Академический Документы
Профессиональный Документы
Культура Документы
Mobile and Pervasive Computing Research in the Computer Science Department at Carnegie Mellon
GENERAL INFO
History
News Page
Faculty Positions Available
SCS Calendar
CSD faculty: Anind Dey (HCII), David Garlan, David OHallaron, Jason
Hong (HCII), Eric Paulos (HCII), Adrian Perrig (ECE ), Mahadev
Satyanarayanan (Satya), Bradley Schmerl, Srini Seshan, Dan Siewiorek ,
Asim Smailagic (ICES), Peter Steenkiste
EDUCATION
Ph.D. in CS
Bachelors
Masters
Doctoral Catalog
RESEARCH
PEOPLE
Who's Who
Faculty List
Administrative Staff
Grad Student Directory
CSD On the Road
Search
3/29/2014
Mobile and Pervasive Computing Research in the Computer Science Department at Carnegie Mellon
1 Research Thrusts
From the earliest days of mobile computing, Carnegie Mellon has been a major
contributor of fundamental ideas, systems, and experimental validations. For
example, the Wireless Andrew project transformed Carnegie Mellon into the
worlds first campus with complete wireless coverage. The Coda file system
pioneered the concepts of disconnected and weakly-connected operation, and
the Odyssey project introduced the concept of application-aware adaptation.
Carnegie Mellon created the term wearable computing which employs usercentered design methodologies to seamlessly integrate into current end-user
work flows while dramatically improving user productivity. The entire February
1996 issue of IEEE Personal Communications was devoted to mobile
computing at Carnegie Mellon. This early momentum continues unabated.
http://www.csd.cs.cmu.edu/research/areas/mopercomp/
2/5
3/29/2014
Mobile and Pervasive Computing Research in the Computer Science Department at Carnegie Mellon
close to the mobile device (typically one Wi-Fi hop away) in order to ensure low
end-to-end latency. A cloudlet enables a mobile device to offload computeintensive and data-intensive processing within tight latency bounds. This
avoids the long WAN latencies between a mobile device and a public cloud,
thus enabling an entirely new class of highly interactive and resource-rich
mobile applications. For example, a user with a lightweight body-worn
computer could take advantage of a cognitive assistance application that
executes sophisticated computer vision and language assistance algorithms at
near real-time speeds. A cloudlet can be viewed as a "data center in a box".
It is self-managing, requiring little more than power, Internet connectivity, and
access control for setup. Virtual machine (VM) technology plays a central role
cloudlet design and implementation.
Context-Aware Networking: Srini Seshan is exploring a new network
architecture where redundancy elimination (RE) is a network-supported
primitive that is accessible in a uniform fashion to all applications, protocols
and flows. Since it operates in an application-agnostic fashion, RE allows all
applications to obtain the benefits of caching and enables caching of content
between different applications. RE also extends caching benefits to below the
application object granularity. Initial work has shown how Internet service
providers could benefit from the RE because it allows them to manage their
network resources better, especially under overload conditions such as flash
crowds. This work goes beyond the basic RE design to consider how Internet
routing protocols should change if RE were widely deployed.
Programming Support for Context-Aware and Sensor-Rich Environments:
Anind Dey is exploring the creation of tools that facilitate the development and
deployment of context-aware applications. The term "context" refers to
environmental information that is part of an application's operating
environment and that can be sensed by the application. Key elements of this
work include software encapsulation of sensors, access to context data
through a network API, abstraction of context data through interpreters,
sharing and storage of context data through a distributed infrastructure, and
access control.
User-Controllable Security & Privacy for Pervasive Computing: Capturing
end-user security and privacy policies in pervasive computing environments is
difficult but essential. Jason Hong's research in this space is working towards
(1) developing novel user interfaces, (2) weaving learning, dialog, and
explanation technologies to minimize end-user burden, and (3) conducting
field studies to evaluate combinations of these techniques. Srini Seshan's
research explores the design of systems with better tradeoffs between privacy
and functionality. For example, his group developed SlyFi, an 802.11-like
wireless link layer protocol that obfuscates all transmitted bits to increase
privacy, and developed WiFi-Reports, a system that enables users to
crowdsource reviews of WiFi access points without revealing their location or
identity.
Urban Computing: Focusing on lifestyles and technologies within the context
of public urban spaces, Eric Paulos' research establishes a new framework for
deconstructing and analyzing technology and urban life across people, place,
infrastructure, architecture, and flow. The research challenges in this space
differ from those found within the home where technologies readily intermingle
across intimate relations with friends and family members. It diverges from
office and work environments where productivity and efficiency often dominate
computing tools.
Wearable Computing: Carnegie Mellon has been a pioneer in the creation
and use of wearable computing systems. Dan Siewiorek, in collaboration with
Asim Smailagic of the Institute for Complex Engineered Systems (ICES), has led
this effort since 1990. Current research in this area explores how wearable
computing can be effective in pervasive computing environments. This poses a
number of research challenges: developing social and cognitive models of
applications; integrating input from multiple sensors and mapping them to
social and cognitive user states; anticipating user needs; and interacting with
users. These challenges are being explored in the development of a Virtual
Coach, that represents a wearable augmented cognition platform.
Self-Managing Chaotic Wireless Networks: Until recently, most dense
deployments of wireless networks were in campus-like environments, where
experts carefully plan cell layout. The rapid deployment of cheap 802.11
hardware and other personal wireless technology (2.4Ghz cordless phones,
bluetooth devices, etc.), however, is quickly changing the wireless landscape.
http://www.csd.cs.cmu.edu/research/areas/mopercomp/
3/5
3/29/2014
Mobile and Pervasive Computing Research in the Computer Science Department at Carnegie Mellon
4/5
3/29/2014
Mobile and Pervasive Computing Research in the Computer Science Department at Carnegie Mellon
2 Education
A graduate course that focuses on recent developments in mobile and
pervasive computing has been developed by M. Satyanarayanan and Dan
Siewiorek. The course is cross-listed both by the School of Computer Science
(15-821) and by the Department of Electrical and Computer Engineering (18843). Originally entitled Mobile Computing Systems and Applications, the
course is now called Mobile and Pervasive Computing to refiect the
broadening of its scope over time. It has been offered once a year since Fall
2000, and has proved very popular with computer science and electrical
engineering students.
Another relevant course, developed by Dan Siewiorek and Asim Smailagic in
the HCI Institute and cross-listed by the Computer Science Department, is
entitled Rapid Prototyping of Computer Systems. (15-540/05-540). It is
offered every spring, and draws students from Computer Science, Electrical
and Computer Engineering, Design, Human-Computer Interaction, and
Mechanical Engineering. Students work in interdisciplinary teams of up to three
dozen students to develop a functional prototype system for an industrial
application.
Peter Steenkiste's course on Wireless Networking focuses on topics at the
physical and link layers, with light treatment of higher layers. The format of the
course loosely follows that of the mobile and pervasive computing course
describe above (15-821/18-843), and complements its content.
http://www.csd.cs.cmu.edu/research/areas/mopercomp/
Webteam ^ Top
SCS Home
5/5