Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Consistent Modelling of Users, Devices and Sensors in a Ubiquitous Computing Environment


This paper describes the use of an accretion-resolution user modelling representation to model people, places and objects. We explain the motivation for the key properties of the representation, especially those of particular importance for ubiquitous computing: firstly, for flexibility in interpreting the typically noisy and potentially conflicting evidence about users’ locations; secondly, to support users in scrutinising their user model, the processes that determine its contents and the way that it is used in the ubiquitous computing environment.

A novel and important aspect of this work is our extension of the representation beyond modelling just users, using it also to represent the other elements such as devices, sensors, rooms and buildings. We illustrate our approach in terms of models we have been building for a system which enables users to gain personalised information about the sensors and services in a ubiquitous computing environment. We report experiments on the scalability and the management of inconsistency in modelling of location, based on accretion-resolution

This is a preview of subscription content, log in to check access.


  1. Ackerman M., Cranor, L. and Reagle, J.: 1999, Privacy critics: UI components to safeguard user’ privacy’. In: M.H. Williams (ed.): The CHI is the Limit: Human Factors in Computing Systems, CHI99 Conference Proceedings. Pittsburgh, Pennsylvania, USA, pp. 1–8.

  2. M. Addlesee R. Curwen S. Hodges J. Newman P. Steggles A. Ward A. Hopper (2001) ArticleTitleImplementing a sentient computing system IEEE Computer 34 IssueID8 50–56

  3. T. Apted J. Kay A Lum J. Uther (2003) Visualisation of ontological inferences for user control of personal web agents E Banissi K Borner C Chen G Clapworthy C Maple A Lobben C Moore J Roberts A. Ursyn J. Zhang (Eds) Proceedings of IV03-VSW Information Visualisation – Semantic Web Visualisation. UK London 305–311

  4. M Bauer C Becker K. Rothermel (2002) ArticleTitleLocation models from the perspective of context-aware applications and mobile ad hoc networks Personal and Ubiquitous Computing 6 IssueID5-6 322–328 Occurrence Handle10.1007/s007790200036

  5. Bellotti, V., Back, M., Edwards, W.K., Grinter, R.E., Henderson, A. and Lopes, C.V.: 2002, Making sense of sensing systems: five questions for designers and researchers. In: CHI ’02: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Minneapolis, Minnesota, USA, pp. 415–422.

  6. G. Brajnik C. Tasso (1994) ArticleTitleA shell for developing non-monotonic user modeling systems’ International Journal of Human-Computer Studies 40 IssueID1 36–62 Occurrence Handle10.1006/ijhc.1994.1003

  7. Brummit, B., Krumm, J., Kern, A. and Shafer, S.A.: 2000, Easyliving: technologies for intelligent environments’. In: Proceedings of: 2nd International Symposium on Handheld and Ubiquitous Computing. Bristol, United Kingdom, pp. 12–29.

  8. DJ. Carmichael J. Kay RJ. Kummerfeld (2004) Personal ontologies for feature selection in intelligent environment visualisations J. Baus C. Kray R. Porzel (Eds) Proceedings of AIMS’04 – Artificial Intelligence in Mobile System. Nottingham England 44–4451

  9. Cheverst, K., Byun, H.E., Fitton, D., Sas, C., Kray, C. and Villar, N.: 2005, Exploring issues of user model transparency and proactive behaviour in an office environment control system. User Modeling and User-Adapted Interaction: The Journal of Personalization Research (this issue).

  10. D. Chin W. Wahlster (1989) K NOME: modeling what the user knows in UC A. Kobsa (Eds) User Models in Dialog Systems Springer-Verlag Berlin 74–107

  11. M. Czarkowski J. Kay (2003) How to give the user a sense of control over the personalization of adaptive hypertext? P. Bra Particlede H. Davis J. Kay (Eds) Proceedings of Workshop on Adaptive Hypermedia and Adaptive Web-Based Systems User Modeling 2003 Session. University of Pittsburgh, Johnstown PA, USA 121–132

  12. J. Doyle (1979) ArticleTitleA truth maintenance system Artificial Intelligence 12 IssueID3 231–171 Occurrence Handle10.1016/0004-3702(79)90008-0

  13. EU, T.E.P. and the Council of the European Union, 1995, European Community Directive on Data Protection. http://www.doc.gov/ecommerce/eudir.htm.

  14. Godefroid, P., Herbsleb, J.D., Jagadeesan, L.J. and Li, D. (2000). Ensuring privacy in presence awareness systems: an automated verification approach. In: Proceedings of ACM Conference on Computer Supported Cooperative Work. Philadelphia, Pennsylvania, USA.

  15. Hatala, M. and Wakkary, R.: 2005, User modeling and semantic technologies in support of a tangible interface.User Modeling and User-Adapted Interaction: The Journal of Personalization Research (this issue).

  16. Heckmann, D.: 2003a, Integrating privacy aspects into ubiquitous computing: a basic user interface for personalization. In: Proceedings of Artificial Intelligence in Mobile Systems Workshop at UbiComp 2003, Seattle, Washington, USA.

  17. Heckmann, D.: 2003b, A specialised representation for ubiquitous computing and user modeling. In: Proceedings of Workshop on User Modelling for Ubiquitous Computing at User Modelling 2003 (UM’03) . University of Pittsburgh, Johnstown, PA, USA. http://www.di.uniba.it/ubium03/heckmann-2.pdf.

  18. Heckmann, D.: 2004, Ubisworld. http://www.u2m.org/.

  19. Hengartner, U. and Steenkiste, P.: 2003, Protecting access to people location information. In: Proceedings of First International Conference on Security in Pervasive Computing. Boppard, Germany, pp. 25–38.

  20. J. Hightower G. Borriello (2001) ArticleTitleLocation systems for ubiquitous computing IEEE Computer 34 IssueID8 57–66

  21. J. Hightower G. Borriello (2004) Particle filters for location estimation in ubiquitous computing N. Davies E. Mynatt I. Siio (Eds) Proceedings of 6th International Conference on Ubiquitous Computing (UbiComp 2004) Nottingham England 88–106

  22. X. Huang G.I. McCalla J.E. Greer E. Neufeld (1991) ArticleTitleRevising deductive knowledge and stereotypical knowledge in a student model User Modeling and User-Adapted Interaction: The Journal of Personalization Research 1 IssueID1 87–116 Occurrence Handle10.1007/BF00158953

  23. Judd, G. and Steenkiste, P.: 2003, Providing contextual information to pervasive computing applications. In: Proccedings of IEEE International Conference on Pervasive Computing (PERCOM), Dallas, pp. 133–142.

  24. R. Kass (1991) ArticleTitleBuilding a user model implicitly from a cooperative advisory dialog User Modeling and User-Adapted Interaction: The Journal of Personalization Research 1 IssueID3 203–258 Occurrence Handle10.1007/BF00141081

  25. J. Kay (1995) ArticleTitleThe um toolkit for cooperative user modelling User Modeling and User-Adapted Interaction: The Journal of Personalization Research 4 IssueID3 149–196 Occurrence Handle10.1007/BF01100243

  26. J. Kay B. Kummerfeld P. Lauder (2002) Personis: a server for user models P.D. Bra P. Brusilovsky R. Conejo (Eds) Proceedings of AH’2002 Adaptive Hypertext 2002 Malaga Spain 203–212

  27. J. Kay A. Lum J. Uther (2003) How can users edit and control their models in ubiquitous computing environments? K. Cheverst N. Carolis Particlede A. Kruger (Eds) UM03 Workshop on User Modeling for Ubiquitous Computing University of Pittsburgh Johnstown PA USA 12–16

  28. Kidd, C.D., Orr, R., Abowd, G.D., Atkeson, C.G., Essa, I.A., MacIntyre, B., Mynatt, E.D., Starner, T.E. and Newstetter, W.: 1999, The Aware Home: a living laboratory for ubiquitous computing research. In: Proceedings of the Second International Workshop on Cooperative Buildings, Integrating Information, Organization, and Architecture, Pittsburgh, USA, pp. 191–198.

  29. A. Kobsa (2001) ArticleTitleGeneric user modeling systems User Modeling and User-Adapted Interaction – Ten Year Anniversary Issue 11 IssueID1-2 49–63 Occurrence Handle10.1023/A:1011187500863

  30. Kobsa A. (2001b). Invited keynote: tailoring privacy to user’s needs. In: Proceedings of the User Modeling Conference. Sonthofen, Germany, pp. 303–313.

  31. A. Kobsa (2002) ArticleTitlePersonalized hypermedia and international privacy Communications of the ACM 45 IssueID5 64–67 Occurrence Handle10.1145/506218.506249

  32. A. Kobsa W. Pohl (1995) ArticleTitleThe user modeling shell system BGP-MS User Modeling and User-Adapted Interaction: The Journal of Personalization Research 4 IssueID2 59–106 Occurrence Handle10.1007/BF01099428

  33. A. Kobsa J. Schreck (2003) ArticleTitlePrivacy through pseudonymity in user-adaptive systems ACM Transactions on Internet Technology 3 IssueID2 149–183 Occurrence Handle10.1145/767193.767196

  34. Y. Kono M. Ikeda R. Mizoguchi (1994) ArticleTitleTHEMIS: a nonmonotonic inductive student modeling system International Journal of Artificial Intelligence in Education 5 IssueID3 371–413

  35. M. Langheinrich (2001) Privacy by design – principles of privacy-aware ubiquitous systems G.D. Abowd B. Brumitt S.A. Shafer (Eds) Proceedings of 3rd International Conference on Ubiquitous Computing (UbiComp 2001) Atlanta, Georgia USA 273–291

  36. Langheinrich, M.: 2002a, As we may live – real-world implications of ubiquitous computing. http://www.vs.inf.ethz.ch/publ/papers/uc-implications.pdf.

  37. M. Langheinrich (2002) A privacy awareness system for ubiquitous computing environments G. Borriello L.E. Holmquist (Eds) Proceedings of 4th International Conference on Ubiquitous Computing (UbiComp 2002) Goteberg Sweden 237–245

  38. T. Lau O. Etzioni D.S. Weld (1999) ArticleTitlePrivacy interfaces for information management Communications of the ACM 42 IssueID10 89–94 Occurrence Handle10.1145/317665.317680

  39. Lederer, S., Hong, J.I., Jiang, X., Dey, A.K., Landay, J.A. and Mankoff, J.: 2003, Towards everyday privacy for ubiquitous computing of everyday privacy in ubiquitous computing environments. Technical report ucb-csd-03-1283, Computer Science Division, University of California, Berkley.

  40. Lehmann, O., Bauer, M., Becker, C. and Nicklas, D.: 2004, From home to world - supporting context-aware applications through world models. In: Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PERCOM’04) . Orlando, Florida, pp. 297–306.

  41. J. Lin R. Laddaga H. Naito (2002) Personal location agent for communicating entities (PLACE) F. Patern o` (Eds) Proceedings of Fourth International Symposium on Human Computer Interaction with Mobile Devices (Mobile HCI 2002), Vol. 2411 of Lecture Notes in Computer Science. Pisa Italy 45–59

  42. C. Miller (2000) Rules of etiquette, or how a mannerly AUI should comport itself to gain social acceptance and be perceived as gracious and well-behaved in polite society S. Rogers W. Iba (Eds) Papers from 2000 Adaptive User Interfaces AAAI Spring Symposium, Technical Report SS-00-01 Stanford CA 80–81

  43. G. Myles A. Friday N. Davies (2003) ArticleTitlePreserving privacy in environments with location-based applications IEEE Pervasive Computing 2 IssueID1 56–64 Occurrence Handle10.1109/MPRV.2003.1186726

  44. Mynatt, E.D. and Nguyen, D.: 2001, Making Ubiquitous Computing Visible. In: Proceedings of CHI 2001 Workshop on Building the Ubiquitous Computing User Experience. Minneapolis, Minnesota. http://www2.parc.com/csl/ projects/ubicomp-workshop/positionpapers/mynatt.pdf (visited April 2003).

  45. J. Nielsen (2000) Designing Web Usability Indianapolis, Indiana USA: New Riders

  46. P3P: 2004, Platform for Privacy Preferences (P3P). http://www.w3.org/P3P/ (visited April 2004).

  47. A. Paiva J. Self (1995) ArticleTitleTAGUS – a user and learner modeling workbench User Modeling and User-Adapted Interaction: The Journal of Personalization Research 4 IssueID3 197–228 Occurrence Handle10.1007/BF01100244

  48. D. Patterson L. Liao K. Gajos M. Coller N. Livic K. Olson S. Wang D. Fox H. Kautz (2004) Opportunity knocks: a system to provide cognitive assistance with transportation services N. Davies E. Mynatt I. Siio (Eds) Proceedings of 6th International Conference on Ubiquitous Computing (UbiComp 2004) Nottingham England 433–450

  49. Petrelli, D. and Not, E.: 2005, User-centred design of flexible hypermedia for a mobile guide: reflections on the HyperAudio Experience. User Modeling and User-Adapted Interaction: The Journal of Personalization Research (this issue).

  50. Priyantha, N.B., Chakraborty, A. and Balakrishnan, H.: 2000, The Cricket location-support system. In: MobiCom ’00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, pp.32–43.

  51. E. Rich W. Wahlster (1989) Stereotypes and user modeling A. Kobsa (Eds) User Models in Dialog Systems Springer-Verlag Berlin 35–51

  52. Scott, J. and Hazas, M.: 2003, User-friendly surveying techniques for location-aware systems. In: Proceedings of 5th International Conference on Ubiquitous Computing (UbiComp 2003). Seattle, Washington, USA, pp. 44–53.

  53. Segall, B., Arnold, D., Boot, J., Henderson, M. and Phelps, T.: 2000, Content based routing with Elvin4. In: Proceedings AUUG2K. Canberra, Australia. http://elvin.dstc.edu.au/doc/papers/auug2k/auug2k.pdf.

  54. J. Uther J. Kay (2003) A web-based visualion of large user models P. Brusilovsky A. Corbett F. Rosis Particlede (Eds) Proceedings of 9th International Conference on User Modeling (UM 2003) Johnston PA USA 198–202

  55. Want R., Hopper A., Falco V., Gibbons J. (1992). The active badge location system. ACM Transactions on Information Systems. 10(1)

  56. Zimmermann, A., Sprecht, M. and Lorenz, A.: 2005, Personalisation and context-management. User Modeling and User-Adapted Interaction: The Journal of Personalization Research. (this issue).

  57. G.K. Zipf (1949) Human Behaviour and the Principle of Least Effort Addison-Wesley Cambridge, MA.

Download references

Author information

Correspondence to David J. Carmichael.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Carmichael, D.J., Kay, J. & Kummerfeld, B. Consistent Modelling of Users, Devices and Sensors in a Ubiquitous Computing Environment. User Model User-Adap Inter 15, 197–234 (2005). https://doi.org/10.1007/s11257-005-0001-z

Download citation


  • modelling location
  • modelling pervasive computing environments
  • scrutability
  • user control
  • user model representation