Skip to main content

Specification and Verification of Complex Location Events with Panoramic

  • Conference paper
Pervasive Computing (Pervasive 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6030))

Included in the following conference series:

Abstract

We present the design and evaluation of Panoramic, a tool that enables end-users to specify and verify an important family of complex location events. Our approach aims to reduce or eliminate critical barriers to deployment of emerging location-aware business activity monitoring applications in domains like hospitals and office buildings. Panoramic does not require users to write code, understand complex models, perform elaborate demonstrations, generate test location traces, or blindly trust deterministic events. Instead, it allows end-users to specify and edit complex events with a visual language that embodies natural concepts of space and time. It also takes a novel approach to verification, in which events are extracted from historical sensor data traces and then presented with intelligible, hierarchical visualizations that represent uncertainty with probabilities. We build on our existing software for specifying and detecting events while enhancing it in non-trivial ways to facilitate event specification and verification. Our design is guided by a formative study with 12 non-programmers. We also use location traces from a building-scale radio frequency identification (RFID) deployment in a qualitative evaluation of Panoramic with 10 non-programmers. The results show that end-users can both understand and verify the behavior of complex location event specifications using Panoramic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Amelior ORTracker: Orchestrate Patient Flow (2009), http://www.pcts.com/unified/ortracker.php

  2. Assad, M., et al.: PersonisAD: Distributed, Active, Scrutable Model Framework for Context-Aware Services. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 55–72. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  3. Bardram, J.E.: The Java Context Awareness Framework (JCAF) – A service infrastructure and programming framework for context-aware applications. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 98–115. Springer, Heidelberg (2005)

    Google Scholar 

  4. Bellotti, V., Edwards, K.: Intelligibility and Accountability: Human Considerations in Context Aware Systems. HCI 16, 193–212 (2001)

    Article  Google Scholar 

  5. Chen, J., Weld, D.S.: Recovering from Errors During Programming by Demonstration. In: IUI 2008, pp. 159–168 (2008)

    Google Scholar 

  6. Cheverst, K., et al.: Exploring Issues of User Model Transparency and Proactive Behaviour in an Office Environment Control System. User Modeling and User-Adapted Interaction 15(3-4), 235–273 (2005)

    Article  Google Scholar 

  7. Dey, A., Newberger, A.: Support for Context-Aware Intelligibility and Control. In: CHI 2009, pp. 859–868 (2009)

    Google Scholar 

  8. Dey, A.K., et al.: A CAPpella: Programming by Demonstration of Context-Aware Applications. In: CHI 2004, vol. 1, pp. 33–40 (2004)

    Google Scholar 

  9. Fails, J., Olsen, D.: A Design Tool for Camera-Based Interaction. In: CHI 2003, pp. 449–456 (2003)

    Google Scholar 

  10. Garofalakis, M.N., et al.: Probabilistic Data Management for Pervasive Computing: The Data Furnace Project. IEEE Data Eng. Bull. 29(1), 57–63 (2006)

    Google Scholar 

  11. Google Maps API - Google Code, http://code.google.com/apis/maps/

  12. Google Web Toolkit - Google Code (2009), http://code.google.com/webtoolkit/

  13. Hartmann, B., et al.: Authoring Sensor-Based Interactions by Demonstration with Direct Manipulation and Pattern Recognition. In: CHI 2007, pp. 145–154 (2007)

    Google Scholar 

  14. Heer, J., et al.: Liquid: Context-Aware Distributed Queries. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 140–148. Springer, Heidelberg (2003)

    Google Scholar 

  15. Real-time locating systems 2009-2019 (2009), http://www.idtechex.com/research/reports/

  16. Knoll, S., et al.: Viewing Personal Data Over Time. In: CHI 2009 Workshop on Interacting with Temporal Data (April 2009)

    Google Scholar 

  17. Lamming, M., Bohm, D.: SPECs: Another Approach to Human Context and Activity Sensing Research, Using Tiny Peer-to-Peer Wireless Computers. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 192–199. Springer, Heidelberg (2003)

    Google Scholar 

  18. Lau, T., et al.: Why PBD Systems Fail: Lessons Learned for Usable AI. In: CHI 2008 (2008)

    Google Scholar 

  19. Letchner, J., et al.: Challenges for Event Queries over Markovian Streams. IEEE Internet Computing 12(6), 30–36 (2008)

    Article  Google Scholar 

  20. Li, Y., et al.: Topiary: A Tool for Prototyping Location-Enhanced Applications. In: UIST 2004, pp. 217–226 (2004)

    Google Scholar 

  21. Lim, B., Dey, A.: Assessing Demand for Intelligibility in Context-Aware Applications. In: Ubicomp 2009, pp. 195–204 (2009)

    Google Scholar 

  22. Lymberopoulos, D., et al.: A Sensory Grammar for Inferring Behaviors in Sensor Networks. In: IPSN 2006, pp. 251–259 (2006)

    Google Scholar 

  23. Maynes-Aminzade, D., et al.: Eyepatch: Prototyping Camera-Based Interaction Through Examples. In: UIST 2007, pp. 33–42 (2007)

    Google Scholar 

  24. McCarthy, J.F., Anagnost, T.D.: EVENTMANAGER: Support for the Peripheral Awareness of Events. In: Thomas, P., Gellersen, H.-W. (eds.) HUC 2000. LNCS, vol. 1927, pp. 227–235. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  25. Olston, C., et al.: Generating Example Data for Dataflow Programs. In: SIGMOD 2009, pp. 245–256 (2009)

    Google Scholar 

  26. Pascoe, J.: The Stick-e Note Architecture: Extending the Interface Beyond the User. In: IUI 1997, pp. 261–264 (1997)

    Google Scholar 

  27. Philly Hospital Uses RTLS to Track Patient Flow, Care and Training (May 2009), http://www.rfidjournal.com/article/view/4934/1

  28. Ré, C., et al.: Event Queries on Correlated Probabilistic Streams. In: SIGMOD 2008, June 2008, pp. 715–728 (2008)

    Google Scholar 

  29. RTLS Providers Cite Strong Demand From Hospitals (June 2009), http://www.rfidjournal.com/article/print/4981

  30. Salber, D., et al.: The Context Toolkit: Aiding the Development of Context-Enabled Applications. In: CHI 1999, pp. 434–441 (1999)

    Google Scholar 

  31. SIMILE Timeline (2009), https://simile.mit.edu/timeline/

  32. Sohn, T., Dey, A.: iCAP: An Informal Tool for Interactive Prototyping of Context-Aware Applications. In: CHI 2003, pp. 974–975 (2003)

    Google Scholar 

  33. Truong, K.N., et al.: CAMP: A Magnetic Poetry Interface for End-User Programming of Capture Applications for the Home. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol. 3205, pp. 143–160. Springer, Heidelberg (2004)

    Google Scholar 

  34. Vilamovska, A., et al.: Study on the requirements and options for RFID application in healthcare. Technical report, RAND Corporation (July 2009)

    Google Scholar 

  35. Want, R., et al.: An Overview of the PARCTAB Ubiquitous Computing Experiment. IEEE Personal Communications 2(6), 28–33 (1995)

    Article  Google Scholar 

  36. Welbourne, E., et al.: Challenges for Pervasive RFID-based Infrastructures. In: PERTEC 2007, March 2007, pp. 388–394 (2007)

    Google Scholar 

  37. Welbourne, E., et al.: Cascadia: A System for Specifying, Detecting, and Managing RFID Events. In: MobiSys 2008, June 2008, pp. 281–294 (2008)

    Google Scholar 

  38. Welbourne, E., et al.: Building the Internet of Things Using RFID: The RFID Ecosystem Experience. IEEE Internet Computing (May 2009)

    Google Scholar 

  39. Welbourne, E., et al.: Longitudinal Study of a Building-Scale RFID Ecosystem. In: MobiSys 2009 (June 2009)

    Google Scholar 

  40. Whitehouse, K., et al.: Automatic Programming with Semantic Streams. In: SenSys 2005, November 2005, pp. 290–291 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Welbourne, E., Balazinska, M., Borriello, G., Fogarty, J. (2010). Specification and Verification of Complex Location Events with Panoramic. In: Floréen, P., Krüger, A., Spasojevic, M. (eds) Pervasive Computing. Pervasive 2010. Lecture Notes in Computer Science, vol 6030. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12654-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12654-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12653-6

  • Online ISBN: 978-3-642-12654-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics