skip to main content
10.1145/1107548.1107567acmotherconferencesArticle/Chapter ViewAbstractPublication Pagessoc-eusaiConference Proceedingsconference-collections
Article

Ambient functionality: use cases

Published:12 October 2005Publication History

ABSTRACT

In this paper we describe use cases and user requirements for ambient intelligence applications on personal mobile devices. Wireless connections to tags and sensors provide mobile applications with different identification, measurement and context data. Mobile applications that utilise local connectivity share many common patterns. We have identified these common patterns and describe them as use cases related to physical selection, activating applications, sensing and context-awareness. Based on user and expert evaluations of usage scenarios we also present user requirements for the use cases.

References

  1. Streitz, N. and Nixon, P. (2005) The Disappearing Computer. In Communications of the ACM, 48, 3 (March 2005). p. 33--35.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Saha, D. and A. Mukherjee, A. (2003) Pervasive Computing: A Paradigm for the 21st Century. in Computer, 36, 3 (March 2003). p. 25--31.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Want, R., Weiser, M. and Mynatt, E. (1998) Activating Everyday Objects. in Proceedings of the 1998 DARPA/NIST Smart Spaces Workshop. 1998. p. 140--143.]]Google ScholarGoogle Scholar
  4. Kindberg, T. (2002) Implementing Physical Hyperlinks Using Ubiquitous Identifier Resolution. in Proceedings of the eleventh international conference on World Wide Web, Honolulu, Hawaii, USA. ACM Press, New York NY, USA. p. 191--199.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Want, R., Fishkin, K. P., Gujar, A. and Harrison, B. L. (1999) Bridging Physical and Virtual Worlds with Electronic Tags. in Proceedings of CHI 99, Pittsburgh, PA, USA. p. 370--377.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Kindberg, T., Barton, J., Morgan, J., Becker, G., Caswell, D., Debaty, P., Gopal, G., Frid, M., Krishnan, V., Morris, H., Schettino, J., Serra, B. and Spasojevic, M. (2002) People, Places, Things: Web Presence for the Real World. in Mobile Networks and Applications, Volume 7, Issue 5, October 2002. p. 365--376.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Holmquist, L. E., Redström, J. and Ljungstrand, P. (1999) Token-Based Access to Digital Information. in Proceedings of the 1st International Symposium on handheld and ubiquitous computing, Karlsruhe, Germany. p. 234--245.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Polar Electro Heart Rate Monitors, www.polar.fi, accessed 28.4.2005.]]Google ScholarGoogle Scholar
  9. HealtWear Armband, http://www.healthwear.com/hw/healthwear_armband.do, accessed 28.4.2005]]Google ScholarGoogle Scholar
  10. ANT personal area network, www.thisisant.com, accessed 28.4.2005]]Google ScholarGoogle Scholar
  11. Suunto, Suunto T6 wristop, www.suunto.com, accessed 28.4.2005]]Google ScholarGoogle Scholar
  12. Nonin, 4100 Bluetooth enabled Pulse Oximeter, http://www.nonin.com/products/oem/4100.asp, accessed 28.4.2005]]Google ScholarGoogle Scholar
  13. NFC, Near Field Communication White Paper, http://www.ecma-international.org/activities/ Communications/2004tg 19-001.pdf, accessed 28.4.2005.]]Google ScholarGoogle Scholar
  14. Hall, E., Vawdrey, D. and Knutson, C. (2002) RF Rendez-Blue: Reducing Power And Inquiry Costs In Bluetooth-Enabled Mobile Systems. in Proceedings of the Eleventh IEEE International Conference on Computer Communications and Networks (IC3N '02), Miami, Florida, October 14--16, 2002.]]Google ScholarGoogle ScholarCross RefCross Ref
  15. Scott, D., Sharp, R., Madhavapeddy, A. and Upton, E. (2005) Using Visual Tags to Bypass Bluetooth Device Discovery. in Mobile Computing and Communication Review, Volume 9, Number 1 (January 2005)]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Woodings, R., Joos, D., Clifton, T., and Knutson C. (2002) Rapid Heterogeneous ad hoc Connection Establishment: Accelerating Bluetooth Inquiry Using IrDA. in Proceedings of the Wireless Communications and Networking Conference (WCNC2002). p. 342--349.]]Google ScholarGoogle ScholarCross RefCross Ref
  17. Dey, A. K. (2001) Understanding and using context. in Personal and Ubiquitous Computing, 5. p. 20--24.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Cheverst, K., Davies, N., Mitchell, K., Friday, A. and Efstratiou, C. (2000) Developing a context-aware electronic tourist guide: some issues and experiences. in CHI 2000 Conference Proceedings. p. 17--24.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Ciavarella, C. and Paterno, F. (2004) The design of a handheld, location-aware guide for indoor environments. in Personal and Ubiquitous Computing, 8. p. 82--91.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Ueda, H., Tsukamoto, M. and Nishio, S. (2000) W-MAIL: An Electronic Mail System for Wearable Computing Environments. in Proceedings of the 6th Annual Conference on Mobile Computing and Networking (MOBICOM 2000).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Chávez, E., Ide, R. and Kirste, T. (1999) Interactive applications of personal situation-aware assistants. in Computers & Graphics, 23. p. 903--915.]]Google ScholarGoogle Scholar
  22. MIMOSA project home page. www.mimosa-fp6.com]]Google ScholarGoogle Scholar
  1. Ambient functionality: use cases

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      sOc-EUSAI '05: Proceedings of the 2005 joint conference on Smart objects and ambient intelligence: innovative context-aware services: usages and technologies
      October 2005
      316 pages
      ISBN:1595933042
      DOI:10.1145/1107548

      Copyright © 2005 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 October 2005

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader