Ubisafe Computing: Vision and Challenges (I)

  • Jianhua Ma
  • Qiangfu Zhao
  • Vipin Chaudhary
  • Jingde Cheng
  • Laurence T. Yang
  • Runhe Huang
  • Qun Jin
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4158)


In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people sometime, somewhere; a few of them can even gratify some of the people anytime, anywhere. However, at present, none of the computing paradigms intend to gratify all the people anytime, anywhere. With the rapid advance of information technology and the spread of information services, the IT disparity in age, social standing, and race of the people has been expanding and has become a critical social problem of the 21st century. Thus, we have a fundamental question: Can we construct, in a unified methodology, a computing environment that can gratify all the people in all situations, all places and all the time? We propose a novel and inclusive computing paradigm, named ubisafe computing, for studying and providing possible solutions to the above problem. The ultimate goal of ubisafe computing is to build a computing environment in which all people and organizations can benefit from ubiquitous services anytime anywhere with assured and desired satisfaction without worrying or thinking about safety. That is, the ubisafe computing vision emphasizes two basic aspects: ubiquitous safety and ubiquitous satisfaction to all people in all situations. This paper presents the motivations for the ubisafe computing vision but focuses on one basic aspect of ubiquitous safety that covers reliability, security, privacy, persistency, trust, risk, out of control, and other watchfulness while considering novel, essential ubicomp or percomp features of unobtrusive computers, diverse users/people and life-like systems.


Computing Environment Ubiquitous Computing Pervasive Computing Safety Problem Computing Paradigm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Weiser, M.: The Computer for the Twenty-First Century. Scientific American, 94–104 (September 1991)Google Scholar
  2. 2.
    Satyanarayanan, M.: Pervasive Computing: Vision and Challenges. IEEE Personal Communication, 10–17 (August 2001)Google Scholar
  3. 3.
    The European Union Report on AmI: Scenarios for Ambient Intelligence in 2010 (2001),
  4. 4.
    Shchilit, B.N., Adams, N., Want, R.: Context Aware Computing Applications. In: Proc. of Workshop on Mobile Computing, Systems and Applications, CA (December 1994)Google Scholar
  5. 5.
    Yau, S., Karim, F., Wang, Y., Wang, B., Gupta, S.K.S.: Reconfigurable Context-Sensitive Middleware for Pervasive Computing. IEEE Pervasive Computing 1(3), 33–40 (2002)CrossRefGoogle Scholar
  6. 6.
    Addlesee, M., Curwen, R.W., Hodges, S., Newman, J., Steggles, P., Ward, A., Hopper, A.: Implementing a Sentient Computing System. IEEE Computer 34(8), 50–56 (2001)Google Scholar
  7. 7.
    Tennenhouse, D.L.: Proactive Computing. Communications of ACM 43(5), 43–50 (2000)CrossRefGoogle Scholar
  8. 8.
    Kephart, J.O., Chess, D.M.: The Vision of Autonomic Computing. IEEE Computer 36(1), 41–50 (2003)Google Scholar
  9. 9.
    Abelson, H., Allen, D., Coore, D., Hanson, C., Rauch, E., Sussman, G.H., Weiss, R.: Amorphous Computing. Communications of the ACM 43(5), 74–82 (2000)CrossRefGoogle Scholar
  10. 10.
    Mamei, M., Zambonelli, F.: Spray Computers: Frontiers of Self-organization for Pervasive Computing. In: 3rd Italian Workshop From Objects to Agents (September 2003)Google Scholar
  11. 11.
    Müller-Schloer, C.: Organic Computing – On the Feasibility of Controlled Emergence. In: Proceedings of CODES + ISSS, pp. 2–5. ACM Press, New York (2004)Google Scholar
  12. 12.
    Cheng, J.: Persistent Computing Systems as Continuously Available, Reliable, and Secure Systems. In: Proceedings of 1st International Conference on Availability, Reliability and Security, pp. 631–638. IEEE Computer Society Press, Los Alamitos (2006)CrossRefGoogle Scholar
  13. 13.
    Ma, J.: Smart u-Things – Challenging Real World Complexity. IPSJ Symposium Series (19), 146–150 (2005)Google Scholar
  14. 14.
    Mundie, C., de Vries, P., Haynes, P., Corwine, M.: Trustworthy Computing (2002),

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jianhua Ma
    • 1
  • Qiangfu Zhao
    • 2
  • Vipin Chaudhary
    • 3
  • Jingde Cheng
    • 4
  • Laurence T. Yang
    • 5
  • Runhe Huang
    • 1
  • Qun Jin
    • 6
  1. 1.Hosei UniversityTokyoJapan
  2. 2.The University of AizuFukushimaJapan
  3. 3.Wayne State UniversityUSA
  4. 4.Saitama UniversitySaitamaJapan
  5. 5.St. Francis Xavier UniversityCanada
  6. 6.Waseda UniversitySaitamaJapan

Personalised recommendations