zuh commited on
Commit
4bd704f
·
verified ·
1 Parent(s): b0fb100

Upload ITDataset.txt

Browse files
Files changed (1) hide show
  1. ITDataset.txt +342 -0
ITDataset.txt ADDED
@@ -0,0 +1,342 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Challenges in Ubiquitous Data Management
2
+ Improved hardware and networking are clearly central to the development of
3
+ ubiquitous computing, but an equally important and difficult set of challenges revolve
4
+ around Data Management [AK93]. In order for computing to fade into the
5
+ background while supporting more and more activities, the data required to support
6
+ those activities must be reliably and efficiently stored, queried, and delivered.
7
+ Traditional approaches to data management such as caching, concurrency control,
8
+ query processing, etc. need to be adapted to the requirements and restrictions of
9
+ ubiquitous computing environments. These include resource limitations, varying and
10
+ intermittent connectivity, mobile users, and dynamic collaborations.
11
+
12
+ In this paper we first discuss the main characteristics of applications that
13
+ ubiquitous computing aims to support and then focus on the requirements that such
14
+ applications impose on data management technology. We then examine several
15
+ different aspects of data management and how they are being adapted to these new
16
+ requirements.
17
+
18
+ Applications and Data Management Requirements
19
+
20
+ While there is wide agreement on the great potential of ubiquitous computing, it is not
21
+ yet clear what the killer applications (i.e., the uses that will result in widespread
22
+ adoption) will be. Many researchers and product developers have created example
23
+ scenarios to demonstrate the potential of the technology. Due to the integrated and
24
+ universal nature of ubiquitous computing, these scenarios tend to include a large
25
+ number of functions rather than any one single application. Thus, some in industry
26
+ have begun to talk in terms of delivering a certain type of user experience rather
27
+ than a particular application or suite of applications. These scenarios tend to involve
28
+ users with several portable devices, moving between different environments (e.g.,
29
+ home, car, office, conference). The devices typically take an active (and often
30
+ annoying) role in reminding the user of various appointments and tasks that are due,
31
+ provide access to any and all information that may be relevant to these tasks, and
32
+ facilitate communication among groups of individuals involved in the tasks.
33
+
34
+ Categories of Functionality
35
+
36
+ Rather than specify yet another such scenario, it is perhaps more useful to categorize
37
+ the functionalities that such scenarios imply. This categorization can then be
38
+ examined to determine the requirements that are imposed on data management. The
39
+ functionalities can be classified into the following:
40
+
41
+ 1) Support for mobility the compactness of the devices combined with
42
+ wireless communication means that the devices can be used in mobile
43
+ situations. Thus, existing applications must be able to operate in varied
44
+ and dynamic communication and computation environments, possibly moving from one network or service provider to another. Furthermore,
45
+ new applications that are location-centric will also be developed.
46
+
47
+ 2) Context awareness if devices become truly ubiquitous, then they will
48
+ be used constantly in a wide range of continually changing situations.
49
+ For the devices to be truly helpful, they must be aware of the
50
+ environment as well as the tasks that the user is performing or will be
51
+ performing in the near future. Context aware applications range from
52
+ intelligent notification systems that inform the user of (hopefully)
53
+ important events or data, to smart spaces , that is, rooms or
54
+ environments that adapt based on who is present and what they are
55
+ doing.
56
+
57
+ 3) Support for collaboration another key theme of ubiquitous computing
58
+ applications is the support of groups of people. This support consists of
59
+ communications and conferencing as well as the storage, maintenance,
60
+ delivery, and presentation of shared data. Collaborations may be
61
+ performed in real-time, if all of the participants are available, or may be
62
+ done asynchronously otherwise. In addition to supporting on-going
63
+ collaboration, access to and analysis of traces of past activities is also
64
+ required.
65
+
66
+ Adaptivity and User Interaction
67
+
68
+ These functionalities provide a host of challenges for data management techniques,
69
+ but one requirement is present across all of them, namely, the need for adaptivity.
70
+ Mobile users and devices, changing contexts, and dynamic groups all impose
71
+ requirements for flexibility and responsiveness that are simply not addressed by most
72
+ traditional data management techniques. Thus, adaptivity is a common theme of the
73
+ techniques that we discuss in the remainder of the paper.
74
+
75
+ It is also important to note that because ubiquitous computing is intended to
76
+ augment human capabilities in the execution of various tasks, the nature of these
77
+ applications is that the user is typically interacting in real-time with the computers.
78
+ We are able to exploit this fact as part of the solution to adaptivity by, in some cases,
79
+ depending on the users to make dynamic choices or to cope with some degree of
80
+ ambiguity. A concrete example of such a design choice is the way that many
81
+ groupware systems handle concurrent access and update to shared data. Rather than
82
+ impose rules that restrict the types and degrees of interaction that users can have, as is
83
+ done by concurrency control mechanisms in traditional database systems, a
84
+ groupware data manager will typically impose less stringent rules. The relaxation of
85
+ these rules limits the extent to which the system can autonomously handle conflicts.
86
+ Thus, such systems typically handle whatever cases they can, and when they detect a
87
+ conflict that cannot be handled automatically, they simply inform the user(s) that the
88
+ conflict has occurred, and allow them to resolve it based on their knowledge of the
89
+ situation. Thus, having users in the loop can be leveraged to provide more adaptive
90
+ and flexible systems.
91
+
92
+ Challenges in Ubiquitous Data Management
93
+
94
+ Requirements Due to Mobility
95
+
96
+ Other data management requirements are less universal across the three categories but
97
+ yet must be addressed in order to support a comprehensive ubiquitous computing
98
+ environment. For example, the issue of mobility raises a number of issues. First, the
99
+ fact that the terminals (i.e. devices) are constantly moving, and often have limited
100
+ storage capacity means that a ubiquitous computing system must be able to deliver
101
+ data to and receive data from different and changing locations. This results in the
102
+ need for various kinds of proxy solutions, where users are handed off from one proxy
103
+ to another as they move. Protocols must be constructed in such a way as to be able to
104
+ tolerate such handoffs without breaking. Mobility also raises the need for intelligent
105
+ data staging and pre-staging, so that data can be placed close to where the users will
106
+ be when they need it (particularly in slow or unreliable communications situations).
107
+
108
+ Secondly, mobility adds location as a new dimension to applications that does not
109
+ typically play a role in stationary scenarios. For example, some of the most useful
110
+ applications for mobile devices are location-centric. Consider a system that can
111
+ answer questions such as find the drugstores within 2 miles of my current location .
112
+ Such a system must track the location of the current user and be able to access
113
+ information based on relative locations and distances. On a broader scale, servers
114
+ may have to track large numbers of moving objects (people, cars, devices, etc.) and be
115
+ able to predict their future locations. For example, an automated traffic control
116
+ system would have to track numerous cars, including their current positions,
117
+ directions, and velocities. Location-centric computing requires special data structures
118
+ in which location information can be encoded and efficiently stored, as well as ones in
119
+ which the dynamic positions of objects can be maintained.
120
+
121
+ Requirements Due to Context-Awareness
122
+
123
+ Context-awareness imposes significant demands on the knowledge maintained by the
124
+ system and the inferencing algorithms that use that knowledge. In order to be context
125
+ aware, a system must maintain an internal representation of users needs, roles, and
126
+ preferences, etc. One example of such a system is a smart calendar that routes
127
+ information to a user based on knowledge of the user s near-term schedule (as can be
128
+ determined from the user s PIM calendar). If, for example, a user has a meeting with
129
+ a particular client scheduled for the afternoon, such a system could send the user
130
+ information that would be highly relevant to that meeting, such as data about the
131
+ client s account, results of previous meetings with that client, news articles relevant to
132
+ the topic of the meeting, etc.
133
+
134
+ More sophisticated systems might use various types of sensors to monitor the
135
+ environment and track users actions so as to be able to assist in the tasks the user is
136
+ performing. Such sensor-based systems require the ability to process data streams in
137
+ real-time and to analyze and interpret such streams. Thus, data-flow processing will
138
+ play a key role in ubiquitous computing.
139
+
140
+ Whether the system obtains its context information from sensors, user input, PIM
141
+ (personal information management) applications, or some combination of these, it
142
+ must perform a good deal of processing over the data in order to be able to accurately
143
+ assess the state of the environment and the intensions of the user. Thus, context-
144
+ aware applications impose demanding requirements for inferencing and machine
145
+ learning techniques. These processes will have to cope with incomplete and
146
+ conflicting data, and will have to do so extremely efficiently in order to be able to
147
+ interact with the user in a useful and unobtrusive manner.
148
+
149
+ Requirements Due to Collaboration
150
+
151
+ The final set of requirements we discuss here are those that result from the need to
152
+ support collaborative work by dynamic and sometimes ad hoc groups of people. As
153
+ stated above, a prime requirement that stems from such applications is adaptivity. In
154
+ addition, however, there are several other types of support that are required beyond
155
+ what has already been discussed. First, there is a need for synchronization and
156
+ consistency support. At the center of any collaborative application is a set of shared
157
+ data items that ean be created, accessed, modified, and deleted by participants of the
158
+ collaboration. This coordination function must be lightweight and flexible so that
159
+ many different types of interactions can be supported, ranging from unmoderated chat
160
+ facilities, to full ACID (Atomic, Consistent, Isolated, and Durable) transactions, as
161
+ provided by traditional database systems.
162
+
163
+ A second requirement stemming from collaborative applications is the need for
164
+ reliable and available storage of history. In particular, if the collaboration is to be
165
+ performed in an asynchronous manner, users must be able to access a record of what
166
+ has happened earlier in the collaboration. Likewise, if the participants in the
167
+ collaboration can change over time (e.g., due to mobility, failures, or simply due to
168
+ the nature of the collaboration), then a durable record of participants and their actions
169
+ is essential to allow new members to join and come up to speed. Such durable storage
170
+ is also useful for keeping a log of activity, that can be used later to trace through the
171
+ causes of various outcomes of the collaboration, or as input into learning and data
172
+ mining algorithms whieh may help optimize future collaborations.
173
+
174
+ Example Data Management Technologies n On-Going Projects
175
+
176
+ The preceding discussion addressed some of the data management challenges that
177
+ must be addressed to support ubiquitous computing scenarios and outlined the
178
+ application properties from which they arise. In this section, we briefly describe two
179
+ on going projects that are addressing some of these aspects. The first project, called
180
+ Data Recharging, exploits user interest and preference information to deliver data
181
+ updates and other relevant items to users on their portable devices. The second
182
+ project, called Telegraph, is building an adaptive data-flow processing architecture to
183
+ process long-running queries over variable streams of data, as would arise in sensor-
184
+ based and other highly dynamic data environments.
185
+
186
+ Challenges in Ubiquitous Data Management
187
+
188
+ Data Recharging: Profile-Based Data Dissemination and Synchronization
189
+
190
+ Mobile devices require two key resources to function: power and data. The mobile
191
+ nature of such devices combined with limitations of size and cost makes it impractical
192
+ to keep them continually connected to the fixed power and data (i.e., the Internet)
193
+ grids. Mobile devices cope with disconnection from these grids by "caching".
194
+ Devices use rechargeable batteries for caching power, while local storage is used for
195
+ caching data. Periodically, the device-local local resources must be "recharged" by
196
+ connecting with the fixed power and data grids. With existing technology, however,
197
+ the process of recharging the device resident data is much more cumbersome and
198
+ error-prone than recharging the power. Power recharging can be done virtually
199
+ anywhere in the world, requires little user involvement, and works progressively -
200
+ the longer the device is recharged, the better the device-stored power becomes. In
201
+ contrast, data "recharging" has none of these attributes.
202
+
203
+ The Data Recharging project is developing a service and corresponding
204
+ infrastructure that permits a mobile device of any kind to plug into the Internet at any
205
+ location for any amount of time and as a result, end up with more useful data than it
206
+ had before [CFZOO]. As with power recharging, the initiation of a data charge simply
207
+ requires "plugging in" a device to the network. The longer the device is left plugged
208
+ in, the more effective the charge. Although similar to battery recharging, data
209
+ recharging is more complex; the type and amount of data delivered during a data
210
+ charge must be tailored to the needs of the user, the capabilities of the recharged
211
+ device, and the tasks that the recharged data is needed to support.
212
+
213
+ Different mobile users will have different data needs. A business traveler may
214
+ want updates of contact information, restaurant reviews and hotel pricing guides
215
+ specific to a travel destination. Students may require access to recent course notes,
216
+ required readings for the next lecture and notification about lab space as it becomes
217
+ available. Data recharging represents specifications of user needs as profiles.
218
+ Profiles can be thought of as long-running queries that continually sift through the
219
+ available data to find relevant items and determine their value to the user.
220
+
221
+ Profiles for data recharging contain three types of information: First, the profile
222
+ describes the types of data that are of interest to the user. This description must be
223
+ declarative in nature, so that it can encompass newly created data in addition to
224
+ existing data. The description must also be flexible enough to express predicates
225
+ over different types of data and media. Second, because of limitations on bandwidth,
226
+ device-local storage, and recharging time, only a bounded amount of information can
227
+ be sent to a device during data recharging. Thus, the profile must also express the
228
+ user s preferences in terms of priorities among data items, desired resolutions of
229
+ multi-resolution items, consistency requirements, and other properties. Finally, user
230
+ context can be dynamically incorporated into the recharging process by
231
+ parameterizing the user profile with information obtained from the device-resident
232
+ Personal Information Management (PIM) applications such as the calendar, contact
233
+ list, and To Do list.
234
+
235
+ Our previous work on user profiles has focused on 1) efficiently processing
236
+ profiles over streams of XML documents (i.e., the XFilter system) [AFOO], 2)
237
+ learning and maintaining user profiles based on explicit user feedback [CFGOO], and
238
+ 3) development of a large-scale, reliable system for mobile device synchronization
239
+ [DFOO]. Data recharging can build upon this work, but requires the further
240
+ development of a suitable language and processing strategy for highly expressive user
241
+ profiles (i.e., that include user preference and contextual information), and the
242
+ development of a scalable, wide-area architecture that is capable of providing a data
243
+ recharging service on a global basis to potentially millions of users.
244
+
245
+ Adaptive Dataflow Query Processing
246
+
247
+ A second important aspect of ubiquitous computing environments is the variable
248
+ nature of data availability and the challenges of managing and processing dynamic
249
+ data flows. In mobile applications for example, data can move throughout the system
250
+ in order to follow the users who need it. Conversely, in mobile applications where
251
+ the data is being created at the endpoints (say, for example, a remote sensing
252
+ application) data streams into the system in an erratic fashion to be processed, stored,
253
+ and possibly acted upon by agents residing in the network. Information flows also
254
+ arise in other applications, such as data dissemination systems in whieh streams of
255
+ newly created and modified data must be routed to users and shared caches.
256
+
257
+ Traditional database query processing systems break down in such environments
258
+ for a number of reasons: First, they are based on static approaches to query
259
+
260
+ optimization and planning. Database systems produce query plans using simple cost
261
+ models and statistics about the data to estimate the cost of running particular plans.
262
+ In a dynamic dataflow environment, this approach simply does not work because
263
+ there are typically no reliable statistics about the data and because the arrival rates,
264
+ order, and behavior of the data streams are too unpredictable [UFA98].
265
+
266
+ Second, the exisiting approaches cannot adequately cope with failures that arise
267
+ during the processing of a query. In current database systems, if the failure of a data
268
+ source goes undetected, the query processor simply blocks, waiting for the data to
269
+ arrive. If a failure is detected, then a query is simply aborted and restarted. Neither
270
+ of these situations is appropriate in a ubiquitous computing environment in which
271
+ sources and streams behave unpredictably, and queries can be extremely long-running
272
+ (perhaps even continuous ).
273
+
274
+ Third, existing approaches are optimized for a batch style of processing in which
275
+ the goal is to deliver an entire answer (i.e., they are optimized for the delivery of the
276
+ last result). In a ubiquitous computing environment, where users will be interacting
277
+ with the system in a fine-grained fashion, such approaches are unacceptable.
278
+ Processed data (e.g., query results, event notifications, etc.) must be passed on to the
279
+ user as soon as they are available. Furthermore, because the system is interactive, a
280
+ user may choose to modify the query on the basis of previously returned information
281
+ or other factors. Thus, the system must be able to gracefully adjust to changes in the
282
+ needs of the users [HACO-i-99].
283
+
284
+ The Telegraph project at UC Berkeley [HFCD-l-00] is investigating these issues
285
+ through the development of an adaptive dataflow processing engine. Telegraph uses a
286
+ novel approach to query execution based on eddies , which are dataflow control
287
+ structures that route data to query operators on an item-by-item basis [AHOO].
288
+ Telegraph does not rely upon a traditional query plan, but rather, allows the plan to
289
+ develop and adapt during the execution. For queries over continuous streams of data.
290
+ the system can continually adapt to changes in the data arrival rates, data
291
+ characteristics, and the availability of processing, storage, and communication
292
+ resources.
293
+
294
+ In addition to novel control structures. Telegraph also employs non-blocking,
295
+ symmetric query processing operators, such as XJoins [UFOO] and Ripple Joins
296
+ [HH99], which can cope with changing and unpredictable arrival of their input data.
297
+ The challenges being addressed in the Telegraph project include the development of
298
+ cluster-based and wide-area implementations of the processing engine, the design of
299
+ fault-tolerance mechanisms (particularly for long-running queries), support for
300
+ continuous queries over sensor data and for profile-based information dissemination,
301
+ and user interface issues.
302
+
303
+ Conclusions
304
+
305
+ Ubiquitous computing is a compelling vision for the future that is moving closer to
306
+ realization at an accelerating pace. The combination of global wireless and wired
307
+ connectivity along with increasingly small and powerful devices enables a wide array
308
+ of new applications that will change the nature of computing. Beyond new devices
309
+ and communications mechanisms, however, the key technology that is required to
310
+ make ubiquitous computing a reality is data management. Data lies at the heart of all
311
+ ubiquitous computing applications, but these applications and environments impose
312
+ new and challenging requirements for data management technology.
313
+
314
+ In this short paper, I have tried to outline the key aspects of ubiquitous computing
315
+ from a data management perspective. These aspects were organized into three
316
+ categories: 1) support for mobility, 2) context-awareness, and 3) support for
317
+ collaboration. I then examined each of these to determine a set of requirements that
318
+ they impose on data management. The over-riding issue that stems from all of these
319
+ is the need for adaptivity. Thus, traditional data management techniques, which tend
320
+ to be static and fairly rigid, must be rethought in light of this emerging computing
321
+ environment.
322
+
323
+ I also described two on-going projects that are re-examining key aspects of data
324
+ management techniques: the DataRecharging project, which aims to provide data
325
+ synchronization and dissemination of highly relevant data for mobile users based on
326
+ the processing of sophisticated user profiles; and the Telegraph project, which is
327
+ developing a dynamic dataflow processing engine to efficiently and adaptively
328
+ process streams of data from a host of sources ranging from web sources to networks
329
+ of sensors.
330
+
331
+ Of course, there are a number of very important data management issues that have
332
+ not been touched upon in this short paper. First of all, the ability to interoperate
333
+ among multiple applications and types of data will depend on standards for data-
334
+ interchange, resource discovery, and inter-object communication. Great strides are
335
+ being made in these areas, and the research issues are only a small part of the effort
336
+ involved in the standardization process. Another important area, in which on-going
337
+ research plays a central role, is the development of global-scale, secure and archival
338
+ information storage utilities. An example of such a system is the OceanStore utility,
339
+ currently under development at UC Berkeley [KBCC+00].
340
+
341
+
342
+