text stringlengths 0 134 |
|---|
data to and receive data from different and changing locations. This results in the |
need for various kinds of proxy solutions, where users are handed off from one proxy |
to another as they move. Protocols must be constructed in such a way as to be able to |
tolerate such handoffs without breaking. Mobility also raises the need for intelligent |
data staging and pre-staging, so that data can be placed close to where the users will |
be when they need it (particularly in slow or unreliable communications situations). |
Secondly, mobility adds location as a new dimension to applications that does not |
typically play a role in stationary scenarios. For example, some of the most useful |
applications for mobile devices are location-centric. Consider a system that can |
answer questions such as find the drugstores within 2 miles of my current location . |
Such a system must track the location of the current user and be able to access |
information based on relative locations and distances. On a broader scale, servers |
may have to track large numbers of moving objects (people, cars, devices, etc.) and be |
able to predict their future locations. For example, an automated traffic control |
system would have to track numerous cars, including their current positions, |
directions, and velocities. Location-centric computing requires special data structures |
in which location information can be encoded and efficiently stored, as well as ones in |
which the dynamic positions of objects can be maintained. |
Requirements Due to Context-Awareness |
Context-awareness imposes significant demands on the knowledge maintained by the |
system and the inferencing algorithms that use that knowledge. In order to be context |
aware, a system must maintain an internal representation of users needs, roles, and |
preferences, etc. One example of such a system is a smart calendar that routes |
information to a user based on knowledge of the user s near-term schedule (as can be |
determined from the user s PIM calendar). If, for example, a user has a meeting with |
a particular client scheduled for the afternoon, such a system could send the user |
information that would be highly relevant to that meeting, such as data about the |
client s account, results of previous meetings with that client, news articles relevant to |
the topic of the meeting, etc. |
More sophisticated systems might use various types of sensors to monitor the |
environment and track users actions so as to be able to assist in the tasks the user is |
performing. Such sensor-based systems require the ability to process data streams in |
real-time and to analyze and interpret such streams. Thus, data-flow processing will |
play a key role in ubiquitous computing. |
Whether the system obtains its context information from sensors, user input, PIM |
(personal information management) applications, or some combination of these, it |
must perform a good deal of processing over the data in order to be able to accurately |
assess the state of the environment and the intensions of the user. Thus, context- |
aware applications impose demanding requirements for inferencing and machine |
learning techniques. These processes will have to cope with incomplete and |
conflicting data, and will have to do so extremely efficiently in order to be able to |
interact with the user in a useful and unobtrusive manner. |
Requirements Due to Collaboration |
The final set of requirements we discuss here are those that result from the need to |
support collaborative work by dynamic and sometimes ad hoc groups of people. As |
stated above, a prime requirement that stems from such applications is adaptivity. In |
addition, however, there are several other types of support that are required beyond |
what has already been discussed. First, there is a need for synchronization and |
consistency support. At the center of any collaborative application is a set of shared |
data items that ean be created, accessed, modified, and deleted by participants of the |
collaboration. This coordination function must be lightweight and flexible so that |
many different types of interactions can be supported, ranging from unmoderated chat |
facilities, to full ACID (Atomic, Consistent, Isolated, and Durable) transactions, as |
provided by traditional database systems. |
A second requirement stemming from collaborative applications is the need for |
reliable and available storage of history. In particular, if the collaboration is to be |
performed in an asynchronous manner, users must be able to access a record of what |
has happened earlier in the collaboration. Likewise, if the participants in the |
collaboration can change over time (e.g., due to mobility, failures, or simply due to |
the nature of the collaboration), then a durable record of participants and their actions |
is essential to allow new members to join and come up to speed. Such durable storage |
is also useful for keeping a log of activity, that can be used later to trace through the |
causes of various outcomes of the collaboration, or as input into learning and data |
mining algorithms whieh may help optimize future collaborations. |
Example Data Management Technologies n On-Going Projects |
The preceding discussion addressed some of the data management challenges that |
must be addressed to support ubiquitous computing scenarios and outlined the |
application properties from which they arise. In this section, we briefly describe two |
on going projects that are addressing some of these aspects. The first project, called |
Data Recharging, exploits user interest and preference information to deliver data |
updates and other relevant items to users on their portable devices. The second |
project, called Telegraph, is building an adaptive data-flow processing architecture to |
process long-running queries over variable streams of data, as would arise in sensor- |
based and other highly dynamic data environments. |
Challenges in Ubiquitous Data Management |
Data Recharging: Profile-Based Data Dissemination and Synchronization |
Mobile devices require two key resources to function: power and data. The mobile |
nature of such devices combined with limitations of size and cost makes it impractical |
to keep them continually connected to the fixed power and data (i.e., the Internet) |
grids. Mobile devices cope with disconnection from these grids by "caching". |
Devices use rechargeable batteries for caching power, while local storage is used for |
caching data. Periodically, the device-local local resources must be "recharged" by |
connecting with the fixed power and data grids. With existing technology, however, |
the process of recharging the device resident data is much more cumbersome and |
error-prone than recharging the power. Power recharging can be done virtually |
anywhere in the world, requires little user involvement, and works progressively - |
the longer the device is recharged, the better the device-stored power becomes. In |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.