Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/381461.381468acmconferencesArticle/Chapter ViewAbstractPublication PageswmcConference Proceedingsconference-collections
Article

Enabling location-based applications

Published: 21 July 2001 Publication History

Abstract

We identify a number of factors that may hinder the commercial success of location-based applications: the concern of privacy, the need to consider context beyond location, the presence of voluminous resources, and the constrained interfaces available on mobile devices. We describe an end-to-end system architecture with integrated support to address these issues. In particular, the architecture includes a Secure Context Service that provides broad context information to applications and allows people to flexibly control the release of their private information, an Intelligent Service Discovery Service that allows for personalized selection of physical and virtual services, and a multi-modal interaction mechanism that enables users to exploit multiple synchronized access channels to interact with an application and to switch among channels at any time. Our goals are to improve user experience, to reduce user distraction and to facilitate awareness of the physical world.

References

[1]
Czerwinski, S.; Zhao, B.; Hodes T.; Joseph, A.; Katz, R. An Arohiteeture for a Seroure Service Discovery Service. In Fifth Annual International Conference on Mobile Computing and Networks (MobiCOM '99), Seattle, WA, August 1999.
[2]
Ferraiolo, D.F.; Gilbert, D.M.; Lynch, N. An Examination of Federal and Commercial Access Control Policy Needs. In NIST-NCSC National Computer Security Conference (Baltimore, MD, Sept. 1993), 107-116.
[3]
Gellersen, H.-W.; Schmidt, A.; Beigl, M. Adding Some Smartness to Devices and Everyday Things. In the Proceedings of the Third IEEE Workshop on Mobile Computing Systems and Applications (Monterey, CA, Dec. 2000), ACM, 3-10.
[4]
Hull, R.; Neaves, P.; Bedford-Roberts, J. Towards Situated Computing. In the Proceedings of the 1st International Conference on Wearable Computing (1997), IEEE, 146-153.
[5]
Maes, S. H.; Raman, T.V. Multi-modal Interactions in the Age of Information Appliances. In ICME'2000, New York, July 2000.
[6]
Maes, S. H. A IX)M-based MVC Multi-modal e-Business. To appear in ICME'2001, Tokyo, 2001.
[7]
Maniatis, P.; Roussopoulos, M.; Swierk, E.; Lai, K.; Appenzoller, G.; Zhao, X. and Baker, M. The Mobile People Architecture. ACM Mobile Computing and Communications Review (MC2R), July 1999.
[8]
Priyantha, N.; Chakrsborty, A; Balakrishnan, H. The Cricket Location-Support System. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (Boston, MA, August 2000), ACM, 32-43.
[9]
Raman, B.; Katz, P.; Joseph, A. Universal Inbox: Providing Extensible Personal Mobility and Service Mobility in an Integrated Communication Network. In Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (Monterey, CA, December 2000), IEEE, 95- 106.
[10]
Salber, D; Dey, A. K.; Abowd, G. D. The Context Toolkit: Aiding the Development of Context-Enabled Applications. In Proceedings of CHI '99 (Pittsburgh, PA, May 1999), ACM, 434-441.
[11]
Sundhu, R.S.; Coyne, E.J.; Feinstein, H.L.; Yonman, C.E. Role-based Access Control Models. IEEE Computer, Vol. 29, No. 2, Feb. 1996, 38-47.
[12]
Wang, H. J.; Raman, B.; Chuah, C.; Biswas, R.; Oummadi, R.; Hohlt, B.; Hong, X.; Kiciman, E.; Mac, Z.; Shih, J. S.; Subramanian, L.; Zhao, B. Y.; Joseph, A. D.; Katz R. H. ICEBERG: An Intemet-core Network Architecture for Integrated Communications. IEEE Personal Communications, Vol. 7, No. 4, Aug. 2000, 10-19.

Cited By

View all
  • (2016)A Secure Condition-Based Location Authentication Protocol for Mobile Devices2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)10.1109/CMCSN.2016.16(146-149)Online publication date: May-2016
  • (2012)Exploration of Adoption of Service Innovations through Technology Road-MappingTechnological Applications and Advancements in Service Science, Management, and Engineering10.4018/978-1-4666-1583-0.ch010(152-172)Online publication date: 2012
  • (2011)Path planning for privacy preserving in location based serviceProceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design (CSCWD)10.1109/CSCWD.2011.5960070(162-167)Online publication date: Jun-2011
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WMC '01: Proceedings of the 1st international workshop on Mobile commerce
July 2001
59 pages
ISBN:1581133766
DOI:10.1145/381461
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 July 2001

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

WMC01
Sponsor:

Acceptance Rates

WMC '01 Paper Acceptance Rate 10 of 15 submissions, 67%;
Overall Acceptance Rate 10 of 15 submissions, 67%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2016)A Secure Condition-Based Location Authentication Protocol for Mobile Devices2016 Third International Conference on Computing Measurement Control and Sensor Network (CMCSN)10.1109/CMCSN.2016.16(146-149)Online publication date: May-2016
  • (2012)Exploration of Adoption of Service Innovations through Technology Road-MappingTechnological Applications and Advancements in Service Science, Management, and Engineering10.4018/978-1-4666-1583-0.ch010(152-172)Online publication date: 2012
  • (2011)Path planning for privacy preserving in location based serviceProceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design (CSCWD)10.1109/CSCWD.2011.5960070(162-167)Online publication date: Jun-2011
  • (2011)A GPS-based Mobile Dynamic Service Locator SystemApplied Computing and Informatics10.1016/j.aci.2011.05.0039:2(95-106)Online publication date: Jul-2011
  • (2010)Exploration of Adoption of Service Innovations through Technology Road-MappingInternational Journal of Service Science, Management, Engineering, and Technology10.4018/jssmet.20100401051:2(70-90)Online publication date: 1-Apr-2010
  • (2007)Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless NetworksIEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference10.1109/GLOCOM.2007.17(49-53)Online publication date: Nov-2007
  • (2006)Extending Object-Oriented Middleware for Location-Aware ServicesProceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies10.1109/PDCAT.2006.63(209-212)Online publication date: 4-Dec-2006
  • (2006)Handling High-Level Queries in Location-Based Services for User GroupsGeoinformatica10.1007/s10707-006-7580-710:2(213-234)Online publication date: 1-Jun-2006
  • (2006)$$\mathcal{C}$$ oo $$\mathcal{PS}$$ – Towards a method for coordinating personalized servicesSoftware & Systems Modeling10.1007/s10270-006-0006-z5:2(219-229)Online publication date: 24-Feb-2006
  • (2006)Location-Based services for tourism industryProceedings of the Third international conference on Ubiquitous Intelligence and Computing10.1007/11833529_115(1144-1153)Online publication date: 3-Sep-2006
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media