1,741 research outputs found
Security of Ubiquitous Computing Systems
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license
A Survey of Requirements Engineering Methods for Pervasive Services
Designing and deploying ubiquitous computing systems, such as those delivering large-scale mobile services, still requires large-scale investments in both development effort as well as infrastructure costs. Therefore, in order to develop the right system, the design process merits a thorough investigation of the wishes of the foreseen user base. Such investigations are studied in the area of requirements engineering (RE). In this report, we describe and compare three requirements engineering methods that belong to one specific form of RE, namely Goal-Oriented Requirements Engineering. By mapping these methods to a common framework, we assess their applicability in the field of ubiquitous computing systems
Recommended from our members
Multimodal and ubiquitous computing systems: supporting independent-living older users
We document the rationale and design of a multimodal interface to a pervasive/ubiquitous computing system that supports independent living by older people in their own homes. The Millennium Home system involves fitting a resident’s home with sensors – these sensors can be used to trigger sequences of interaction with the resident to warn them about dangerous events, or to check if they need external help. We draw lessons from the design process and conclude the paper with implications for the design of multimodal interfaces to ubiquitous systems developed for the elderly and in healthcare, as well as for more general ubiquitous computing applications
Security of Ubiquitous Computing Systems
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license
Challenges and trends in wireless ubiquitous computing systems
In the last decade, the Internet paradigm has been evolving toward a new frontier with the emergence of ubiquitous and pervasive systems, including wireless sensor networks, ad hoc networks, RFID systems, and wireless embedded systems. In fact, while the initial purpose of the Internet was to interconnect computers to share digital data at large scale, the current tendency is to enable ubiquitous and pervasive computing to control everything anytime and at a large scale. This new paradigm has given rise to a new generation of networked systems, commonly known as Internet-of-Things or Cyber-Physical Systems
A Framework for Designing Fair Ubiquitous Computing Systems
Over the past few decades, ubiquitous sensors and systems have been an
integral part of humans' everyday life. They augment human capabilities and
provide personalized experiences across diverse contexts such as healthcare,
education, and transportation. However, the widespread adoption of ubiquitous
computing has also brought forth concerns regarding fairness and equitable
treatment. As these systems can make automated decisions that impact
individuals, it is essential to ensure that they do not perpetuate biases or
discriminate against specific groups. While fairness in ubiquitous computing
has been an acknowledged concern since the 1990s, it remains understudied
within the field. To bridge this gap, we propose a framework that incorporates
fairness considerations into system design, including prioritizing stakeholder
perspectives, inclusive data collection, fairness-aware algorithms, appropriate
evaluation criteria, enhancing human engagement while addressing privacy
concerns, and interactive improvement and regular monitoring. Our framework
aims to guide the development of fair and unbiased ubiquitous computing
systems, ensuring equal treatment and positive societal impact.Comment: 8 pages, 1 figure, published in 2023 ACM International Joint
Conference on Pervasive and Ubiquitous Computing & the 2023 ACM International
Symposium on Wearable Computin
Public ubiquitous computing systems:lessons from the e-campus display deployments
In this paper we reflect on our experiences of deploying ubiquitous computing systems in public spaces and present a series of lessons that we feel will be of benefit to researchers planning similar public deployments. We focus on experiences gained from building and deploying three experimental public display systems as part of the e-campus pro ject. However, we believe the lessons are likely to be generally applicable to many different types of public ubicomp deployment
Quality assessment technique for ubiquitous software and middleware
The new paradigm of computing or information systems is ubiquitous computing systems. The technology-oriented issues of ubiquitous computing systems have made researchers pay much attention to the feasibility study of the technologies rather than building quality assurance indices or guidelines. In this context, measuring quality is the key to developing high-quality ubiquitous computing products. For this reason, various quality models have been defined, adopted and enhanced over the years, for example, the need for one recognised standard quality model (ISO/IEC 9126) is the result of a consensus for a software quality model on three levels: characteristics, sub-characteristics, and metrics. However, it is very much unlikely that this scheme will be directly applicable to ubiquitous computing environments which are considerably different to conventional software, trailing a big concern which is being given to reformulate existing methods, and especially to elaborate new assessment techniques for ubiquitous computing environments. This paper selects appropriate quality characteristics for the ubiquitous computing environment, which can be used as the quality target for both ubiquitous computing product evaluation processes ad development processes. Further, each of the quality characteristics has been expanded with evaluation questions and metrics, in some cases with measures. In addition, this quality model has been applied to the industrial setting of the ubiquitous computing environment. These have revealed that while the approach was sound, there are some parts to be more developed in the future
- …