skip to main content
Skip header Section
Ubiquitous Computing: Smart Devices, Environments and InteractionsMay 2009
Publisher:
  • Wiley Publishing
ISBN:978-0-470-03560-3
Published:18 May 2009
Pages:
502
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

This book provides an introduction to the complex field of ubiquitous computing Ubiquitous Computing (also commonly referred to as Pervasive Computing) describes the ways in which current technological models, based upon three base designs: smart (mobile, wireless, service) devices, smart environments (of embedded system devices) and smart interaction (between devices), relate to and support a computing vision for a greater range of computer devices, used in a greater range of (human, ICT and physical) environments and activities. The author details the rich potential of ubiquitous computing, the challenges involved in making it a reality, and the prerequisite technological infrastructure. Additionally, the book discusses the application and convergence of several current major and future computing trends. Key Features: Provides an introduction to the complex field of ubiquitous computing Describes how current technology models based upon six different technology form factors which have varying degrees of mobility wireless connectivity and service volatility: tabs, pads, boards, dust, skins and clay, enable the vision of ubiquitous computing Describes and explores how the three core designs (smart devices, environments and interaction) based upon current technology models can be applied to, and can evolve to, support a vision of ubiquitous computing and computing for the future Covers the principles of the following current technology models, including mobile wireless networks, service-oriented computing, human computer interaction, artificial intelligence, context-awareness, autonomous systems, micro-electromechanical systems, sensors, embedded controllers and robots Covers a range of interactions, between two or more UbiCom devices, between devices and people (HCI), between devices and the physical world. Includes an accompanying website with PowerPoint slides, problems and solutions, exercises, bibliography and further reading Graduate students in computer science, electrical engineering and telecommunications courses will find this a fascinating and useful introduction to the subject. It will also be of interest to ICT professionals, software and network developers and others interested in future trends and models of computing and interaction over the next decades.

Cited By

  1. ACM
    Woźniak M, Vöge S, Krüger R, Müller H, Koelle M and Boll S Inhabiting Interconnected Spaces: How Users Shape and Appropriate Their Smart Home Ecosystems Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, (1-18)
  2. ACM
    Eleftherakis G, Baxhaku F and Vasilescu A Bio-inspired Adaptive Architecture for Wireless Sensor Networks Proceedings of the 26th Pan-Hellenic Conference on Informatics, (116-122)
  3. ACM
    Chamunorwa M, Wozniak M, Vöge S, Müller H and Boll S (2022). Interacting with Rigid and Soft Surfaces for Smart-Home Control, Proceedings of the ACM on Human-Computer Interaction, 6:MHCI, (1-22), Online publication date: 19-Sep-2022.
  4. ACM
    Popoveniuc B and Vatavu R Transhumanism as a Philosophical and Cultural Framework for Extended Reality Applied to Human Augmentation 13th Augmented Human International Conference, (1-8)
  5. Vasco Lopes N (2020). Internet of Things feasibility for disabled people, Transactions on Emerging Telecommunications Technologies, 31:12, Online publication date: 22-Dec-2020.
  6. Bergenti F, Caire G, Monica S and Poggi A (2020). The first twenty years of agent-based software development with JADE, Autonomous Agents and Multi-Agent Systems, 34:2, Online publication date: 12-Oct-2020.
  7. ACM
    Alniamy A and Taylor B Attribute-based Access Control of Data Sharing Based on Hyperledger Blockchain Proceedings of the 2020 2nd International Conference on Blockchain Technology, (135-139)
  8. ACM
    Kim R and Poslad S Growable, Invisible, Connected Toys: Twitching Towards Ubiquitous Bacterial Computing Proceedings of the Halfway to the Future Symposium 2019, (1-9)
  9. Aky N, Payet D, Giroux S and Courdier R Ubiquitous Computing and Multi-agent Systems: Clarification of the Lexicon PRIMA 2019: Principles and Practice of Multi-Agent Systems, (602-609)
  10. Khabbazian M and Gharouni Saffar K (2019). The Gain of Energy Accumulation in Multi-Hop Wireless Network Broadcast, IEEE/ACM Transactions on Networking, 27:5, (1830-1844), Online publication date: 1-Oct-2019.
  11. Bosse S and Lehmhus D (2019). Material-integrated cluster computing in self-adaptive robotic materials using mobile multi-agent systems, Cluster Computing, 22:3, (1017-1037), Online publication date: 1-Sep-2019.
  12. ACM
    Kim R, van Dierendonck R and Poslad S Moldy Ghosts and Yeasty Invasions Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, (1-6)
  13. ACM
    Bhardwaj S, Lee K and Lee J An adaptive framework for applying machine learning in smart spaces Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (1263-1270)
  14. ACM
    Ahmadi M, Borcea C and Jones Q Collaborative lifelogging through the integration of machine and human computation Companion Proceedings of the 24th International Conference on Intelligent User Interfaces, (23-24)
  15. ACM
    Alencar T, Barbosa M, Machado L, Neris L and Neris V Considering the Diversity of Users in the Development of a Flexible Bus Stop Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems, (1-10)
  16. ACM
    Kettani H and Cannistra R On Cyber Threats to Smart Digital Environments Proceedings of the 2nd International Conference on Smart Digital Environment, (183-188)
  17. ACM
    Liu J, Corbett-Davies J, Ferraiuolo A, Ivanov A, Luo M, Suh G, Myers A and Campbell M Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow Control Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, (48-59)
  18. ACM
    Kim R, Thomas S, van Dierendonck R and Poslad S A new mould rush Proceedings of the 13th International Conference on the Foundations of Digital Games, (1-9)
  19. Ianni M and Masciari E Trusted Environments for Volunteer Computing 2018 IEEE International Conference on Information Reuse and Integration (IRI), (526-529)
  20. Gallidabino A and Pautasso C Decentralized Computation Offloading on the Edge with Liquid WebWorkers Web Engineering, (145-161)
  21. ACM
    Boudabous S, Kazar O and Laouar M AMuL Proceedings of the 8th International Conference on Information Systems and Technologies, (1-5)
  22. Tong W, Buglass S, Li J, Chen L and Ai C Smart and Private Social Activity Invitation Framework Based on Historical Data from Smart Devices Proceedings of the 10th EAI International Conference on Mobile Multimedia Communications, (143-152)
  23. ACM
    Seiger R, Korzetz M, Gohlke M and Aßmann U Mixed reality cyber-physical systems control and workflow composition Proceedings of the 16th International Conference on Mobile and Ubiquitous Multimedia, (495-500)
  24. ACM
    de Alencar T and de Almeida Neris V Multimodality for Diversity of Users Proceedings of the XVI Brazilian Symposium on Human Factors in Computing Systems, (1-4)
  25. ACM
    Wood C, Poslad S, Kaniadakis A and Gabrys J What Lies Above Proceedings of the 2017 Conference on Designing Interactive Systems, (161-172)
  26. Nazari Shirehjini A and Semsar A (2017). Human interaction with IoT-based smart environments, Multimedia Tools and Applications, 76:11, (13343-13365), Online publication date: 1-Jun-2017.
  27. ACM
    Yang K, Forte D and Tehranipoor M (2017). CDTA, ACM Transactions on Design Automation of Electronic Systems, 22:3, (1-31), Online publication date: 31-May-2017.
  28. Tong W, Chen L, Buglass S, Gao W, Li J and Wang C (2017). An Advanced Private Social Activity Invitation Framework with Friendship Protection, Wireless Communications & Mobile Computing, 2017, Online publication date: 1-Jan-2017.
  29. Kun A (2017). Textbooks for Pervasive Computing Training and Education, IEEE Pervasive Computing, 16:3, (59-61), Online publication date: 1-Jan-2017.
  30. He H, Lin C, Tan K, Kendall G and Jin Y (2016). CIS Publication Spotlight [Publication Spotlight], IEEE Computational Intelligence Magazine, 11:4, (8-10), Online publication date: 1-Nov-2016.
  31. Huang S, Chen B, Chou S, Hwang J and Lee K (2016). Smart Car [Application Notes], IEEE Computational Intelligence Magazine, 11:4, (46-58), Online publication date: 1-Nov-2016.
  32. ACM
    Barbosa M, de Alencar T and de Almeida Neris V An approach for the simulation of flexible ubiquitous environments Proceedings of the 15th Brazilian Symposium on Human Factors in Computing Systems, (1-4)
  33. Steen M and Tanenbaum A (2016). A brief introduction to distributed systems, Computing, 98:10, (967-1009), Online publication date: 1-Oct-2016.
  34. ACM
    Anagnostopoulos V and Kiefer P Towards gaze-based interaction with urban outdoor spaces Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, (1706-1715)
  35. Pticek M, Podobnik V and Jezic G (2016). Beyond the Internet of Things, International Journal of Distributed Sensor Networks, 2016, (7), Online publication date: 1-Jun-2016.
  36. Esposito A, Esposito A and Vogel C (2015). Needs and challenges in human computer interaction for processing social emotional information, Pattern Recognition Letters, 66:C, (41-51), Online publication date: 15-Nov-2015.
  37. ACM
    de Alencar T, Barbosa M and de Almeida Neris V An approach to designing ubiquitous systems that consider the user's diversity Proceedings of the 14th Brazilian Symposium on Human Factors in Computing Systems, (1-10)
  38. Leonidis A, Antona M and Stephanidis C Enabling Programmability of Smart Learning Environments by Teachers Proceedings of the Third International Conference on Distributed, Ambient, and Pervasive Interactions - Volume 9189, (62-73)
  39. Abade T, Campos J, Moreira R, Silva C and Silva J Immersiveness of Ubiquitous Computing Environments Prototypes Proceedings of the Third International Conference on Distributed, Ambient, and Pervasive Interactions - Volume 9189, (237-248)
  40. ACM
    Silvis-Cividjian N Teaching Pervasive Computing to CS Freshmen Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education, (195-200)
  41. Ya-Lin Lee and Wen-Hsiang Tsai (2015). A New Data Transfer Method via Signal-Rich-Art Code Images Captured by Mobile Devices, IEEE Transactions on Circuits and Systems for Video Technology, 25:4, (688-700), Online publication date: 1-Apr-2015.
  42. ACM
    Emmerich K, Liszio S and Masuch M Defining second screen gaming Proceedings of the 11th Conference on Advances in Computer Entertainment Technology, (1-8)
  43. Plikynas D and Masteika S Agent-Based Nonlocal Social Systems Proceedings of the 6th International Conference on Social Computing and Social Media - Volume 8531, (253-264)
  44. Pimple K, Searing D, Jones C, Seelman K, Miller K and Shilton K Ethics and pervasive ICT Proceedings of the IEEE 2014 International Symposium on Ethics in Engineering, Science, and Technology, (1-2)
  45. Bader S Generating Explanations for Pro-active Assistance from Formal Action Descriptions Proceedings of the 4th International Joint Conference on Ambient Intelligence - Volume 8309, (19-31)
  46. de Alencar T and de Almeida Neris V Sistemas ubíquos para todos Proceedings of the 12th Brazilian Symposium on Human Factors in Computing Systems, (178-187)
  47. Jiang N and Tian F A novel gesture-based CAPTCHA design for smart devices Proceedings of the 27th International BCS Human Computer Interaction Conference, (1-5)
  48. De Haan G A Vision of the Future of Media Technology Design Education - design and education from HCI to UbiComp Proceedings of the 3rd Computer Science Education Research Conference on Computer Science Education Research, (67-72)
  49. Lee T and Chung G Background transfer method for ubiquitous computing Proceedings of the 6th international conference on Network and System Security, (86-99)
  50. ACM
    Petrushevski F Personalized lighting control based on a space model Proceedings of the 2012 ACM Conference on Ubiquitous Computing, (568-571)
  51. ACM
    Weise S, Hardy J, Agarwal P, Coulton P, Friday A and Chiasson M Democratizing ubiquitous computing Proceedings of the 2012 ACM Conference on Ubiquitous Computing, (521-530)
  52. Abie H and Balasingham I Risk-based adaptive security for smart IoT in eHealth Proceedings of the 7th International Conference on Body Area Networks, (269-275)
  53. Kozlov D, Veijalainen J and Ali Y Security and privacy threats in IoT architectures Proceedings of the 7th International Conference on Body Area Networks, (256-262)
  54. Kaczmarek P and Raszkowski P Semantic integration of heterogeneous recognition systems Proceedings of the 16th Iberoamerican Congress conference on Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, (288-295)
  55. ACM
    Wei J, Wang X, Peiris R, Choi Y, Martinez X, Tache R, Koh J, Halupka V and Cheok A CoDine Proceedings of the 13th international conference on Ubiquitous computing, (21-30)
  56. ACM
    Karahanoğlu A and Erbuğ Ç Perceived qualities of smart wearables Proceedings of the 2011 Conference on Designing Pleasurable Products and Interfaces, (1-8)
  57. ACM
    Sun W, Lu Y and Li S ReDi Proceedings of the 18th ACM international conference on Multimedia, (759-762)
  58. ACM
    Al-Doori M, Al-Bayatti A and Zedan H Context aware architecture for sending adaptive HELLO messages in VANET Proceedings of the 4th ACM International Workshop on Context-Awareness for Self-Managing Systems, (65-68)
  59. The N, Kawamura T, Nakagawa H, Tahara Y and Ohsuga A Self-supervised mining of human activity from CGM Proceedings of the 11th international conference on Knowledge management and acquisition for smart systems and services, (61-72)
  60. Mitsui H, Kambe H and Koizumi H Student experiments for learning basic M2M technologies by implementing sensor network systems Proceedings of the 9th international conference on Information technology based higher education and training, (257-264)
  61. The N, Kawamura T, Nakagawa H, Nakayama K, Tahara Y and Ohsuga A Human activity mining using conditional radom fields and self-supervised learning Proceedings of the Second international conference on Intelligent information and database systems: Part I, (140-149)
  62. Meng D, Poslad S and Wang Y An intelligent context-aware spatial routing system in mobile environment Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (5461-5464)
Contributors
  • Queen Mary University of London

Recommendations