52504 Mobile Software & Applications 2011

Lecturer: Dr. Sotirios Terzis
Coursework: 100% of final mark
Course Timetable
Course Syllabus
Recommended Textbooks: (**) Distributed Systems: Concepts and Design, 4th edition
G. Coulouris, J. Dollimore and T. Kindberg, Addison Wesley, 2005
Announcements
Assessment Details

The assessment of the class comprises of the following assessed elements:

Lectures

Mobile and Ubiquitous Computing
References: Coulouris et al. section 16.1, G.H. Form and J. Zohorjan, The Challenges of Mobile Computing, IEEE Computer, Vol. 27, No. 4, (April 1994), pp. 38-47.
Further Reading: M. Weiser, The Computer for the 21st Century, Scientific American, 265(30), pp. 94-104, September 1991, M. Weiser, Some Computer Science Problems in Ubiquitous Computing, Communications of the ACM, vol. 36, no.7, pp. 75-84, July 1993, M. Satyanarayanan, Pervasive Computing: Vision and Challenges, IEEE Personal Communications,vol. 8, no. 4 pp. 10-17, August 2001, W.K. Edwards and R.E. Grinter, At Home with Ubiquitous Computing: Seven Challenges, in Proceedings of the 3rd International Conference on Ubiquitous Computing (UbiComp 2001), LNCS vol. 2201, pp. 256-272, Springer-Verlag, 2001, G.-C. Roman, G.P. Picco, A.L. Murphy, Software Engineering for Mobility: A Roadmap, in Proceedings of the Conference on The Future of Software Engineering, pp. 241-258, ACM, 2000.

Association
References: Coulouris et al. section 16.2
Further Reading: E. Guttman, Autoconfiguration for IP Networking: Enabling Local Communication, IEEE Internet Computing, vol. 5, no. 3, pp. 81-86, May-June 2001, W. Adjie-Winoto et al. The design and implementation of an intentional naming system, Operating Systems Review, vol. 34, no. 5, pp. 186-201, December 1999, Apple's Bonjour.

Interoperation
References: Coulouris et al. section 16.3, P.H. Eugster, P.A. Felber, R. Guearraoui and A.-M. Kermarrec, The Many Faces of Publish/Subscribe, ACM Computing Surveys, vol. 35, no. 2, pp. 114-131, June 2003, Y. Huang and H. Garcia-Molina, Publish/Subscribe in a Mobile Environment, Wireless Networks, vol. 10, no. 6, pp. 643-652, November 2004, S.-Y. Ni, Y.-C. Tseng, Y-S. Chen and J.-P. Sheu, The Broadcast Storm Problem in a Mobile Ad Hoc Network, in Proceedings of the 5th annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'99), pp. 151-162, 1999, L. Fiege, F.C. Gartner, O. Karsten and A. Zeidler, Supporting Mobility in Content-Based Publish/Subscribe Middleware, in M. Endler and D. Schmidt (eds.) Middleware 2003, LNCS vol. 2672, pp. 103-122, Springer-Verlag, 2003, A.L. Murphy, G.P. Picco and G.C. Roman, LIME: A Middleware for Physical and Logical Mobility, in Proceedings of the The 21st International Conference on Distributed Computing Systems (ICDCS'01),p. 0524, 2001, G. Cabri, L. Leonardi and F. Zambonelli, MARS: A Programmable Coordination Architecture for Mobile Agents, IEEE Internet Computing, vol. 4, no. 4, pp. 26-35, July-August 2000, P. Costa et al. Programming Wireless Sensor Networks with the TeenyLime Middleware, in R. Cerqueira and R.H. Campbell (eds.), Middleware 2007, LNCS vol. 4834, pp. 429-450, Springer-Verlag 2007, D. Stovall and C. Julien, Resource discovery with evolving tuples, International workshop on Engineering of software services for pervasive environments: in conjunction with the 6th ESEC/FSE joint meeting, pp. 1-10, Dubrovnik, Croatia 2007, J. Pauty et al. Geo-Linda: a Geometry Aware Distributed Tuple Space, in Proceedings of the 21st International Conference on Advanced Networking and Applications (AINA 2007), pp. 370-377, May 2007.
Further Reading: T. Berners-Lee et al. The Semantic Web, Scientific American, May 2001.

Sensing and Context-awareness
References: Coulouris et al. section 16.4
Further Reading: Special Issue on The Disappearing Computer, Communications of the ACM, vol. 48, no. 3, March 2005, Special Issue on Wireless Sensor Networks, Communications of the ACM, vol. 47, no. 6, June 2004.

Security and Privacy
References: Coulouris et al. section 16.5
Further Reading: F. Stajano and R. Anderson, The Resurrecting Duckling: Security Issues for Ubiquitous Computing, Security & Privacy supplement to IEEE Computer, vol. 35, no. 4, pp. 22-26, April 2002, F. Stajano, The Resurrecting Duckling - what next? in B. Christianson et al. (Eds.). Proceedings of 8th International Workshop on Security Protocols, LNCS vol. 2133, pp. 204-215, Springer 2001, F. Stajano, RFID is X-ray vision, Technical Report no. 645, University of Cambridge, Computer Laboratory, August 2005, M. Langheinrich, Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems, in G.D. Abowd et al. (Eds.), Proceedings of the Third International Conference on Ubiquitous Computing (UbiComp 2001), LNCS vol. 2201, pp. 273--291, Springer 2001, M. Langheinrich, A Privacy Awareness System for Ubiquitous Computing Environments, in G. Borriello and L.E. Holmquist (Eds.), Proceedings of the 4th International Conference on Ubiquitous Computing (Ubicomp 2002), LNCS vol. 2498, pp. 237-245, Springer 2002, V. Cahill et al, Using Trust for Secure Collaboration in Uncertain environments, IEEE Pervasive Computing, vol. 2, no. 3, pp. 52-61, July-September 2003, S. Terzis, Trust Lifecycle Management in Ad-hoc Collaborations, presented at the Second UK-UbiNet Workshop, Cambridge, UK, May 2004. M.R. Rieback et al. Is Your Cat Infected with a Computer Virus?, in Proceedings of the 4th International Conference on Pervasive Computing and Communications (PerCom2006), pp.169-179, Pisa, Italy, March 2006. C. Floerkemeier et al., Scanning with a Purpose: Supporting the Fair Information Principles in RFID Protocols, in H. Murakami, Hideyuki Nakashima et al. (Eds.): Ubiquitious Computing Systems. Revised Selected Papers from the 2nd International Symposium on Ubiquitous Computing Systems (UCS 2004), LNCS vol. 3598, pp. 214-231, Springer 2005, M. Rieback et al., The Evolution of RFID Security, IEEE Pervasive Computing, vol. 5, no. 1, pp. 62-69, January-March 2006, M. Ohkubo et al., RFID privacy issues and technical challenges, Communications of the ACM, vol. 48, no. 9, pp. 66-71, September 2005,

Adaptation
References: Coulouris et al. section 16.6.
Further Reading: N. Liogkas et al. Automatic Partitioning for Prototyping Ubiquitous Computing Applications, IEEE Pervasive Computing, vol. 3, no. 3, pp. 40-47, July-September 2004, Special Issue on Aspect-Oriented Programming, IEEE Software, vol. 23, no. 1, January-February 2006, R. Grimm et al. System Support for pervasive applications, ACM Transactions on Computer Systems, vol. 22, no. 4, pp. 421-486, November 2004. O. Babaoglu et al. Design Patterns from Biology for Distributed Computing, ACM Transactions on Autonomous and Adaptive Systems, vol. 1, no. 1, pp. 26-66, September 2006, S. Dobson et al. A Survey of Autonomic Communications, ACM Transactions on Autonomous and Adaptive Systems, vol. 1, no. 2, pp. 223-259, December 2006, V. Issarny et al. A Perspective on the Future of Middleware-based Software Engineering, in L.C. Briand and A.L. Wolf (eds), Future of Software Engineering, IEEE Computer Society 2007.

Class Participation Tasks
Labs

Java Development for Mobile Phones - Part 1

Java Development for Mobile Phones - Part 2

Java Development for Mobile Phones - Part 3

Coursework

Ubiquitous Computing Scenario
Due on: see exercise!

The groups for the exercise are:

  1. Stuart Arthur, Nicky Bain, Finbarr Taylor and Christopher McCann
  2. Colin But, Robert Gilmour, Liam Kelly and Adam Pieroni
  3. Gerard Humphries, Andrew Love, Iain Smith and Alasdair Stark
  4. Neil McGuiggan, Emma McLean, Michael Morran and Elinda Welsh

Due on: Friday 19 March at 16:00
-->

Programming Exercise
Due on: Thursday 31 March at 16:00

Last modified: Friday, March 11, 2011