skip to main content
10.1145/1864431.1864489acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
short-paper

Goal-driven opportunistic sensing

Published:26 September 2010Publication History

ABSTRACT

Opportunistic activity and context recognition systems do not presume a static sensor infrastructure that is defined at the design time of a system. They also do not have a fixed recognition goal that has to be accomplished. These systems rather make best use of the available sensor systems according to a sensing mission whereas the topology of a sensor network may change at runtime. To being able to configure the available sensor systems and to react on topological changes in the ambient sensor infrastructure goal-oriented sensing approaches capable of handling dynamic sensor setups have to be developed within the authors PhD-thesis.

References

  1. }}G. D. Abowd, A. K. Dey, P. J. Brown, N. Davies, M. Smith, and P. Steggles. Towards a Better Understanding of Context and Context-Awareness. In HUC '99: Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing, pages 304--307, London, UK, 1999. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. }}M. Baldauf, S. Dustdar, and F. Rosenberg. A survey on context-aware systems. Int. J. Ad Hoc Ubiquitous Comput., 2(4):263--277, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. }}M. Botts and A. Robin. OpenGIS sensor model language (SensorML) implementation specification. cep, 52:3.Google ScholarGoogle Scholar
  4. }}C.-Y. Chong and S. Kumar. Sensor networks: evolution, opportunities, and challenges. Proceedings of the IEEE, 91(8):1247--1256, Aug. 2003.Google ScholarGoogle ScholarCross RefCross Ref
  5. }}T. Da and Q. Zhang. A middleware for building context-aware mobile services. In 2004 IEEE 59th Vehicular Technology Conference, 2004. VTC 2004-Spring, volume 5, 2004.Google ScholarGoogle Scholar
  6. }}A. Dey and A. Newberger. The Context Toolkit--A Toolkit for Context-aware Applications, 2001.Google ScholarGoogle Scholar
  7. }}A. K. Dey. Understanding and using context. Personal Ubiquitous Comput., 5(1):4--7, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. }}F. Dressler. Self-Organization in Sensor and Actor Networks. John Wiley & Sons, December 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. }}A. Ferscha. What is Pervasive Computing, pages 93--108. Universitatsverlag Rudolf Trauner, June 2003.Google ScholarGoogle Scholar
  10. }}J. Indulska and P. Sutton. Location management in pervasive systems. In ACSW Frontiers '03: Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003, pages 143--151, Darlinghurst, Australia, Australia, 2003. Australian Computer Society, Inc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. }}D. Puccinelli and M. Haenggi. Wireless sensor networks: applications and challenges of ubiquitous sensing. IEEE Circuits and Systems Magazine, 5:2005, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  12. }}D. Roggen, A. Calatroni, M. Rossi, T. Holleczek, K. Forster, G. Troster, P. Lukowicz, D. Bannach, G. Pirkl, A. Ferscha, J. Doppler, C. Holzmann, M. Kurz, G. Holl, R. Chavarriaga, M. Creatura, and J. del R. Milln. Collecting complex activity data sets in highly rich networked sensor environments. In Proceedings of the Seventh International Conference on Networked Sensing Systems (INSS), Kassel, Germany, June 2010.Google ScholarGoogle ScholarCross RefCross Ref
  13. }}D. Roggen, K. Forster, A. Calatroni, A. Bulling, T. Holleczek, G. Troester, P. Lukowicz, G. Pirkl, D. Bannach, A. Ferscha, A. Riener, C. Holzmann, R. Chavarriaga, and J. del R. Milln. OPPORTUNITY: activity and context awareness in opportunistic open-ended sensor environments. In Poster at the 1st European Future Emerging Technologies Conference (FET 2009), Prague, Czech Republic, April 2009.Google ScholarGoogle Scholar
  14. }}D. Roggen, K. Forster, A. Calatroni, T. Holleczek, Y. Fang, G. Troester, P. Lukowicz, G. Pirkl, D. Bannach, K. Kunze, A. Ferscha, C. Holzmann, A. Riener, R. Chavarriaga, and J. del R. Milln. OPPORTUNITY: Towards opportunistic activity and context recognition systems. In Proceedings of the 3rd IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC 2009), Kos, Greece, June 2009. IEEE CS Press.Google ScholarGoogle ScholarCross RefCross Ref
  15. }}T. Stiefmeier, D. Roggen, G. Troster, G. Ogris, and P. Lukowicz. Wearable activity tracking in car manufacturing. Pervasive Computing, IEEE, 7(2):42--50, April-June 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. }}M. Tentori and J. Favela. Activity-aware computing for healthcare. IEEE Pervasive Computing, 7:51--57, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. }}C. N. Ververidis and G. C. Polyzos. Service discovery for mobile ad hoc networks: A survey of issues and techniques. IEEE Communications Surveys and Tutorials, 10(1-4):30--45, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. }}J. Yick, B. Mukherjee, and D. Ghosal. Wireless sensor network survey. Computer Networks, 52(12):2292 -- 2330, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. }}M. Younis, Dr. and S. Z. Ozer, Dr. Wireless ad hoc networks: technologies and challenges: Editorials. Wirel. Commun. Mob. Comput., 6(7):889--892, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Goal-driven opportunistic sensing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      UbiComp '10 Adjunct: Proceedings of the 12th ACM international conference adjunct papers on Ubiquitous computing - Adjunct
      September 2010
      203 pages
      ISBN:9781450302838
      DOI:10.1145/1864431

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 September 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      Overall Acceptance Rate764of2,912submissions,26%

      Upcoming Conference

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader