Wireless Networks

, Volume 10, Issue 6, pp 689–700

Smart Identification Frameworks for Ubiquitous Computing Applications

  • Kay Römer
  • Thomas Schoch
  • Friedemann Mattern
  • Thomas Dübendorfer


We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe such technologies and their potential application areas, then give an overview of some of the applications we have developed. Based on the experience we have gained from developing these systems, we point out design concepts that we have found useful for structuring and implementing such applications. Building upon these concepts, we have created two frameworks based on Jini (i.e., distributed Java objects) and Web Services to support the development of ubiquitous computing applications that make use of smart identification technology. We describe our prototype frameworks, discuss the underlying concepts and present some lessons learned.

ubiquitous computing RFID tags virtual counterparts Jini Web Services 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    B. Brummit, B. Meyers, J. Krumm, A. Kern and S. Shafer, Easy living: technologies for intelligent environments, in: HUC 2000, Bristol, UK (September 2000).Google Scholar
  2. [2]
    T. Dübendorfer, An extensible infrastructure and a representation scheme for distributed smart proxies of real world objects, Master's Thesis, ETH Zurich (2001). Also available as Technical Report TR-359.Google Scholar
  3. [3]
    E. Fleisch and M. Dierkes, Betriebswirtschaftliche Anwendungen des Ubiquitous Computing – Beispiele, Auswirkungen und Visionen, in: Total Vernetzt, ed. F. Mattern (Springer, Heidelberg, 2003).Google Scholar
  4. [4]
    C. Floerkemeier, M. Lampe and T. Schoch, The Smart Box concept for ubiquitous computing environments, in: Smart Objects Conference (sOc) 2003, Grenoble, France (May 2003).Google Scholar
  5. [5]
    R. Grimm, System support for pervasive applications, Ph.D. Thesis, University of Washington, Department of Computer Science and Engineering (December 2002).Google Scholar
  6. [6]
    B. Johanson, A. Fox and T. Winograd, The interactive workspaces project: Experiences with ubiquitous computing rooms, IEEE Pervasive Computing 1(2) (2002) 71–78.Google Scholar
  7. [7]
    A. Kambil and D. Brooks, Auto-ID across the value chain: from dramatic potential to greater efficiency and profit, Technical Report ACN-AUTOID-BC-001, MIT Auto-ID Center Cambridge (2002).Google Scholar
  8. [8]
    T. Kindberg et al., People, places, things: Web presence for the real world, in: WMCSA 2000, Monterey, USA (December 2000).Google Scholar
  9. [9]
    M. Lampe and M. Strassner, The potential of RFID for moveable asset management, in: Workshop on Ubiquitous Commerce, Ubicomp'03, Seattle, USA (October 2003).Google Scholar
  10. [10]
    M. Langheinrich, F. Mattern, K. Römer and H. Vogt, First steps towards an event–based infrastructure for smart things, in: Ubiquitous Computing Workshop, PACT 2000, Philadelphia, USA (October 2000).Google Scholar
  11. [11]
    G.J. Nelson, Context-aware and location systems, Ph.D. Thesis, University of Cambridge (1998).Google Scholar
  12. [12]
    Oat Systems and MIT Auto-ID Center, The Savant, Technical Report MIT-AUTOID-TM-003, MIT Auto-ID Center (May 2002).Google Scholar
  13. [13]
    M. Roman, C. Hess and R. Campbell, Gaia: An OO middleware infrastructure for ubiquitous computing environments, in: ECOOP Workshop on Object-Orientation and Operating Systems (ECOOP-OOOSWS) 2002, Malaga, Spain (June 2002).Google Scholar
  14. [14]
    K. Römer and S. Domnitcheva, Smart Playing Cards – A ubiquitous computing game, Journal for Personal and Ubiquitous Computing 6(6) (2002) 371–378.Google Scholar
  15. [15]
    S. Sarma, D. Brock and K. Ashton, The networked physical world – Proposals for engineering the next generation of computing, commerce and automatic identification, Technical Report MIT-AUTOID-WH-001, MIT Auto-ID Center (October 2000).Google Scholar
  16. [16]
    P. Tandler, Software infrastructure for ubiquitous computing environments: supporting synchronous collaboration with heterogeneous devices, in: Ubicomp 2001, Atlanta, USA (September 2001).Google Scholar
  17. [17]
    P. Verissimo, V. Cahill, A. Casimiro, K. Cheverst, A. Friday and J. Kaiser, CORTEX: Towards supporting autonomous and cooperating sentient entities, in: European Wireless 2002, Florence, Italy (February 2002).Google Scholar
  18. [18]
    H. Vogt, Efficient object identification with passive RFID tags, in: Pervasive 2002, Zurich, Switzerland (August 2002) pp. 98–113.Google Scholar
  19. [19]
    R. Want, K. Fishkin, A. Gujar and B. Harrison, Bridging physical and virtual worlds with electronic tags, in: ACM Conference on Human Factors in Computing Systems (CHI 99), Pittsburgh, USA (May 1999).Google Scholar
  20. [20]
    Jini Architecture Specification, www.sun.com/jini/specs/Google Scholar
  21. [21]
    The Philips i-code system, www-us2.semiconductors. philips.com/identification/products/icodeGoogle Scholar

Copyright information

© Kluwer Academic Publishers 2004

Authors and Affiliations

  • Kay Römer
    • 1
  • Thomas Schoch
    • 1
  • Friedemann Mattern
    • 1
  • Thomas Dübendorfer
    • 2
  1. 1.Department of Computer ScienceInstitute for Pervasive ComputingETH Zurich, CH-8092 ZurichSwitzerland
  2. 2.Department of Electrical EngineeringComputer Engineering and Networks LabETH Zurich, CH-8092 ZurichSwitzerland

Personalised recommendations