Advertisement

The Personal Server: Changing the Way We Think about Ubiquitous Computing

  • Royu Want
  • Trevor Pering
  • Gunner Danneels
  • Muthu Kumar
  • Murali Sundar
  • John Light
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2498)

Abstract

The Personal Server is a mobile device that enables you to readily store and access the data and applications you carry with you through interfaces found in the local environment. Unlike conventional mobile computers with relatively poor user interfaces, it does not have a display at all, instead wirelessly utilizing displays, keyboards and other IO devices found nearby. By co-opting large screens such as those found on desktop PCs, public display monitors, information kiosks, and other computers, a Personal Server is more effective than relying on a small mobile screen. This model goes beyond the mobile context and has wider implications for how we think about computing in general. A prototype system, including applications, system infrastructure, and a mobile platform, has been built to fully explore this model. This prototype sheds light on the suitability of standard components to support such a computing model, and from this illuminates directions for the design of future ubiquitous computing systems.

Keywords

Ubiquitous Computing Mobility Device Discovery Adaptive Interfaces Personal Server 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Anderson, R.; “Why cryptosystems fail”, Communications of the ACM, November 1994Google Scholar
  2. 2.
    Banavar, G.; Beck, J.; Gluzberg, E.; Munson, J.; Sussman, J.; and Zukowski, D. “An Application Model for Pervasive Computing”. Proceedings of. ACM MOBICOM, Boston, MA, August 2000. Also found at http://www.research.ibm.com/PIMA.
  3. 3.
  4. 4.
    CC/PP project home page. http://www.w3.org/Mobile/CCPP.
  5. 5.
    Hill, J.; Szewczyk R.; Woo, A.; Hollar, S.; Culler, D.; Pister, K.; “System architecture directions for networked sensors”. Ninth international conference on Architectural support for programming languages and operating systems. November 2000.Google Scholar
  6. 6.
    IEEE 802.11b, WiFi Standard, http://grouper.ieee.org/groups/802/11/index.html, April 2002.
  7. 7.
    iPod: apple’s MP3 player http://www.apple.com/ipod/
  8. 8.
    Kozuch, M., and Satyanarayanan, M., “Internet Suspend/Resume,” Proceedings of the Workshop on Mobile Computing Systems and Applications, Callicoon, NY, June 20–21, 2002Google Scholar
  9. 9.
    Li, S. F.; Spiteri, M.; Bates, J.; Hopper, A. “Capturing and Indexing Computer-based Activities with Virtual Network Computing”. Proceedings of the 2000 ACM Symposium on Applied Computing, Como, Italy, Vol 2. Pages 601–603, March 19–21, 2000Google Scholar
  10. 10.
    Mayo, R., The Factoid Project (Compaq WRL technical report) http://www.research.compaq.com/wrl/projects/Factoid/factoid.html, April 2002
  11. 11.
  12. 12.
    Noble, B.; Satyanarayanan, M.; Narayanan, D.; Tilton, J.; Flinn, J.; Walker, K.; “Agile application-aware adaptation for mobility”. Proceedings of the 16th ACM Symposium on Operating System Principles, October 1997.Google Scholar
  13. 13.
    PAN-Personal Area Networks. http://grouper.ieee.org/groups/802/15/index.html IEEE 802.15, May 2001.
  14. 14.
    Pirhonen, A.; Brewster, S.; Gestural, “ Audio Metaphors as a Means of Control for Mobile Devices”. Proceedings of the SIGCHI conference on Human factors in computing systems, April 2002Google Scholar
  15. 15.
    Pering, T.; Burd, T.; Brodersen, R., “Voltage scheduling in the lpARM microprocessor system”. ISLPED, July 2000Google Scholar
  16. 16.
    Pering, T., Light, J., Sundar, M., Want R., Photographic Authentication through Untrusted Terminals. Intel Research Technical Report, April 2002Google Scholar
  17. 17.
    Pockey: pocketable disk drive, http://pockey.co.kr
  18. 18.
    ‘Q’ Drive, Agate technologies inc, http://www.eiwww.com/products_q.html, May 2001.
  19. 19.
    Ross, S.J., et. al.; “A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices”. Proceedings of the Third IEEE WMCSA, December 2000.Google Scholar
  20. 20.
    Satyanarayanan, M. “The Evolution of Coda”, ACM Transactions on Computer Systems, Volume 20, Number 2, May 2002.Google Scholar
  21. 21.
    Schilit, B.; Trevor, J.; Hilbert, D.; Koh, T.; m-links: An infrastructure for very small internet devices, Proceedings of the seventh annual international conference on Mobile computing and networking (MOBICOM), July 2001.Google Scholar
  22. 22.
    Ponnekanti, S.; Lee, B.; Fox, A.; Hanrahan, P.; Winograd, T; “ ICrafter: A Service Framework for Ubiquitous Computing Environments”. Proceedings of Ubicomp 2001, pp56–75.Google Scholar
  23. 23.
    SOAP: Simple Object Access Protocol http://www.w3c.org/2002/ws/
  24. 24.
    Starner, T., “The Challenges of Wearable Computing: Part 1 & 2.” IEEE Micro 21(4), July 2001, pp. 44–52 & pp. 54–67.Google Scholar
  25. 25.
    Singh, S.; Woo, M.; Raghavendra, C. S., “Power-aware routing in mobile ad hoc networks”,. The fourth annual ACM/IEEE international conference on Mobile computing and networking (MOBICOM), October 1998Google Scholar
  26. 26.
    Swierk E.; Kiciman, E.; Williams, N.; Fukushima, T.; Yoshida, H., L.; and Baker, M., “The Roma Personal Metadata Service.” To appear in Mobile Networks and Applications (MONET), volume 7, number 5, September/October 2002.Google Scholar
  27. 27.
    Terry, D. B.; Theimer, M. M.; Petersen, K.; Demers, A. J,; Spreitzer, M. J. and Hauser, C.; “Managing Update Conflicts in Bayou, a Weakly Connected Replicated Storage System” Proceedings 15th Symposium on Operating Systems Principles, Cooper Mountain, Colorado, December 1995, pages 172–183.Google Scholar
  28. 28.
    Toigo, J., W., “Avoiding a Data Crunch”, Scientific American, May 2000, Vol 282, No. 5 pp58–74CrossRefGoogle Scholar
  29. 29.
    Truman, T.; Pering, T.; Doering, R.; Brodersen, R., “The InfoPad Multimedia Terminal: A Portable Device for Wireless Information Access”, IEEE Transactions on Computers, October 1998, Vol. 47, No. 10Google Scholar
  30. 30.
    UPnP, “Understanding Universal Plug and Play”, Microsoft white paper available at http://www.upnp.org
  31. 31.
    Want, R.; Hopper, A.; Falcao, V.; Gibbons, J., “The Active Badge Location System”, ACM Transactions on Office Information Systems (TOIS), Vol. 10. No. 1, Jan 1992, Pages 91–102CrossRefGoogle Scholar
  32. 32.
    Want, R.; Schilit, B.; Norman A.; Gold R.; Goldberg D.; Petersen K., Ellis J., Weiser, M., “An Overview of the Parctab Ubiquitous Computing Experiment”, IEEE Personal Communications, December 1995, Vol 2. No. 6, pp28–43.Google Scholar
  33. 33.
    Want, R.; Pering, T.; Borriello, G.; Farkas, Keith I.; “Disappearing Hardware”, IEEE Pervasive Computing,Vol. 1. Issue #1, April 2002, pp36–47.CrossRefGoogle Scholar
  34. 34.
  35. 35.
  36. 36.
    Weiser, M., “The Computer for the 21st Century”, Scientific American, September 1991, Vol. 265 No. 3, pp94–104.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Royu Want
    • 1
  • Trevor Pering
    • 1
  • Gunner Danneels
    • 1
  • Muthu Kumar
    • 1
  • Murali Sundar
    • 1
  • John Light
    • 1
  1. 1.Intel ResearchSanta Clara

Personalised recommendations