Specification and Verification of Complex Location Events with Panoramic

We present the design and evaluation of Panoramic, a tool that enables end-users to specify and verify an important family of complex location events. Our approach aims to reduce or eliminate critical barriers to deployment of emerging location-aware business activity monitoring applications in domains like hospitals and office buildings. Panoramic does not require users to write code, understand complex models, perform elaborate demonstrations, generate test location traces, or blindly trust deterministic events. Instead, it allows end-users to specify and edit complex events with a visual language that embodies natural concepts of space and time. It also takes a novel approach to verification, in which events are extracted from historical sensor data traces and then presented with intelligible, hierarchical visualizations that represent uncertainty with probabilities. We build on our existing software for specifying and detecting events while enhancing it in non-trivial ways to facilitate event specification and verification. Our design is guided by a formative study with 12 non-programmers. We also use location traces from a building-scale radio frequency identification (RFID) deployment in a qualitative evaluation of Panoramic with 10 non-programmers. The results show that end-users can both understand and verify the behavior of complex location event specifications using Panoramic.

[1]  Magdalena Balazinska,et al.  Longitudinal study of a building-scale RFID ecosystem , 2009, MobiSys '09.

[2]  Yang Li,et al.  Cascadia: A System for Specifying, Detecting, and Managing RFID Events , 2008, MobiSys '08.

[3]  Takeo Igarashi,et al.  Eyepatch: prototyping camera-based interaction through examples , 2007, UIST '07.

[4]  Anind K. Dey,et al.  a CAPpella: programming by demonstration of context-aware applications , 2004, CHI.

[5]  Jerry Alan Fails,et al.  A design tool for camera-based interaction , 2003, CHI '03.

[6]  Tessa Lau,et al.  Why PBD systems fail: Lessons learned for usable AI , 2008 .

[7]  Keith Cheverst,et al.  Exploring Issues of User Model Transparency and Proactive Behaviour in an Office Environment Control System , 2005, User Modeling and User-Adapted Interaction.

[8]  Anind K. Dey,et al.  Assessing demand for intelligibility in context-aware applications , 2009, UbiComp.

[9]  Christopher Ré,et al.  Challenges for Event Queries over Markovian Streams , 2008, IEEE Internet Computing.

[10]  Andreas Savvides,et al.  A sensory grammar for inferring behaviors in sensor networks , 2006, IPSN.

[11]  Joseph F. McCarthy,et al.  EVENTMANAGER: Support for the Peripheral Awareness of Events , 2000, HUC.

[12]  Christopher Ré,et al.  Event queries on correlated probabilistic streams , 2008, SIGMOD Conference.

[13]  Jason Pascoe,et al.  The stick-e note architecture: extending the interface beyond the user , 1997, IUI '97.

[14]  Jakob E. Bardram The Java Context Awareness Framework (JCAF) - A Service Infrastructure and Programming Framework for Context-Aware Applications , 2005, Pervasive.

[15]  Edward Cutrell,et al.  Viewing Personal Data Over Time , 2009 .

[16]  George Buchanan,et al.  An Evaluation of WebTwig - A Site Outliner for Handheld Web Access , 1999, HUC.

[17]  Timothy Sohn,et al.  iCAP: an informal tool for interactive prototyping of context-aware applications , 2003, CHI Extended Abstracts.

[18]  Leilani Battle,et al.  Building the Internet of Things Using RFID: The RFID Ecosystem Experience , 2009, IEEE Internet Computing.

[19]  Nigel Davies,et al.  UbiComp 2004: Ubiquitous Computing , 2004, Lecture Notes in Computer Science.

[20]  Jiun-Hung Chen,et al.  Recovering from errors during programming by demonstration , 2008, IUI '08.

[21]  Gregory D. Abowd,et al.  The context toolkit: aiding the development of context-enabled applications , 1999, CHI '99.

[22]  Jeffrey Heer,et al.  liquid: Context-Aware Distributed Queries , 2003, UbiComp.

[23]  Yang Li,et al.  Topiary: a tool for prototyping location-enhanced applications , 2004, UIST '04.

[24]  Judy Kay,et al.  PersonisAD: Distributed, Active, Scrutable Model Framework for Context-Aware Services , 2007, Pervasive.

[25]  W. Keith Edwards,et al.  Intelligibility and Accountability: Human Considerations in Context-Aware Systems , 2001, Hum. Comput. Interact..

[26]  Anind K. Dey,et al.  Support for context-aware intelligibility and control , 2009, CHI.

[27]  Uwe Hansmann,et al.  Pervasive Computing , 2003 .

[28]  Kamin Whitehouse,et al.  Automatic programming with semantic streams , 2005, ACM International Conference on Embedded Networked Sensor Systems.

[29]  Bill N. Schilit,et al.  An overview of the PARCTAB ubiquitous computing experiment , 1995, IEEE Wirel. Commun..

[30]  Christopher Olston,et al.  Generating example data for dataflow programs , 2009, SIGMOD Conference.

[31]  Mik Lamming,et al.  SPECx: Another Approach to Human Context and Activity Sensing Research, Using Tiny Peer-to-Peer Wireless Computers , 2003, UbiComp.

[32]  Anind K. Dey,et al.  UbiComp 2003: Ubiquitous Computing , 2003, Lecture Notes in Computer Science.

[33]  Magdalena Balazinska,et al.  Challenges for Pervasive RFID-Based Infrastructures , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[34]  Constantijn van Oranje-Nassau,et al.  Study on the requirements and options for RFID application in healthcare , 2009 .

[35]  Gregory D. Abowd,et al.  CAMP: A Magnetic Poetry Interface for End-User Programming of Capture Applications for the Home , 2004, UbiComp.

[36]  Daisy Zhe Wang,et al.  Probabilistic Data Management for Pervasive Computing: The Data Furnace Project , 2006, IEEE Data Eng. Bull..

[37]  Scott R. Klemmer,et al.  Authoring sensor-based interactions by demonstration with direct manipulation and pattern recognition , 2007, CHI.