{"title":"Introduction to Ubiquitous Computing","authors":"M. Mühlhäuser, Iryna Gurevych","doi":"10.4018/978-1-59904-832-1.CH001","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.CH001","url":null,"abstract":"The present chapter is intended as a lightweight introduction to ubiquitous computing as a whole, in preparation for the more specific book parts and chapters that cover selected aspects. This chapter thus assumes the preface of this book to be prior knowledge. In the following, a brief history of ubiquitous computing (UC) is given first, concentrating on selected facts considered as necessary background for understanding the rest of the book. Some terms and a few important standards are subsequently mentioned that are considered necessary for understanding related literature. For traditional standards like those widespread in the computer networks world, at least superficial knowledge must be assumed since their coverage is impractical for a field with such diverse roots as UC. In the last part of this chapter, we will discuss two kinds of reference architectures, explain why they are important for the furthering of Ubiquitous Computing and for the reader’s understanding, and briefly sketch a few of these architectures by way of example.","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124150988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business Grids","authors":"W. Gerteis","doi":"10.4018/9781599048321.ch029","DOIUrl":"https://doi.org/10.4018/9781599048321.ch029","url":null,"abstract":"","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115934499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Stiller, D. Hausheer, Jan Gerke, P. Rácz, C. Morariu, M. Waldburger
{"title":"Accounting and Charging","authors":"B. Stiller, D. Hausheer, Jan Gerke, P. Rácz, C. Morariu, M. Waldburger","doi":"10.4018/9781599048321.ch014","DOIUrl":"https://doi.org/10.4018/9781599048321.ch014","url":null,"abstract":"","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131252080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Adaptive Security for Ubiquitous Computing Systems","authors":"V. Lotz, L. Compagna, K. Wrona","doi":"10.4018/978-1-59904-832-1.ch027","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.ch027","url":null,"abstract":"","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121510587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multimodal Warehouse Project","authors":"Samir Raiyani, Matthias Winkler","doi":"10.4018/978-1-59904-832-1.CH028","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.CH028","url":null,"abstract":"In this chapter, we present the Multimodal Warehouse Project, which aimed at applying multimodal interaction to a warehouse picking process. We provide an overview of the warehouse picking procedure as well as the overall architecture of the multimodal picking application and technologies applied to design the application. Furthermore, we describe the execution of user tests of the picking application at a warehouse and present the results of these tests. In this way, the authors hope to provide the reader with a better understanding of how multimodal systems can be built and the opportunities as well as the challenges of applying multimodal technology to real-world application scenarios.","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128325301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adapting to the User","authors":"Matthias Jöst","doi":"10.4018/978-1-59904-832-1.CH013","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.CH013","url":null,"abstract":"Adaptation is one of the key requirements to handle the increasing complexity in today’s computing environments. This chapter focuses on the aspect of adaptation that puts the user into focus. In this context it introduces the different adaptation types possible for ubiquitous computing services like interaction, content, and presentation. To allow for an automatic adaptation it is important to get some means about the users. Basic requirements to model the users and approaches to personalize applications will be presented.","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127619607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent User Interfaces for Ubiquitous Computing","authors":"R. Malaka","doi":"10.4018/978-1-59904-832-1.CH020","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.CH020","url":null,"abstract":"Designing user interfaces for ubiquitous computing applications is a challenging task. In this chapter we discuss how to build intelligent interfaces. The foundations are usability criteria that are valid for all computer products. There are a number of established methods for the design process that can help to meet these goals. In particular participatory and iterative so-called human centered approaches are important for interfaces in ubiquitous computing. The question on how to make interfaces more intelligent is not trivial and there are multiple approaches to enhance either the intelligence of the system or that of the user. Novel interface approaches follow the idea of embodied interaction and put particular emphasis on the situated use of a system and the mental models humans develop in their real-world environment.","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116816486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context Models and Context Awareness","authors":"M. Hartmann, Gerhard Austaller","doi":"10.4018/978-1-59904-832-1.CH011","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.CH011","url":null,"abstract":"Humans use all kinds of information characterizing their current situation, like time, location and identity of persons nearby, to adapt their behavior to the situation and to make decisions. For example, when we speak to a person, we adapt what we say and how we say it to the social rank of the person (e.g., most people would not say “that’s nonsense” to their boss, but would to a friend). All this information is not easily captured, represented and processed by a computer. However, this information can help to build more user-friendly applications that adapt and respond to the user’s current situation. If the computer were aware of the user’s context and its interpretation, it would be able to make decisions on behalf of the user, anticipating user needs like another human would. For example, it would be possible to provide the user only with information relevant to the current situation and thus reduce the cognitive load. This is especially necessary in the area of ubiquitous computing (UC), where the user has to deal with a multitude of different computers, and thus with a multitude of possible distractions. To enable all these devices disappear into background, they have to anticipate the user’s future demands and adapt to the user’s context to reduce the amount of interaction needed. abstract","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124121395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security for Ubiquitous Computing","authors":"Tobias Straub, A. Heinemann","doi":"10.4018/978-1-59904-832-1.CH015","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.CH015","url":null,"abstract":"Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms. A background in IT security is not required as this chapter is self-contained. A brief introduction to the subject is given as well as an overview of cryptographic tools.","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131340034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Items in Real Time Enterprises","authors":"Zoltán Nochta","doi":"10.4018/978-1-59904-832-1.CH010","DOIUrl":"https://doi.org/10.4018/978-1-59904-832-1.CH010","url":null,"abstract":"As you may know, in today’s enterprises many business processes are supported by software systems. Just think of a system that automatically orders machine spare parts ensuring continuous production, and at the same time optimizes warehouse utilization and asset costs of the given company. Traditional enterprise software systems rely on manual collection of data. Since manual data collection is in many cases error prone (think of mistyped product codes, for example), software systems often do not have the correct information to take the best decisions in a given situation. Consequently, this has a negative effect on the quality of the business processes they implement. Examples are delayed order fulfillment, trouble with customers, increasing storage costs, or out of stock situations. When using UC technologies, this situation can be improved: UC technology may help the company capture the status of the enterprise more adequately, or even exactly in the ideal case, and represent in software systems what is happening in reality. abstract","PeriodicalId":443285,"journal":{"name":"Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134550713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}