The following is a schedule of papers to be discussed in
each class. During each ninety-minute class, three papers will be
presented. In conference program-committee style, each paper will be
discussed for about thirty minutes by three students: a presenter, an advocate, and a devil’s advocate. The rest of the class acts as the program
committee for an imaginary conference on pervasive computing.
The presenter gives a fifteen-minute presentation
describing the basic ideas in the paper and the main contributions. The advocate
then has five minutes to convince the class that the paper should be
accepted for our imaginary conference. The devil’s advocate, playing the role of a reviewer
who has decided the paper should be rejected, is given five minutes to
highlight the shortcomings of the technical arguments and the presentation
of the paper.
A five-minute question-and-answer period follows these
presentations, after which the class votes to accept or reject the paper
for our conference.
Click Here
to View the Paper Signup Matrix
|
Session 1
Tuesday, February 4, 2003
|
Handout
http://www.oxygen.lcs.mit.edu/
|
Session 2
Thursday, February 6
Pervasive Computing: Vision and
Challenges
|
1. Satyanarayanan, M.: Pervasive Computing: Vision and
Challenges. In: IEEE Personal Communications. Carnegie Mellon
University. (2001).
2. R. Grimm, J. Davis,
B. Hendrickson, E. Lemar, A. MacBeth,
S. Swanson, T. Anderson, B. Bershad, G. Borriello, S. Gribble, D. Wetherall,
"Systems directions for pervasive computing," Proceedings
of the 8th Workshop on Hot Topics in Operating Systems, May 2001.
3. M. Weiser. Some computer science issues in ubiquitous
computing. Communications of the ACM, 36(7):75-85, July 1993.
4.* Guruduth Banavar, James Beck,
Eugene Gluzberg, Jonathan Munson, Jeremy Sussman, Deborra Zukowski. Challenges:
an application model for pervasive computing Proc. 6th ACM MOBICOM , Boston, Mass., August 2000.
5.* D. Estrin,
R. Govindan, J. Heidemann,
and S. Kumar, "Next century challenges: Scalable coordination in
sensor networks," Tech. Rep., USC/Information Sciences Institute,
2000.
* =
optional paper
|
Session 3
Tuesday, February 11
Embedded Architectures
|
1. Michael Bedford Taylor, Jason Kim, Jason Miller,
David Wentzlaff, Fae Ghodrat, Ben Greenwald, Henry Hoffman, Jae-Wook Lee, Paul Johnson, Walter Lee, Albert Ma, Arvind Saraf, Mark Seneski, Nathan Shnidman,
Volker Strumpen, Matt Frank, Saman
Amarasinghe and Anant Agarwal, The Raw Microprocessor: A Computational
Fabric for Software Circuits and General Purpose Programs, IEEE Micro, Mar/Apr 2002.
3. C.
Kozyrakis, D. Patterson: “A New Direction in
Computer Architecture Research,” in IEEE
Computer, vol. 31, no. 11, November 1998 (pp. 24-32).
4.* Jason
Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, Kristofer
Pister, System architecture directions for network sensors, ASPLOS
2000.
|
Session 4
Thursday, February 13
[Tuesday, Feb. 18:
no class, Monday schedule]
Session 5
Thursday, February 20
Tuesday, February 25
Session 6
Thursday, February 27
Pervasive Networks
|
Session
4: Wireless Technologies
1. J. Haartsen,
M. Naghshineh, J. Inouye, O. J. Joeressen, and W. Allen, "Bluetooth: vision,
goals, and architecture," Mobile Computing and Communications
Review, vol. 2, pp. 38-45, Oct. 1998.
2.* B. Ghribi and L. Logrippo,
"Understanding GPRS: the GSM packet radio service,"
Computer Networks, vol. 34, pp. 763-779, 2000.
3. Wireless Local Area Networks.
Session 5: Mobile Networking 1
1. Stuart
Cheshire and Mary Baker, "Internet mobility 4x4." Proceedings of
the ACM Conference on Applications, Technologies, Architectures, and
Protocols for Computer Communications (SIGCOMM '96), August 1996, Stanford,
California. Pages 318-329.
2. A. C. Snoeren and
H. Balakrishnan, An End-to-End Approach to
Host Mobility, Proceedings of 6th International Conference on Mobile
Computing and Networking (MobiCom '00), Boston,
MA, August 2000.
3.* Victor
C. Zandy and Barton P. Miller, "Reliable
Network Connections." Proceedings of the eighth ACM/IEEE International
Conference on Mobile Computing and Networking (MobiCom
'02), September 2002, Atlanta, Georgia. Pages 95-106.
4.* D. A. Maltz
and P. Bhagwat, MSOCKS: An Architecture for
Transport Layer Mobility, Proceedings of the 1EEE INFOCOM '98, pp.
1037-1045, San Francisco, CA, 1998.
Session 6: Mobile
Networking 2
1. Balakrishnan H., Padmanabhan
V. N., Seshan S., Katz R. H., A Comparison of
Mechanisms for Improving TCP Performance over Wireless Links, in
IEEE/ACM Transactions on Networking, December 1997.
2. J. Broch, D. A. Maltz, D. B.
Johnson, Y. C. Hu, and Jorjeta
Jetcheva, "A Performance Comparison of
Multi-Hop Wireless Ad Hoc Network Routing Protocols," In
Proceedings of the Fourth Annual ACM/IEEE International Conference on
Mobile Computing and Networking, ACM, Dallas, TX, 1998.
3.* Jinyang
Li, Charles Blake, Douglas S. J. DeCouto, Hu Imm Lee, and Robert
Morris, "Capacity of ad hoc wireless networks,
" in Mobicom, 2001.
4.* W. R. Heinzelman, J. Kulik, and H. Balakrishnan. Adaptive protocols for information
dissemination in wireless sensor networks. In Proceedings of the fth annual ACM/IEEE international conference on Mobile
computing and networking, pages 174-185, Seattle, Washington, USA, 1999.
|
Session 7
Tuesday, March 4
Session 8
Thursday, March 6
Session 9
Tuesday, March 11
Session 10
Thursday, March 13
Location, Naming, and
Context-Awareness
|
Session 7: Location Detection and Tracking
1. J. Hightower, G. Borriello. Location Systems for Ubiquitous Computing.
IEEE Computer, August 2001, Vol. 34, No. 8, pp. 57-66
2. N. B. Priyantha, A. Chakraborty,
and H. Balakrishnan. The Cricket locationsupport system. In Proc. of the sixth
annual international conference on Mobile computing and networking (MobiCom 2000), page 32 to 43. ACM Press, 2000.
3.* P. Bahl, V. Padmanabhan,
RADAR: An In-Building RFBased User Location and Tracking System,
IEEE Infocom, Israel, March 2000.
4.* Roy Want, Andy Hopper,
Veronica Falcao, and Jonathan Gibbons. The
Active Badge Location System. In ACM Transactions on Information
Systems, January 1992.
Session
8: Pervasive Naming and Discovery
1. William
Adjie-Winoto, Elliot Schwartz, Hari Balakrishnan, and Jeremy Lilley. The
design and implementation of an intentional naming system. In Proc. of
the Symposium on Operating Systems Principles, Kiawah Island, USA, December
1999.
2. T. D. Hodes, S. E. Czerwinski, B. Y. Zhao, A. D. Joseph, R.
H. Katz, An Architecture for Secure Wide-Area Service
Discovery, ACM Wireless Networks Journal, special issue. Volume 8, Issue
2/3, March/May 2002, pp. 213-230
3.* J. Heidemann, F. Silva, C. Intanagonwiwat,
R. Govindan, D. Estrin,
and D. Ganesan, Building efficient wireless
sensor networks with low-level naming, In Proceedings of the Symposium
on Operating Systems Principles, pages 146--159, Banff, Alberta, Canada,
Oct. 2001.
4.* Changhao Jiang and Peter Steenkiste, A Hybrid Location Model with a
Computable Location Identifier for Ubiquitous Computing, The Fourth
International Conference on Ubiquitous Computing (UBICOMP 2002), September
2002.
Session
9: Context-Awareness
1. A. Harter et al.,
"The Anatomy of a context-Aware Application," Proc. 5th
Ann. Int'l Conf. Mobile Computing and networking (MOBICOM 99),ACM Press, New York, 1999, pp. 59-68.
2.* Chen, G., Kotz,
D.: A Survey of Context-Aware Mobile Computing
Research. Dartmouth College, Department of Computer Science. (2000)
3. Umar
Saif, Justin Mazzola Paluska, “Service-oriented Network Sockets,” MobiSys 2003.
4.* A. Ranganathan, R. Campbell, A. Ravi
and A. Mahajan, ConChat: A Context-Aware Chat Program. IEEE
Pervasive Computing, pp. 52-58, July-Sept 2002.
Session
10: Adaptation
1. Brian
Noble, System Support for
Mobile, Adaptive Applications, IEEE Personal Communications Vol.
7, No. 1, February, 2000.
2. E. Brewer, R. Katz, E. Amir,
H. Balakrishnan, Y. Chawathe,
A. Fox, S. Gribble, T. Hodes, G. Nguyen, V. Padmanabhan, M. Stemm, S. Seshan, and T. Henderson. A
Network Architecture for Heterogeneous Mobile Computing.
IEEE Personal Communications, October 1998.
3.* FLINN, J., AND SATYANARAYANAN,
M. Energy-aware adaptation for mobile applications. In Proceedings
of the 17th ACM Symposium on Operating System Principles (Kiawah Island,
SC, Dec. 1999), ACM Press, pp. 48-63.
4.* Inouye, J., Binkley,
J. and Walpole, J.: Dynamic Network Reconfiguration Support for Mobile
Computers, Proceedings of The Third Annual ACM/IEEE International
Conference on Mobile Computing and Networking (MobiCom'97), pp. 13--22
(1997).
|
Session 11
Tuesday, March 18
Pervasive Data Access
|
1. J. Kistler, M. Satyanarayanan. Disconnected
Operation in the Coda File System. ACM Transactions on Computer
Systems, 10(1), February 1992.
2.* D.
Terry, M. Theimer, K. Peterson, A. Demers, M. Spreitzer, and C. Hausen,
"Managing Update Conflicts in Bayou, a Weakly Connected Replicated
Storage System," Proceedings of the fifteenth Symposium on
Operating systems Principles, pp 49-70 ACM, October 1983.
3. John Kubiatowicz et. Al., "OceanStore:
An Architecture for Global-Scale Persistent Storage ", Proceedings
of ASPLOS 2000.
|
Session 12
Thursday, March 20
Session 13
Tuesday, April 1
Session 14
Thursday, April 3
Session 15
Tuesday, April 8
Programming Environments for
Pervasive Computing
|
Session 12: Mobile Applications and Platforms
1. Robert Grimm, Janet
Davis, Eric Lemar, and Brian Bershad,
Migration for pervasive applications.[moved to session 13]
2.* Steven Osman, Dinesh Subhraveti, Gong Su, and Jason Nieh,
"The Design and Implementation of Zap: A System for Migrating
Computing Environments", Proceedings of the Fifth Symposium on
Operating Systems Design and Implementation (OSDI 2002), Boston, MA,
December 9-11, 2002, pp. 361-376.
3. Minar,
N., Gray, M., Roup, O., Krikorian,
R., Maes, P.: Hive:
Distributed Agents for Networking Things. ASA/MA (1999).
4.* A. Joseph, J. Tauber, and M. Kaashoek. Mobile
computing with the Rover toolkit. IEEE Transactions on Computers,
46(3):337--352, March 1997.
Session 13: Pervasive Computing
Environments 1
1. David Garlan, Dan Siewiorek, Asim Smailagic, and Peter Steenkiste, “Project Aura: Towards Distraction-Free
Pervasive Computing”, IEEE Pervasive Computing, special issue on
"Integrated Pervasive Computing Environments", Volume 1, Number
2, April-June 2002, pages 22-31.
2. Robert Grimm, Janet
Davis, Eric Lemar, and Brian Bershad,
Migration for pervasive applications.[moved from session 12]
Session 14: Pervasive Environments + project
proposals
1. Umar Saif,
Chris Terman, Steve Ward, A Case for Goal-oriented Programming Semantics.
2.
Project Proposals Overview
Session 15: Pervasive Computing
Environments 2
1. Robert Grimm, Janet
Davis, Eric Lemar, Adam MacBeth,
Steven Swanson, Steven Gribble, Tom Anderson, Brian Bershad,
Gaetano Borriello, and
David Wetherall. Programming for pervasive
computing environments. Technical
report UW-CSE-01-06-01, University of Washington, Department of Computer
Science and Engineering, June 2001.
2.
Manuel
Román, Christopher K. Hess, Renato
Cerqueira, Anand Ranganathan, Roy H. Campbell, and Klara
Nahrstedt, Gaia: A Middleware Infrastructure to
Enable Active Spaces. IEEE
Pervasive Computing, pp. 74-83, Oct-Dec 2002
3.* M. Addlesee, R. Curwen, S.
Hodges., J. Newman, P. Steggles, A. Ward, and A.
Hopper. Implementing a Sentient Computing System. IEEE Computer,
34(8):42 to 48, August 2001.
4.* Michael
Coen, Brenton Phillips,
Nimrod Warshawsky, Luke Weisman, Stephen Peters,
and Peter Finin. Meeting the Computational Needs of Intelligent Environments: The Metaglue System. In Proceedings of MANSE'99.
Dublin, Ireland. 1999
5.* Christopher
K. Hess, Francisco Ballesteros, Roy Campbell, and
M. Dennis Mickunas. An Adaptable Data Object Service for Pervasive Computing Environments.
Proceedings of the 6th USENIX Conference on Object-Oriented Technologies
and Systems (COOTS'2001), San Antonio, Texas, February, 2001, pp.
31-45.
|
Session 16
Thursday, April 10
Session 17
Tuesday, April 15
Security in Pervasive Systems
|
Session 16
1. Jalal
Al-Muhtadi, Roy Campbell, Apu
Kapadia, Dennis Mickunas,
Seung Yi, Routing
Through the Mist: Privacy Preserving
Communication in Ubiquitous Computing Environments. International
Conference of Distributed Computing Systems (ICDCS 2002), pp. 65-74,
Vienna, Austria, July 3, 2002.
2.* Geetanjali Sampemane, Prasad Naldurg, and Roy H. Campbell, Access control for Active Spaces. Annual Computer Security
Applications Conference (ACSAC2002), Las Vegas, Nevada, Dec 9-13 2002.
3. M. Burnside, D. Clarke,
A. Maywah, T. Mills, S. Devadas,
and R. Rivest, "Proxy-Based Security Protocols in Networked Mobile
Devices", Proceedings of the Symposium on Applied Computing
(SAC'02), March 2002.
Session 17
1.* George Necula
and Peter Lee. Safe kernel extensions without run-time checking. In
Proceedings of OSDI'96, Seattle, Washington, October 1996.
2. Frank Stajano and Ross
Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc
Wireless Networks," pp. 172--194.
3. A. Perrig,
R. Szewczyk, V. Wen, D.
culler, and J. Tygar. SPINS: Security
Protocols for Sensor Networks. In Seventh Annual ACM International
Conference on Mobile Computing and Networks(Mobicom 2001), Rome Italy, July 2001.
|
Session 18
Thursday, April 17
[Tuesday, April 22: no class]
Session 19
Thursday, April 24
Human Interaction in Pervasive
Systems
|
Session 18
1. Gregory D. Abowd and Elizabeth D. Mynatt,
Charting Past, Present and Future
Research in Ubiquitous Computing, ACM Transactions on Computer-Human
Interaction, Special issue on HCI in the new Millennium, 7(1):29-58, March.
2. G. D. Abowd, C. G. Atkeson, J.
Hong, S. Long, R. Kooper, and M. Pinkerton. Cyberguide: A Mobile Context-Aware Tour Guide.
Baltzer/ACM Wireless Networks, 3(5):421 to 433,
October 1997.
3.* Ullmer, B. and Ishii, H., Emerging Frameworks for Tangible User Interfaces, in IBM
Systems Journal, Vol. 9, Nos. 3&4, 2000.
Session 19
1. T. Starner, S.Mann, B.Rhodes, J.Levine, J.Healey, D.Kirsch, R.Picard, and A.Pentland. Augmented
reality through wearable computing. Presence, 6(4):386-398, 1997.
2. Tim Kindberg et
al, People, Places, Things: Web
Presence for the Real World, ACM
Journal Mobile Networks and Applications
3.* Blackwell,
A.F. and Hague, R. (2001). AutoHAN: An Architecture for Programming the Home. In Proceedings
of the IEEE Symposia on Human-Centric Computing Languages and Environments,
pp. 150-157.
|
Session 20
Tuesday, April 29
Session 21
Thursday, May 1
Streaming and Energy-Management
|
Session 20
1.
M. Gordon, W. Thies,
M. Karczmarek, J. Wong, H. Ho mann, D. Maze, and S. Amarasinghe. A
stream compiler for communication-exposed architectures. In In the
Proceedings of the Tenth Conference on Architectural Support for
Programming Languages and Operating Systems, October 2002.
2. Ujval
J. Kapasi, William J. Dally, Scott Rixner, John D. Owens, and Brucek
Khailany, The Imagine Stream
Processor. Proceedings of the IEEE International Conference on Computer
Design, September 16-18, 2002, Freiburg, Germany, pp. 282-288.
Session
21
1. M. Zhang
and K. Asanovic. Highly-Associative
Caches for Low-Power Processors. Kool Chips Workshop, MICRO-33, 2000.
2. J. Flinn and M.
Satyanarayanan, "Energy-Aware Adaptation for Mobile Applications,"
in Symposium on Operating Systems Principles, pp. 48--63, December 1999.
|
Session 22
Tuesday May 6
Session 23
Thursday May 8
Energy-Management, Software Radios, and Multi-modal Interfaces
|
Session 22
1.
Ulrich Kremer, Jamey Hicks,
and James M. Rehg. Compiler-directed remote
task execution for power management. In Workshop on compilers and
operating systems for low power (COLP'00), October 2000.
2.
Heng
Zeng, Carla Ellis, Avlin
Lebeck, and Amin Vahdat, “ECOSystem:
Managing Energy as a First-Class Operating System Resource”.
Proceedings of Architectural
Support for Programming Languages and Operating Systems (ASPLOS), 2002.
Session 23
1. Vanu
Bose, Alok Shah, Michael Ismert.
Software Radios for Wireless Networking. Infocomm
'98.
2.
Kevin
Wilson, Vibhav Rangarajan,
Neal Checka, Trevor Darrell, Audiovisual Arrays for Untethered Spoken Interfaces, Proceedings of International Conference
on Multimodal Interfaces, 2002. (You might want to read the
first few pages of the optional paper to understand the concept of
beam-forming)
3.
* Giuliani, D., Matassoni, M., Omologo, M.,
and Svaizer, P. (1997). Use of Different
Microphone Array Configurations for Hands-free Speech Recognition in Noisy
and Reverberant Environment In Proc. of
EUROSPEECH. 31
|
Session 24
Tuesday May 13
Session 25
Thursday May 15
|
Project Presentations.
|
|