
Pervasive Computing vs. Distributed Systems & Mobile Computing (49)
Drilling Down - The Difficult Problems (26)
4.7) [LTL:] Proactivity and Its Transparency [Paper: Balancing Proactivity and Transparency] –
cont.1
[LTL:] Visible system proactivity can annoy a user …
… if system gives a bad advice
Or the user just thinks that the advice is bad
… if system interrupts a user too often with advice
Annoyed even with the best advice
And prone to ignore it
[LTL:] Transparent system proactivity can annoy a
user too
E.g., if Aura warms up a projector in a wrong
room, and Fred has to wait for warm up in the
right room
If Aura told Fred in which room it watms up the projectoir
(visible), Fred would notice mistake &correct Aura’s
action
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 56
Pervasive Computing vs. Distributed Systems & Mobile Computing (50)
Drilling Down - The Difficult Problems (27)
4.7) [LTL:] Proactivity and Its Transparency [Paper: Balancing Proactivity and Transparency] – cont.2
[LTL:] Hypothesis: Talking about “balancing
proactivity and transparency” (see the paper) seems
author’s mistake
Balancing of X an Y is needed only when:
More X can be obtained by reducing Y AND More Y can be
obtained by reducing X
Here can have 100% proactivity with either 0% or 100%
transparency
[LTL:] Finding (“balancing”) proper level of
transparency for proactivity
If too little or too much of proactivity transparency annoys
a user
=> The goal of proactivity transparency is defeated
Need careful PERV design
Finding the proper transparency level by:
System’s self-tuning
A mobile user’s need & tolerance for proactivity (UNTP)
are likely to be closely related to his level of expertise on
a task & his familiarity with his environment
A system that can infer UNTP by observing user behavior
& context is better positioned to find the proper balance 57
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien
Pervasive Computing vs. Distributed Systems & Mobile Computing (51)
Drilling Down - The Difficult Problems (28)
4.7) [LTL:] Proactivity and Its Transparency [Paper: Balancing Proactivity and Transparency] – cont3
Historically, transparency (not just for proactivity) was the
ideal in system design
E.g., caching is attractive in distributed file systems because it
is completely transparent
Ironically, sometimes users are hurt/annoyed by
complete transparency
E.g., servicing a cache miss on a large file over a low-
bandwidth wireless network — so slow that most users would
rather be asked first by the system if they really need the file
However, too many questions from file system can annoy the
user
That is, again annoyed by too low level of transparency
A solution to this dilemma (suggested by Coda File System
[21])
On a cache miss, Coda consults an internally-maintained
suppressed)
Many subtle problems arise in designing a system that
walks the fine line between annoying visibility &
inscrutable (hard to understand) transparency 58
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien
Pervasive Computing vs. Distributed Systems & Mobile Computing (52)
Drilling Down - The Difficult Problems (29)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 59
Pervasive Computing vs. Distributed Systems & Mobile Computing (53)
Drilling Down - The Difficult Problems (30)
blackmail.
Potential for serious loss of privacy may deter
knowledgeable users from using a PERV system
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 60
Pervasive Computing vs. Distributed Systems & Mobile Computing (54)
Drilling Down - The Difficult Problems (31)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 61
Pervasive Computing vs. Distributed Systems & Mobile Computing (55)
Drilling Down - The Difficult Problems (32)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 62
Pervasive Computing vs. Distributed Systems & Mobile Computing (56)
Drilling Down - The Difficult Problems (33)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 63
Pervasive Computing vs. Distributed Systems & Mobile Computing (57)
Drilling Down - The Difficult Problems (34)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 64
Pervasive Computing vs. Distributed Systems & Mobile Computing (58)
Drilling Down - The Difficult Problems (35)
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 65
Pervasive Computing vs. Distributed Systems & Mobile Computing (59)
5. Conclusion
Pervasive computing will be a fertile source of
challenging research problems in computer systems
for many years to come
Solving these problems will require us:
To broaden our discourse on some topics, and
To revisit long-standing design assumptions in
others
To address research challenges in areas outside
computer systems, including:
Human-computer interaction
Esp. multi-modal interactions & human-centric h/w
designs
Software agents
Specific relevance to high-level proactive behavior
Expert systems and artificial intelligence
Esp. in the areas of decision making and planning
Capabilities from these areas will need to be
integrated with the PERV systems capabilities
Pervasive computing will thus be the crucible in which 66
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien
Pervasive Computing vs. Distributed Systems & Mobile Computing (60)
Conclusion – cont.
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 67
Pervasive Computing vs. Distributed Systems & Mobile Computing (61)
References
See the original paper:
M. Satyanarayanan, “Pervasive Computing: Vision
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, © 2007 by Leszek T. Lilien 68
End of Lecture 0:
Introduction to Pervasive
Computing