What makes for good application- led research in ubiquitous computing?

This position paper presents a vision of Pervasive Computing as a complex and user-centric research and development object. Emphasis is put on an “augmented emulation” as a core toolkit for development and assessment of future work and we will place our proposal in the frame of some tools and work that we have undergone. We believe that developing a use-case/scenario methodology on top of this toolkit will allow evaluation of the developed technologies by using a combination of real products, prototype softwares, emulated softwares, hardware and environment in interaction with real users or agents. Those scenarios are ways of describing application needs. The refinement of elements of those large-scale real-time augmented simulations should rely on standard metric (domain specific) and user-related metrics, and will lead to more refined scenarios in a global process.

[1]  Bernt Schiele,et al.  Design, Implementation and Testing of a Wearable Sensing System for Professional Downhill Skiing in Cooperation with Trainers , 2005 .

[2]  Frederick P. Brooks The Mythical Man-Month: After 20 years , 1995, IEEE Software.

[3]  Andrew L. Kun,et al.  Computers in police cruisers , 2004, IEEE Pervasive Computing.

[4]  Anind K. Dey,et al.  Heuristic evaluation of ambient displays , 2003, CHI '03.

[5]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[6]  Jesper Kjeldskov,et al.  Is It Worth the Hassle? Exploring the Added Value of Evaluating the Usability of Context-Aware Mobile Systems in the Field , 2004, Mobile HCI.

[7]  Susan R. Fussell,et al.  The book as user interface: lowering the entry cost to email for elders , 2005, CHI EA '05.

[8]  Anoop K. Sinha,et al.  Suede: a Wizard of Oz prototyping tool for speech user interfaces , 2000, UIST '00.

[9]  Gregory D. Abowd,et al.  The context toolkit: aiding the development of context-enabled applications , 1999, CHI '99.

[10]  Gordon S. Blair,et al.  Developing a Context Sensitive Tourist Guide , 1998 .

[11]  Anoop K. Sinha,et al.  Multimodal theater: extending low fidelity paper prototyping to multimodal applications , 2002, CHI Extended Abstracts.

[12]  A Sattineni,et al.  A Case Study: Using the Wearable Computer in the Construction Industry , 2002 .

[13]  Hiroshi Ishii,et al.  The metaDESK: models and prototypes for tangible user interfaces , 1997, UIST '97.

[14]  Morten Kyng,et al.  Design at Work , 1992 .

[15]  Laurent Ciarletta,et al.  Using Intelligent Agents to assess Pervasive Computing Technologies , 2001 .

[16]  Karen Holtzblatt,et al.  Contextual design , 1997, INTR.

[17]  Keith Cheverst,et al.  Developing a context-aware electronic tourist guide: some issues and experiences , 2000, CHI.

[18]  David Garlan,et al.  Project Aura: Toward Distraction-Free Pervasive Computing , 2002, IEEE Pervasive Comput..

[19]  Christian Heath,et al.  Mobility in collaboration , 1998, CSCW '98.

[20]  Mark Weiser,et al.  Designing Calm Technology , 2004 .

[21]  Mark Weiser How computers will be used differently in the next twenty years , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[22]  David R. Karger,et al.  Wide-area cooperative storage with CFS , 2001, SOSP.

[23]  Richard Sharp,et al.  Using visual tags to bypass Bluetooth device discovery , 2005, MOCO.

[24]  Keith Cheverst,et al.  Experiences of developing and deploying a context-aware tourist guide: the GUIDE project , 2000, MobiCom '00.

[25]  David Garlan,et al.  Toward Distraction-Free Pervasive Computing , 2002 .

[26]  Barry W. Boehm,et al.  A spiral model of software development and enhancement , 1986, Computer.

[27]  Sean W. Smith,et al.  Grand challenges in information security: process and output , 2004, IEEE Security & Privacy Magazine.

[28]  Albrecht Schmidt,et al.  Applying wearable sensors to avalanche rescue , 2003, Comput. Graph..

[29]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[30]  Stefan Axelsson,et al.  Intrusion Detection Systems: A Survey and Taxonomy , 2002 .

[31]  Golden G. Richard,et al.  Physically Locating Wireless Intruders , 2004, ITCC.

[32]  Jakob E. Bardram,et al.  Applications of context-aware computing in hospital work: examples and design principles , 2004, SAC '04.

[33]  R. Ascherl,et al.  Rapid Prototyping , 1997, IEEE Robotics & Automation Magazine.

[34]  John J. Barton,et al.  UBIWISE, A Simulator for Ubiquitous Computing Systems Design , 2003 .

[35]  Yang Li,et al.  Topiary: a tool for prototyping location-enhanced applications , 2004, UIST '04.

[36]  I. Lakatos History of Science and Its Rational Reconstructions , 1970, PSA: Proceedings of the Biennial Meeting of the Philosophy of Science Association.

[37]  Arne Jönsson,et al.  Wizard of Oz studies: why and how , 1993, IUI '93.

[38]  Tim Kindberg Implementing physical hyperlinks using ubiquitous identifier resolution , 2002, WWW '02.

[39]  Fan Yang,et al.  Conventions in human-human multi-threaded dialogues: a preliminary study , 2005, IUI '05.

[40]  Egon Börger,et al.  The ASM Ground Model Method as a Foundation for Requirements Engineering , 2003, Verification: Theory and Practice.

[41]  Sharon L. Oviatt,et al.  A rapid semi-automatic simulation technique for investigating interactive speech and handwriting , 1992, ICSLP.

[42]  Gregory D. Abowd,et al.  Rapid prototyping of mobile context-aware applications: the Cyberguide case study , 1996, MobiCom '96.

[43]  Bill N. Schilit,et al.  Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.

[44]  Christine Reid,et al.  The Myth of the Paperless Office , 2003, J. Documentation.

[45]  M. A. Smith,et al.  Object auras: a mobile retail and product annotation system , 2004, EC '04.

[46]  Andy Hopper,et al.  A new location technique for the active office , 1997, IEEE Wirel. Commun..

[47]  Albrecht Schmidt,et al.  Building intelligent environments with Smart-Its , 2004, IEEE Computer Graphics and Applications.

[48]  Kent L. Beck,et al.  Extreme programming explained - embrace change , 1990 .

[49]  Allen Newell,et al.  The psychology of human-computer interaction , 1983 .

[50]  Jakob Nielsen,et al.  User involvement in the design process: why, when & how? , 1993, INTERCHI.

[51]  James A. Landay,et al.  An Infrastructure Approach to Context-Aware Computing , 2001, Hum. Comput. Interact..

[52]  Fredrik Espinoza,et al.  GeoNotes: Social and Navigational Aspects of Location-Based Information Systems , 2001, UbiComp.

[53]  Scott R. Klemmer,et al.  Papier-Mache: toolkit support for tangible input , 2004, CHI.

[54]  Gregory D. Abowd,et al.  The Aware Home: A Living Laboratory for Ubiquitous Computing Research , 1999, CoBuild.

[55]  Bing Jiang,et al.  I Sense a Disturbance in the Force: Unobtrusive Detection of Interactions with RFID-tagged Objects , 2004, UbiComp.

[56]  Philip Robinson,et al.  Privacy, Security and Trust within the Context of Pervasive Computing (The Kluwer International Series in Engineering and Computer Science) , 2004 .

[57]  Philip Robinson,et al.  Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments , 2003, SPC.

[58]  Armando Fox,et al.  System Software for Ubiquitous Computing , 2022 .

[59]  Bill N. Schilit,et al.  The Parctab Ubiquitous Computing Experiment , 1994, Mobidata.

[60]  John Krumm,et al.  The NearMe Wireless Proximity Server , 2004, UbiComp.

[61]  Roy Want,et al.  The Personal Server: Changing the Way We Think about Ubiquitous Computing , 2002, UbiComp.

[62]  Nigel Davies,et al.  Evaluating a location-based application: a hybrid test and simulation environment , 2004, IEEE Pervasive Computing.

[63]  Konrad Tollmar,et al.  Activity Zones for Context-Aware Computing , 2003, UbiComp.

[64]  Gregory D. Abowd,et al.  Securing context-aware applications using environment roles , 2001, SACMAT '01.

[65]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[66]  Bill N. Schilit,et al.  Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.

[67]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.