Domino: Exploring Mobile Collaborative Software Adaptation

  • Marek Bell
  • Malcolm Hall
  • Matthew Chalmers
  • Phil Gray
  • Barry Brown
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3968)


Social Proximity Applications (SPAs) are a promising new area for ubicomp software that exploits the everyday changes in the proximity of mobile users. While a number of applications facilitate simple file sharing between co–present users, this paper explores opportunities for recommending and sharing software between users. We describe an architecture that allows the recommendation of new system components from systems with similar histories of use. Software components and usage histories are exchanged between mobile users who are in proximity with each other. We apply this architecture in a mobile strategy game in which players adapt and upgrade their game using components from other players, progressing through the game through sharing tools and history. More broadly, we discuss the general application of this technique as well as the security and privacy challenges to such an approach.


Recommendation System Mobile User Mobile Agent Epidemic Spread Mobile Game 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ackerman, M.S., Malone, T.W.: Answer Garden: A Tool for Growing Organisational Memory. In: Proc. ACM Conf. on Office Information Systems, pp. 31–33 (1990)Google Scholar
  2. 2.
    Ametller, J., Robles, S., Ortega-Ruiz, J.A.: Self-Protected Mobile Agents. In: Proc. Joint Conference on Autonomous Agents and Multiagent Systems, vol. 1 (2004)Google Scholar
  3. 3.
    Barkhuus, L., Chalmers, M., Tennent, P., Hall, M., Bell, M., Sherwood, S., Brown, B.: Picking pockets on the lawn: The development of tactics and strategies in a mobile game. In: Beigl, M., Intille, S.S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol. 3660, pp. 358–374. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Birsan, D.: On Plug-ins and Extensible Architectures. ACM Queue 3(2) (March 2005)Google Scholar
  5. 5.
    Chalmers, M., et al.: The Order of Things: Activity-Centred Information Access. In: Proc. WWW 1998, pp. 359–367 (1998)Google Scholar
  6. 6.
    Chen, F., Yeager, W.: Poblano: A Distributed Trust Model for Peer-to-Peer Networks. JXTA Security White Paper (2001)Google Scholar
  7. 7.
    Crow, D., Smith, B.: The role of built-in knowledge in adaptive interface systems. In: Proc. ACM IUI, pp. 97–104 (1993)Google Scholar
  8. 8.
    Cypher, A.: EAGER: programming repetitive tasks by example. In: ACM CHI 1991, pp. 33–39 (1991)Google Scholar
  9. 9.
    Demers, A., et al.: Epidemic algorithms for replicated database maintenance. In: Proc. 6th ACM Symposium on Principles of Distributed Computing (PODC), pp. 1–12 (1987)Google Scholar
  10. 10.
    Edjlali, G., Acharya, A., Chaudhary, V.: History-based Access Control for Mobile Code. In: Proc. ACM Computer and Communications Security, pp. 38–48 (1998)Google Scholar
  11. 11.
    Edwards, W.K., Grinter, R.: At home with ubiquitous computing: Seven challenges. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 256–272. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  12. 12.
    Findlater, L., McGrenere, J.: A comparison of static, adaptive and adaptable menus. In: Proc. ACM CHI 2004, pp. 89–96 (2004)Google Scholar
  13. 13.
    Goldenberg, J., Shavitt, Y., Shir, E., Solomon, S.: Distributive immunization of networks against viruses using the ‘honey-pot’ architecture. Nature Physics 1(3), 184–188 (2005)CrossRefGoogle Scholar
  14. 14.
    Humble, J., Crabtree, A., Hemmings, T., Åkesson, K.-P., Koleva, B., Rodden, T., Hansson, P.: “Playing with the bits” user-configuration of ubiquitous domestic environments. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 256–263. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  15. 15.
    Khelil, A., Becker, C., et al.: An Epidemic Model for Information Diffusion in MANETs. In: Proc. ACM MSWiM (2002)Google Scholar
  16. 16.
    Mackay, W.: Patterns of Sharing Customizable Software. In: Proc. ACM CSCW 1990, pp. 209–221 (1990)Google Scholar
  17. 17.
    Mackay, W.: Triggers and barriers to customizing software. In: Proc. ACM CHI 1991, pp. 153–160 (1991)Google Scholar
  18. 18.
    MacLean, A., et al.: User-Tailorable Systems: Pressing the Issues with Buttons. In: Proc. ACM CHI 1990, pp. 175–182 (1990)Google Scholar
  19. 19.
    Nardi, B.A., Miller, J.: Twinkling Lights and Nested Loops: Distributed Problem Solving and Spreadsheet Development. In: CSCW and Groupware, pp. 29–52. Academic Press, London (1991)Google Scholar
  20. 20.
    Newman, M., et al.: Designing for Serendipity: Supporting End-User Configurations of Ubiquitous Computing Environments. In: Proc. ACM DIS 2002, pp. 147–156 (2002)Google Scholar
  21. 21.
    Page, J., Zaslavsky, A., Indrawan, M.: A buddy model of security for mobile agent communities operating in pervasive scenarios. In: Proc. Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation. CRPIT, vol. 32 (2004)Google Scholar
  22. 22.
    Persson, P., Blom, J., Jung, Y.: DigiDress: A Field Trial of an Expressive Social Proximity Application. In: Beigl, M., Intille, S.S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol. 3660, pp. 195–212. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  23. 23.
    Pfitzmann, A., Pfitzmann, B., Waidner, M.: Trusting Mobile User Devices and Security Modules. Computer 30(2), 61–68 (1997)CrossRefGoogle Scholar
  24. 24.
    Ravi, S., et al.: Security as a new dimension in embedded system design. In: Proc. Design Automation (June 2004)Google Scholar
  25. 25.
    Rodden, T., Benford, S.: The evolution of buildings and implications for the design of ubiquitous domestic environments. In: Proc. ACM CHI 2003, pp. 9–16 (2003)Google Scholar
  26. 26.
    Saeb, M., Hamza, M., Soliman, A.: Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree. In: Proc. sOc 2003 (2003)Google Scholar
  27. 27.
    Weld, D., et al.: Automatically personalizing user interfaces. In: Proc. IJCAI 2003, pp. 1613–1619. Morgan Kaufmann, San Francisco (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Marek Bell
    • 1
  • Malcolm Hall
    • 1
  • Matthew Chalmers
    • 1
  • Phil Gray
    • 1
  • Barry Brown
    • 1
  1. 1.Department of Computing ScienceUniversity of GlasgowGlasgowUK

Personalised recommendations