CS514 Ubiquitous & Mobile Computing 2006

Provider: Dr. Sotirios Terzis
Coursework: 100% of final mark
Course Timetable
Module Descriptor
Recommended Textbooks: (**) Distributed Systems: Concepts and Design, 4th edition
G. Coulouris, J. Dollimore and T. Kindberg, Addison Wesley, 2005
Announcements
(24/4/2006) VERY IMPORTANT: The deadline for the submission of the RFID Essay has been extended to Wednesday, May 3.
(19/4/2006) VERY IMPORTANT: The deadline for the submission of the Ubiquitous Computing Scenario exercise has been extended to Monday, April 24 at 10:00. Note that the schedule for the presentations still remains the same as outlined below.
(12/4/2006) VERY IMPORTANT: The scedule for the coursework presentations is as follows:
  • Groups 3 and 5 on Monday, April 24th at the usual Monday lecture time and place.
  • Groups 2, 1, 4 and 6 on Thursday, April 27th at L13.18 between 13:00 and 15:00.
Note: All students are expected to attend all presentations.
(31/3/2006) IMPORTANT: According to the draw in today's lecture the groups will present their scenarios in the following order:
  1. Group 3
  2. Group 5
  3. Group 2
  4. Group 1
  5. Group 4
  6. Group 6
Details on the venue and times of the presentations to follow.
(21/3/2006) VERY IMPORTANT: There will be an extra lecture on Thursday (23/3/2006) at 14:00 in L13.18 to cover today's interrupted lecture.
Reading
Lectures
Mobile and Ubiquitous Computing
References: Coulouris et al. section 16.1, M. Satyanarayanan, Pervasive Computing: Vision and Challenges, IEEE Personal Communications,vol. 8, no. 4 pp. 10-17, August 2001, W.K. Edwards and R.E. Grinter, At Home with Ubiquitous Computing: Seven Challenges, in Proceedings of the 3rd International Conference on Ubiquitous Computing (UbiComp 2001), LNCS vol. 2201, pp. 256-272, Springer-Verlag, 2001.
Further Reading: M. Weiser, The Computer for the 21st Century, Scientific American, 265(30), pp. 94-104, September 1991, M. Weiser, Some Computer Science Problems in Ubiquitous Computing, Communications of the ACM, vol. 36, no.7, pp. 75-84, July 1993.
Sensing and Context-awareness
References: Coulouris et al. section 16.4, J. Hightower and G. Borriello, Location Systems for Ubiquitous Computing, IEEE Computer, vol. 34, no.8 , pp. 57-66, August 2001, D. Fox et al. Bayesian Filtering for Location Estimation, IEEE Pervasive Computing, vol. 2, no. 3, pp. 24-33, July-September 2003, K. Henricksen et al. Middleware for Distributed Context-Aware Systems, in Proceedings of the Symposium on Distributed Objects and Applications (DOA'05), LNCS vol. 3760, pp. 846-863, Springer 2005, H. Chen et al. An Ontology for Context-Aware Pervasive Computing Environments, Special Issue on Ontologies for Distributed Systems, Knowledge Engineering Review, vol. 18, no. 3, pp. 197-0207, May 2004.
Further Reading: Special Issue on The Disappearing Computer, Communications of the ACM, vol. 48, no. 3, March 2005, Special Issue on Wireless Sensor Networks, Communications of the ACM, vol. 47, no. 6, June 2004,
Security and Privacy
References: Coulouris et al. section 16.5, F. Stajano and R. Anderson, The Resurrecting Duckling: Security Issues for Ubiquitous Computing, Security & Privacy supplement to IEEE Computer, vol. 35, no. 4, pp. 22-26, April 2002, F. Stajano, The Resurrecting Duckling - what next? in B. Christianson et al. (Eds.). Proceedings of 8th International Workshop on Security Protocols, LNCS vol. 2133, pp. 204-215, Springer 20001, M. Langheinrich, Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems, in G.D. Abowd et al. (Eds.), Proceedings of the Third International Conference on Ubiquitous Computing (UbiComp 2001), LNCS vol. 2201, pp. 273--291, Springer 2001, C. Floerkemeier et al., Scanning with a Purpose – Supporting the Fair Information Principles in RFID Protocols, in H. Murakami, Hideyuki Nakashima et al. (Eds.): Ubiquitious Computing Systems. Revised Selected Papers from the 2nd International Symposium on Ubiquitous Computing Systems (UCS 2004), LNCS vol. 3598, pp. 214-231, Springer 2005, F. Stajano, RFID is X-ray vision, Technical Report no. 645, University of Cambridge, Computer Laboratory, August 2005.
Further Reading: M. Langheinrich, A Privacy Awareness System for Ubiquitous Computing Environments, in G. Borriello and L.E. Holmquist (Eds.), Proceedings of the 4th International Conference on Ubiquitous Computing (Ubicomp 2002), LNCS vol. 2498, pp. 237-245, Springer 2002, V. Cahill et al, Using Trust for Secure Collaboration in Uncertain environments, IEEE Pervasive Computing, vol. 2, no. 3, pp. 52-61, July-September 2003, S. Terzis, Trust Lifecycle Management in Ad-hoc Collaborations, presented at the Second UK-UbiNet Workshop, Cambridge, UK, May 2004, M.R. Rieback et al. Is Your Cat Infected with a Computer Virus?, in Proceedings of the 4th International Conference on Pervasive Computing and Communications (PerCom2006), pp.169-179, Pisa, Italy, March 2006.
Association
References: Coulouris et al. section 16.2, W. Adjie-Winoto et al. The design and implementation of an intentional naming system, Operating Systems Review, vol. 34, no. 5, pp. 186-201, December 1999, Y.-D. Bromberg and V. Issarny, INDISS: Interoperable Discovery System for Networked Services, in Proceedings of ACM/IFIP/USENIX 6th International Middleware Conference, LNCS vol. 3790, pp. 164-183,Springer 2005.
Further Reading: F. Zhu et al. Service Discovery in Pervasive Computing Environments IEEE Pervasive Computing, vol. 4, no. 4, pp. 81-90, October-December 2005, E. Guttman, Autoconfiguration for IP Networking: Enabling Local Communication, IEEE Internet Computing, vol. 5, no. 3, pp. 81-86, May-June 2001.
Interoperation
References: Coulouris et al. section 16.3, R. Grimm et al. System Support for Pervasive Applications, ACM Transactions on Computer Systems, vol. 22, no. 4, pp. 421-486, November 2004.
Further Reading: W.K. Edwards et al. Bringing Network Effects to Pervasive Spaces, IEEE Pervasive Computing, vol. 4, no. 3, pp. 15-17, July-September 2005, T. Berners-Lee et al. The Semantic Web, Scientific American, May 2001, A.L. Murphy et al., LIME: A Middleware for Physical and Logical Mobility, in Proceedings of the The 21st International Conference on Distributed Computing Systems (ICDCS'01),p. 0524, 2001, P.H. Eugster et al., The Many Faces of Publish/Subscribe, ACM Computing Surveys, vol. 35, no. 2, pp. 114-131, June 2003.
Adaptation
References: Coulouris et al. section 16.6.
Further Reading: N. Liogkas et al. Automatic Partitioning for Prototyping Ubiquitous Computing Applications, IEEE Pervasive Computing, vol. 3, no. 3, pp. 40-47, July-September 2004, Special Issue on Aspect-Oriented Programming, IEEE Software, vol. 23, no. 1, January-February 2006.
Coursework
Submission instructions: The submission of the coursework includes
  1. The group report. This should be submitted at the beginning of the lecture on Monday, April 24. The report should have a cover page including the names, student numbers of all group members and a statement confirming that "Except where explicitly stated all the work in this submission is our own" singed by all group members.
  2. Self and Peer Assessment. Each group member needs to fill in and email individually his or her peer and self evaluation form to the class lecturer. Note that you evaluate the performance both of yourselves and of all the group members. There are four criteria on which you evaluate group members including yourself. These criteria are:
    1. Level of enthusiasm/participation
    2. Suggesting ideas
    3. Understanding what was required
    4. Organising the group and ensuring things got done
    For each criterion, award each group member, including you, marks as follows:
    3 for ‘better than most of the group in this respect’
    2 for ‘about average for this group in this respect’
    1 for ‘not as good as most of the group in this respect’
    0 for ‘no help at all in this respect’
    If necessary, you can award:
    -1 for ‘a hindrance to the group in this respect’
Ubiquitous Computing Scenario
Submission instructions: The report should have a cover page including your name, student numbers and a signed statement confirming that "Except where explicitly stated all the work in this submission is our own". The report should be submitted at the departmental office by 12:00 on the day of the deadline.
RFID Essay
Last modified: Monday, April 24, 2006