Building Common Ground for Face to Face Interactions by Sharing Mobile Device Context

  • Vassilis Kostakos
  • Eamonn O’Neill
  • Anuroop Shahi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3987)


We describe an application used to share context and build common ground between nearby users. Our application runs on mobile devices and allows users securely to exchange the contents of their address books. This exchange reveals only which entries are common to the two users. We explore the use of our application using both Bluetooth and NFC as an underlying technology. Finally, we present the results of a small user study we have conducted.


Mobile Device Common Ground Near Field Communication Mutual Knowledge Address Book 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Adams, A., Sasse, M.A.: Privacy Issues in Ubiquitous Multimedia Environments: Wake Sleeping Dogs, or Let Them Lie? In: Proceedings of INTERACT 1999, pp. 214–221 (1999)Google Scholar
  2. 2.
    Beale, R.: Supporting social interaction with the smartphone – designing pervasive systems. IEEE Pervasive Computing 4(2), 35–41 (2005)CrossRefGoogle Scholar
  3. 3.
    Clark, H.H.: Arenas of language use. University of Chicago Press, Chicago (1992)Google Scholar
  4. 4.
    Clark, H.H.: Using language. Cambridge University Press, Cambridge (1996)CrossRefGoogle Scholar
  5. 5.
    Clark, H.H., Marshall, C.R.: Definite reference and mutual knowledge. In: Joshi, A.K., Webber, B.L., Sag, I.A. (eds.) Elements of discourse understanding, pp. 10–63. Cambridge University Press, Cambridge (1981)Google Scholar
  6. 6.
    Davis, B., Karahalis, K.: Telelogs: a social communication space for urban environments. In: Proceedings of the 7th interantional Conference on Human Computer interaction with Mobile Devices & Services (MobileHCI 2005), pp. 231–234 (2005)Google Scholar
  7. 7.
    Dix, A., Finlay, J., Abowd, G.D., Beale, R.: Human-computer interaction, 3rd edn. Prentice Hall Europe, London (2003)zbMATHGoogle Scholar
  8. 8.
    Eagle, N., Pentland, A.: Reality mining: sensing complex social systems. Journal of Personal and Ubiquitous Computing, 1–14 (December 2005)Google Scholar
  9. 9.
    Grayson, D.M., Monk, A.F.: Are you looking at me? Eye contact and desktop video conferencing. ACM TOCHI 10(3), 221–243 (2003)CrossRefGoogle Scholar
  10. 10.
    Hall, E.T.: The hidden dimension. Man’s use of space in public and private. Bodley Head, London (1969)Google Scholar
  11. 11.
    Lewis, D.K.: Convention: a philosophical study. Harvard University Press, Cambridge (1969)Google Scholar
  12. 12.
    Milgram, S.: The individual in a social world: essays and experiments. Addison-Wesley, Reading (1977)Google Scholar
  13. 13.
    Nardi, B.: Beyond bandwidth: Dimension of connection in interpersonal interaction. The Journal of Computer-supported Cooperative Work 14, 91–130 (2005)CrossRefGoogle Scholar
  14. 14.
    O’Neill, E., Woodgate, D., Kostakos, V.: Easing the wait in the Emergency Room: building a theory of public information systems. In: Proceedings of the ACM Designing Interactive Systems (DIS 2004), Boston, MA, pp. 17–25 (2004)Google Scholar
  15. 15.
    Paulos, E., Goodman, E.: The familiar stranger: anxiety, comfort, and play in public spaces. In: Proceedings of CHI 2004, pp. 223–230 (2004)Google Scholar
  16. 16.
    Raento, M., Oulasvirta, A., Petit, R., Toivonen, H.: ContextPhone - A prototyping platform for context-aware mobile applications. IEEE Pervasive Computing 4(2), 51–59 (2005)CrossRefGoogle Scholar
  17. 17.
    Salvador, T., Barile, S., Sherry, J.: Ubiquitous computing design principles: supporting human-human and human-computer transactions. In: Extended Abstracts of CHI 2004, pp. 1497–1500 (2004)Google Scholar
  18. 18.
    Stalnaker, R.C.: Assertions. In: Cole, P. (ed.) Syntax and Semantics 9: pragmatics, pp. 315–332. Academic Press, New York (1978)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Vassilis Kostakos
    • 1
  • Eamonn O’Neill
    • 1
  • Anuroop Shahi
    • 1
  1. 1.Department of Computer ScienceUniversity of BathBathUK

Personalised recommendations