Upload ITDataset.txt
Browse files- ITDataset.txt +342 -0
ITDataset.txt
ADDED
|
@@ -0,0 +1,342 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Challenges in Ubiquitous Data Management
|
| 2 |
+
Improved hardware and networking are clearly central to the development of
|
| 3 |
+
ubiquitous computing, but an equally important and difficult set of challenges revolve
|
| 4 |
+
around Data Management [AK93]. In order for computing to fade into the
|
| 5 |
+
background while supporting more and more activities, the data required to support
|
| 6 |
+
those activities must be reliably and efficiently stored, queried, and delivered.
|
| 7 |
+
Traditional approaches to data management such as caching, concurrency control,
|
| 8 |
+
query processing, etc. need to be adapted to the requirements and restrictions of
|
| 9 |
+
ubiquitous computing environments. These include resource limitations, varying and
|
| 10 |
+
intermittent connectivity, mobile users, and dynamic collaborations.
|
| 11 |
+
|
| 12 |
+
In this paper we first discuss the main characteristics of applications that
|
| 13 |
+
ubiquitous computing aims to support and then focus on the requirements that such
|
| 14 |
+
applications impose on data management technology. We then examine several
|
| 15 |
+
different aspects of data management and how they are being adapted to these new
|
| 16 |
+
requirements.
|
| 17 |
+
|
| 18 |
+
Applications and Data Management Requirements
|
| 19 |
+
|
| 20 |
+
While there is wide agreement on the great potential of ubiquitous computing, it is not
|
| 21 |
+
yet clear what the killer applications (i.e., the uses that will result in widespread
|
| 22 |
+
adoption) will be. Many researchers and product developers have created example
|
| 23 |
+
scenarios to demonstrate the potential of the technology. Due to the integrated and
|
| 24 |
+
universal nature of ubiquitous computing, these scenarios tend to include a large
|
| 25 |
+
number of functions rather than any one single application. Thus, some in industry
|
| 26 |
+
have begun to talk in terms of delivering a certain type of user experience rather
|
| 27 |
+
than a particular application or suite of applications. These scenarios tend to involve
|
| 28 |
+
users with several portable devices, moving between different environments (e.g.,
|
| 29 |
+
home, car, office, conference). The devices typically take an active (and often
|
| 30 |
+
annoying) role in reminding the user of various appointments and tasks that are due,
|
| 31 |
+
provide access to any and all information that may be relevant to these tasks, and
|
| 32 |
+
facilitate communication among groups of individuals involved in the tasks.
|
| 33 |
+
|
| 34 |
+
Categories of Functionality
|
| 35 |
+
|
| 36 |
+
Rather than specify yet another such scenario, it is perhaps more useful to categorize
|
| 37 |
+
the functionalities that such scenarios imply. This categorization can then be
|
| 38 |
+
examined to determine the requirements that are imposed on data management. The
|
| 39 |
+
functionalities can be classified into the following:
|
| 40 |
+
|
| 41 |
+
1) Support for mobility the compactness of the devices combined with
|
| 42 |
+
wireless communication means that the devices can be used in mobile
|
| 43 |
+
situations. Thus, existing applications must be able to operate in varied
|
| 44 |
+
and dynamic communication and computation environments, possibly moving from one network or service provider to another. Furthermore,
|
| 45 |
+
new applications that are location-centric will also be developed.
|
| 46 |
+
|
| 47 |
+
2) Context awareness if devices become truly ubiquitous, then they will
|
| 48 |
+
be used constantly in a wide range of continually changing situations.
|
| 49 |
+
For the devices to be truly helpful, they must be aware of the
|
| 50 |
+
environment as well as the tasks that the user is performing or will be
|
| 51 |
+
performing in the near future. Context aware applications range from
|
| 52 |
+
intelligent notification systems that inform the user of (hopefully)
|
| 53 |
+
important events or data, to smart spaces , that is, rooms or
|
| 54 |
+
environments that adapt based on who is present and what they are
|
| 55 |
+
doing.
|
| 56 |
+
|
| 57 |
+
3) Support for collaboration another key theme of ubiquitous computing
|
| 58 |
+
applications is the support of groups of people. This support consists of
|
| 59 |
+
communications and conferencing as well as the storage, maintenance,
|
| 60 |
+
delivery, and presentation of shared data. Collaborations may be
|
| 61 |
+
performed in real-time, if all of the participants are available, or may be
|
| 62 |
+
done asynchronously otherwise. In addition to supporting on-going
|
| 63 |
+
collaboration, access to and analysis of traces of past activities is also
|
| 64 |
+
required.
|
| 65 |
+
|
| 66 |
+
Adaptivity and User Interaction
|
| 67 |
+
|
| 68 |
+
These functionalities provide a host of challenges for data management techniques,
|
| 69 |
+
but one requirement is present across all of them, namely, the need for adaptivity.
|
| 70 |
+
Mobile users and devices, changing contexts, and dynamic groups all impose
|
| 71 |
+
requirements for flexibility and responsiveness that are simply not addressed by most
|
| 72 |
+
traditional data management techniques. Thus, adaptivity is a common theme of the
|
| 73 |
+
techniques that we discuss in the remainder of the paper.
|
| 74 |
+
|
| 75 |
+
It is also important to note that because ubiquitous computing is intended to
|
| 76 |
+
augment human capabilities in the execution of various tasks, the nature of these
|
| 77 |
+
applications is that the user is typically interacting in real-time with the computers.
|
| 78 |
+
We are able to exploit this fact as part of the solution to adaptivity by, in some cases,
|
| 79 |
+
depending on the users to make dynamic choices or to cope with some degree of
|
| 80 |
+
ambiguity. A concrete example of such a design choice is the way that many
|
| 81 |
+
groupware systems handle concurrent access and update to shared data. Rather than
|
| 82 |
+
impose rules that restrict the types and degrees of interaction that users can have, as is
|
| 83 |
+
done by concurrency control mechanisms in traditional database systems, a
|
| 84 |
+
groupware data manager will typically impose less stringent rules. The relaxation of
|
| 85 |
+
these rules limits the extent to which the system can autonomously handle conflicts.
|
| 86 |
+
Thus, such systems typically handle whatever cases they can, and when they detect a
|
| 87 |
+
conflict that cannot be handled automatically, they simply inform the user(s) that the
|
| 88 |
+
conflict has occurred, and allow them to resolve it based on their knowledge of the
|
| 89 |
+
situation. Thus, having users in the loop can be leveraged to provide more adaptive
|
| 90 |
+
and flexible systems.
|
| 91 |
+
|
| 92 |
+
Challenges in Ubiquitous Data Management
|
| 93 |
+
|
| 94 |
+
Requirements Due to Mobility
|
| 95 |
+
|
| 96 |
+
Other data management requirements are less universal across the three categories but
|
| 97 |
+
yet must be addressed in order to support a comprehensive ubiquitous computing
|
| 98 |
+
environment. For example, the issue of mobility raises a number of issues. First, the
|
| 99 |
+
fact that the terminals (i.e. devices) are constantly moving, and often have limited
|
| 100 |
+
storage capacity means that a ubiquitous computing system must be able to deliver
|
| 101 |
+
data to and receive data from different and changing locations. This results in the
|
| 102 |
+
need for various kinds of proxy solutions, where users are handed off from one proxy
|
| 103 |
+
to another as they move. Protocols must be constructed in such a way as to be able to
|
| 104 |
+
tolerate such handoffs without breaking. Mobility also raises the need for intelligent
|
| 105 |
+
data staging and pre-staging, so that data can be placed close to where the users will
|
| 106 |
+
be when they need it (particularly in slow or unreliable communications situations).
|
| 107 |
+
|
| 108 |
+
Secondly, mobility adds location as a new dimension to applications that does not
|
| 109 |
+
typically play a role in stationary scenarios. For example, some of the most useful
|
| 110 |
+
applications for mobile devices are location-centric. Consider a system that can
|
| 111 |
+
answer questions such as find the drugstores within 2 miles of my current location .
|
| 112 |
+
Such a system must track the location of the current user and be able to access
|
| 113 |
+
information based on relative locations and distances. On a broader scale, servers
|
| 114 |
+
may have to track large numbers of moving objects (people, cars, devices, etc.) and be
|
| 115 |
+
able to predict their future locations. For example, an automated traffic control
|
| 116 |
+
system would have to track numerous cars, including their current positions,
|
| 117 |
+
directions, and velocities. Location-centric computing requires special data structures
|
| 118 |
+
in which location information can be encoded and efficiently stored, as well as ones in
|
| 119 |
+
which the dynamic positions of objects can be maintained.
|
| 120 |
+
|
| 121 |
+
Requirements Due to Context-Awareness
|
| 122 |
+
|
| 123 |
+
Context-awareness imposes significant demands on the knowledge maintained by the
|
| 124 |
+
system and the inferencing algorithms that use that knowledge. In order to be context
|
| 125 |
+
aware, a system must maintain an internal representation of users needs, roles, and
|
| 126 |
+
preferences, etc. One example of such a system is a smart calendar that routes
|
| 127 |
+
information to a user based on knowledge of the user s near-term schedule (as can be
|
| 128 |
+
determined from the user s PIM calendar). If, for example, a user has a meeting with
|
| 129 |
+
a particular client scheduled for the afternoon, such a system could send the user
|
| 130 |
+
information that would be highly relevant to that meeting, such as data about the
|
| 131 |
+
client s account, results of previous meetings with that client, news articles relevant to
|
| 132 |
+
the topic of the meeting, etc.
|
| 133 |
+
|
| 134 |
+
More sophisticated systems might use various types of sensors to monitor the
|
| 135 |
+
environment and track users actions so as to be able to assist in the tasks the user is
|
| 136 |
+
performing. Such sensor-based systems require the ability to process data streams in
|
| 137 |
+
real-time and to analyze and interpret such streams. Thus, data-flow processing will
|
| 138 |
+
play a key role in ubiquitous computing.
|
| 139 |
+
|
| 140 |
+
Whether the system obtains its context information from sensors, user input, PIM
|
| 141 |
+
(personal information management) applications, or some combination of these, it
|
| 142 |
+
must perform a good deal of processing over the data in order to be able to accurately
|
| 143 |
+
assess the state of the environment and the intensions of the user. Thus, context-
|
| 144 |
+
aware applications impose demanding requirements for inferencing and machine
|
| 145 |
+
learning techniques. These processes will have to cope with incomplete and
|
| 146 |
+
conflicting data, and will have to do so extremely efficiently in order to be able to
|
| 147 |
+
interact with the user in a useful and unobtrusive manner.
|
| 148 |
+
|
| 149 |
+
Requirements Due to Collaboration
|
| 150 |
+
|
| 151 |
+
The final set of requirements we discuss here are those that result from the need to
|
| 152 |
+
support collaborative work by dynamic and sometimes ad hoc groups of people. As
|
| 153 |
+
stated above, a prime requirement that stems from such applications is adaptivity. In
|
| 154 |
+
addition, however, there are several other types of support that are required beyond
|
| 155 |
+
what has already been discussed. First, there is a need for synchronization and
|
| 156 |
+
consistency support. At the center of any collaborative application is a set of shared
|
| 157 |
+
data items that ean be created, accessed, modified, and deleted by participants of the
|
| 158 |
+
collaboration. This coordination function must be lightweight and flexible so that
|
| 159 |
+
many different types of interactions can be supported, ranging from unmoderated chat
|
| 160 |
+
facilities, to full ACID (Atomic, Consistent, Isolated, and Durable) transactions, as
|
| 161 |
+
provided by traditional database systems.
|
| 162 |
+
|
| 163 |
+
A second requirement stemming from collaborative applications is the need for
|
| 164 |
+
reliable and available storage of history. In particular, if the collaboration is to be
|
| 165 |
+
performed in an asynchronous manner, users must be able to access a record of what
|
| 166 |
+
has happened earlier in the collaboration. Likewise, if the participants in the
|
| 167 |
+
collaboration can change over time (e.g., due to mobility, failures, or simply due to
|
| 168 |
+
the nature of the collaboration), then a durable record of participants and their actions
|
| 169 |
+
is essential to allow new members to join and come up to speed. Such durable storage
|
| 170 |
+
is also useful for keeping a log of activity, that can be used later to trace through the
|
| 171 |
+
causes of various outcomes of the collaboration, or as input into learning and data
|
| 172 |
+
mining algorithms whieh may help optimize future collaborations.
|
| 173 |
+
|
| 174 |
+
Example Data Management Technologies n On-Going Projects
|
| 175 |
+
|
| 176 |
+
The preceding discussion addressed some of the data management challenges that
|
| 177 |
+
must be addressed to support ubiquitous computing scenarios and outlined the
|
| 178 |
+
application properties from which they arise. In this section, we briefly describe two
|
| 179 |
+
on going projects that are addressing some of these aspects. The first project, called
|
| 180 |
+
Data Recharging, exploits user interest and preference information to deliver data
|
| 181 |
+
updates and other relevant items to users on their portable devices. The second
|
| 182 |
+
project, called Telegraph, is building an adaptive data-flow processing architecture to
|
| 183 |
+
process long-running queries over variable streams of data, as would arise in sensor-
|
| 184 |
+
based and other highly dynamic data environments.
|
| 185 |
+
|
| 186 |
+
Challenges in Ubiquitous Data Management
|
| 187 |
+
|
| 188 |
+
Data Recharging: Profile-Based Data Dissemination and Synchronization
|
| 189 |
+
|
| 190 |
+
Mobile devices require two key resources to function: power and data. The mobile
|
| 191 |
+
nature of such devices combined with limitations of size and cost makes it impractical
|
| 192 |
+
to keep them continually connected to the fixed power and data (i.e., the Internet)
|
| 193 |
+
grids. Mobile devices cope with disconnection from these grids by "caching".
|
| 194 |
+
Devices use rechargeable batteries for caching power, while local storage is used for
|
| 195 |
+
caching data. Periodically, the device-local local resources must be "recharged" by
|
| 196 |
+
connecting with the fixed power and data grids. With existing technology, however,
|
| 197 |
+
the process of recharging the device resident data is much more cumbersome and
|
| 198 |
+
error-prone than recharging the power. Power recharging can be done virtually
|
| 199 |
+
anywhere in the world, requires little user involvement, and works progressively -
|
| 200 |
+
the longer the device is recharged, the better the device-stored power becomes. In
|
| 201 |
+
contrast, data "recharging" has none of these attributes.
|
| 202 |
+
|
| 203 |
+
The Data Recharging project is developing a service and corresponding
|
| 204 |
+
infrastructure that permits a mobile device of any kind to plug into the Internet at any
|
| 205 |
+
location for any amount of time and as a result, end up with more useful data than it
|
| 206 |
+
had before [CFZOO]. As with power recharging, the initiation of a data charge simply
|
| 207 |
+
requires "plugging in" a device to the network. The longer the device is left plugged
|
| 208 |
+
in, the more effective the charge. Although similar to battery recharging, data
|
| 209 |
+
recharging is more complex; the type and amount of data delivered during a data
|
| 210 |
+
charge must be tailored to the needs of the user, the capabilities of the recharged
|
| 211 |
+
device, and the tasks that the recharged data is needed to support.
|
| 212 |
+
|
| 213 |
+
Different mobile users will have different data needs. A business traveler may
|
| 214 |
+
want updates of contact information, restaurant reviews and hotel pricing guides
|
| 215 |
+
specific to a travel destination. Students may require access to recent course notes,
|
| 216 |
+
required readings for the next lecture and notification about lab space as it becomes
|
| 217 |
+
available. Data recharging represents specifications of user needs as profiles.
|
| 218 |
+
Profiles can be thought of as long-running queries that continually sift through the
|
| 219 |
+
available data to find relevant items and determine their value to the user.
|
| 220 |
+
|
| 221 |
+
Profiles for data recharging contain three types of information: First, the profile
|
| 222 |
+
describes the types of data that are of interest to the user. This description must be
|
| 223 |
+
declarative in nature, so that it can encompass newly created data in addition to
|
| 224 |
+
existing data. The description must also be flexible enough to express predicates
|
| 225 |
+
over different types of data and media. Second, because of limitations on bandwidth,
|
| 226 |
+
device-local storage, and recharging time, only a bounded amount of information can
|
| 227 |
+
be sent to a device during data recharging. Thus, the profile must also express the
|
| 228 |
+
user s preferences in terms of priorities among data items, desired resolutions of
|
| 229 |
+
multi-resolution items, consistency requirements, and other properties. Finally, user
|
| 230 |
+
context can be dynamically incorporated into the recharging process by
|
| 231 |
+
parameterizing the user profile with information obtained from the device-resident
|
| 232 |
+
Personal Information Management (PIM) applications such as the calendar, contact
|
| 233 |
+
list, and To Do list.
|
| 234 |
+
|
| 235 |
+
Our previous work on user profiles has focused on 1) efficiently processing
|
| 236 |
+
profiles over streams of XML documents (i.e., the XFilter system) [AFOO], 2)
|
| 237 |
+
learning and maintaining user profiles based on explicit user feedback [CFGOO], and
|
| 238 |
+
3) development of a large-scale, reliable system for mobile device synchronization
|
| 239 |
+
[DFOO]. Data recharging can build upon this work, but requires the further
|
| 240 |
+
development of a suitable language and processing strategy for highly expressive user
|
| 241 |
+
profiles (i.e., that include user preference and contextual information), and the
|
| 242 |
+
development of a scalable, wide-area architecture that is capable of providing a data
|
| 243 |
+
recharging service on a global basis to potentially millions of users.
|
| 244 |
+
|
| 245 |
+
Adaptive Dataflow Query Processing
|
| 246 |
+
|
| 247 |
+
A second important aspect of ubiquitous computing environments is the variable
|
| 248 |
+
nature of data availability and the challenges of managing and processing dynamic
|
| 249 |
+
data flows. In mobile applications for example, data can move throughout the system
|
| 250 |
+
in order to follow the users who need it. Conversely, in mobile applications where
|
| 251 |
+
the data is being created at the endpoints (say, for example, a remote sensing
|
| 252 |
+
application) data streams into the system in an erratic fashion to be processed, stored,
|
| 253 |
+
and possibly acted upon by agents residing in the network. Information flows also
|
| 254 |
+
arise in other applications, such as data dissemination systems in whieh streams of
|
| 255 |
+
newly created and modified data must be routed to users and shared caches.
|
| 256 |
+
|
| 257 |
+
Traditional database query processing systems break down in such environments
|
| 258 |
+
for a number of reasons: First, they are based on static approaches to query
|
| 259 |
+
|
| 260 |
+
optimization and planning. Database systems produce query plans using simple cost
|
| 261 |
+
models and statistics about the data to estimate the cost of running particular plans.
|
| 262 |
+
In a dynamic dataflow environment, this approach simply does not work because
|
| 263 |
+
there are typically no reliable statistics about the data and because the arrival rates,
|
| 264 |
+
order, and behavior of the data streams are too unpredictable [UFA98].
|
| 265 |
+
|
| 266 |
+
Second, the exisiting approaches cannot adequately cope with failures that arise
|
| 267 |
+
during the processing of a query. In current database systems, if the failure of a data
|
| 268 |
+
source goes undetected, the query processor simply blocks, waiting for the data to
|
| 269 |
+
arrive. If a failure is detected, then a query is simply aborted and restarted. Neither
|
| 270 |
+
of these situations is appropriate in a ubiquitous computing environment in which
|
| 271 |
+
sources and streams behave unpredictably, and queries can be extremely long-running
|
| 272 |
+
(perhaps even continuous ).
|
| 273 |
+
|
| 274 |
+
Third, existing approaches are optimized for a batch style of processing in which
|
| 275 |
+
the goal is to deliver an entire answer (i.e., they are optimized for the delivery of the
|
| 276 |
+
last result). In a ubiquitous computing environment, where users will be interacting
|
| 277 |
+
with the system in a fine-grained fashion, such approaches are unacceptable.
|
| 278 |
+
Processed data (e.g., query results, event notifications, etc.) must be passed on to the
|
| 279 |
+
user as soon as they are available. Furthermore, because the system is interactive, a
|
| 280 |
+
user may choose to modify the query on the basis of previously returned information
|
| 281 |
+
or other factors. Thus, the system must be able to gracefully adjust to changes in the
|
| 282 |
+
needs of the users [HACO-i-99].
|
| 283 |
+
|
| 284 |
+
The Telegraph project at UC Berkeley [HFCD-l-00] is investigating these issues
|
| 285 |
+
through the development of an adaptive dataflow processing engine. Telegraph uses a
|
| 286 |
+
novel approach to query execution based on eddies , which are dataflow control
|
| 287 |
+
structures that route data to query operators on an item-by-item basis [AHOO].
|
| 288 |
+
Telegraph does not rely upon a traditional query plan, but rather, allows the plan to
|
| 289 |
+
develop and adapt during the execution. For queries over continuous streams of data.
|
| 290 |
+
the system can continually adapt to changes in the data arrival rates, data
|
| 291 |
+
characteristics, and the availability of processing, storage, and communication
|
| 292 |
+
resources.
|
| 293 |
+
|
| 294 |
+
In addition to novel control structures. Telegraph also employs non-blocking,
|
| 295 |
+
symmetric query processing operators, such as XJoins [UFOO] and Ripple Joins
|
| 296 |
+
[HH99], which can cope with changing and unpredictable arrival of their input data.
|
| 297 |
+
The challenges being addressed in the Telegraph project include the development of
|
| 298 |
+
cluster-based and wide-area implementations of the processing engine, the design of
|
| 299 |
+
fault-tolerance mechanisms (particularly for long-running queries), support for
|
| 300 |
+
continuous queries over sensor data and for profile-based information dissemination,
|
| 301 |
+
and user interface issues.
|
| 302 |
+
|
| 303 |
+
Conclusions
|
| 304 |
+
|
| 305 |
+
Ubiquitous computing is a compelling vision for the future that is moving closer to
|
| 306 |
+
realization at an accelerating pace. The combination of global wireless and wired
|
| 307 |
+
connectivity along with increasingly small and powerful devices enables a wide array
|
| 308 |
+
of new applications that will change the nature of computing. Beyond new devices
|
| 309 |
+
and communications mechanisms, however, the key technology that is required to
|
| 310 |
+
make ubiquitous computing a reality is data management. Data lies at the heart of all
|
| 311 |
+
ubiquitous computing applications, but these applications and environments impose
|
| 312 |
+
new and challenging requirements for data management technology.
|
| 313 |
+
|
| 314 |
+
In this short paper, I have tried to outline the key aspects of ubiquitous computing
|
| 315 |
+
from a data management perspective. These aspects were organized into three
|
| 316 |
+
categories: 1) support for mobility, 2) context-awareness, and 3) support for
|
| 317 |
+
collaboration. I then examined each of these to determine a set of requirements that
|
| 318 |
+
they impose on data management. The over-riding issue that stems from all of these
|
| 319 |
+
is the need for adaptivity. Thus, traditional data management techniques, which tend
|
| 320 |
+
to be static and fairly rigid, must be rethought in light of this emerging computing
|
| 321 |
+
environment.
|
| 322 |
+
|
| 323 |
+
I also described two on-going projects that are re-examining key aspects of data
|
| 324 |
+
management techniques: the DataRecharging project, which aims to provide data
|
| 325 |
+
synchronization and dissemination of highly relevant data for mobile users based on
|
| 326 |
+
the processing of sophisticated user profiles; and the Telegraph project, which is
|
| 327 |
+
developing a dynamic dataflow processing engine to efficiently and adaptively
|
| 328 |
+
process streams of data from a host of sources ranging from web sources to networks
|
| 329 |
+
of sensors.
|
| 330 |
+
|
| 331 |
+
Of course, there are a number of very important data management issues that have
|
| 332 |
+
not been touched upon in this short paper. First of all, the ability to interoperate
|
| 333 |
+
among multiple applications and types of data will depend on standards for data-
|
| 334 |
+
interchange, resource discovery, and inter-object communication. Great strides are
|
| 335 |
+
being made in these areas, and the research issues are only a small part of the effort
|
| 336 |
+
involved in the standardization process. Another important area, in which on-going
|
| 337 |
+
research plays a central role, is the development of global-scale, secure and archival
|
| 338 |
+
information storage utilities. An example of such a system is the OceanStore utility,
|
| 339 |
+
currently under development at UC Berkeley [KBCC+00].
|
| 340 |
+
|
| 341 |
+
|
| 342 |
+
|