Ubisafe Computing: Vision and Challenges (I)
In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people sometime, somewhere; a few of them can even gratify some of the people anytime, anywhere. However, at present, none of the computing paradigms intend to gratify all the people anytime, anywhere. With the rapid advance of information technology and the spread of information services, the IT disparity in age, social standing, and race of the people has been expanding and has become a critical social problem of the 21st century. Thus, we have a fundamental question: Can we construct, in a unified methodology, a computing environment that can gratify all the people in all situations, all places and all the time? We propose a novel and inclusive computing paradigm, named ubisafe computing, for studying and providing possible solutions to the above problem. The ultimate goal of ubisafe computing is to build a computing environment in which all people and organizations can benefit from ubiquitous services anytime anywhere with assured and desired satisfaction without worrying or thinking about safety. That is, the ubisafe computing vision emphasizes two basic aspects: ubiquitous safety and ubiquitous satisfaction to all people in all situations. This paper presents the motivations for the ubisafe computing vision but focuses on one basic aspect of ubiquitous safety that covers reliability, security, privacy, persistency, trust, risk, out of control, and other watchfulness while considering novel, essential ubicomp or percomp features of unobtrusive computers, diverse users/people and life-like systems.
KeywordsComputing Environment Ubiquitous Computing Pervasive Computing Safety Problem Computing Paradigm
Unable to display preview. Download preview PDF.
- 1.Weiser, M.: The Computer for the Twenty-First Century. Scientific American, 94–104 (September 1991)Google Scholar
- 2.Satyanarayanan, M.: Pervasive Computing: Vision and Challenges. IEEE Personal Communication, 10–17 (August 2001)Google Scholar
- 3.The European Union Report on AmI: Scenarios for Ambient Intelligence in 2010 (2001), ftp://ftp.cordis.lu/pub/ist/docs/istagscenarios2010.pdf
- 4.Shchilit, B.N., Adams, N., Want, R.: Context Aware Computing Applications. In: Proc. of Workshop on Mobile Computing, Systems and Applications, CA (December 1994)Google Scholar
- 6.Addlesee, M., Curwen, R.W., Hodges, S., Newman, J., Steggles, P., Ward, A., Hopper, A.: Implementing a Sentient Computing System. IEEE Computer 34(8), 50–56 (2001)Google Scholar
- 8.Kephart, J.O., Chess, D.M.: The Vision of Autonomic Computing. IEEE Computer 36(1), 41–50 (2003)Google Scholar
- 10.Mamei, M., Zambonelli, F.: Spray Computers: Frontiers of Self-organization for Pervasive Computing. In: 3rd Italian Workshop From Objects to Agents (September 2003)Google Scholar
- 11.Müller-Schloer, C.: Organic Computing – On the Feasibility of Controlled Emergence. In: Proceedings of CODES + ISSS, pp. 2–5. ACM Press, New York (2004)Google Scholar
- 13.Ma, J.: Smart u-Things – Challenging Real World Complexity. IPSJ Symposium Series (19), 146–150 (2005)Google Scholar
- 14.Mundie, C., de Vries, P., Haynes, P., Corwine, M.: Trustworthy Computing (2002), http://www.microsoft.com/mscorp/twc/twc_whitepaper.mspx