*      General

*      Announcements

*      Schedule

*      Reading List

*      Projects

6.898 Pervasive Computing

 

The following is a schedule of papers to be discussed in each class. During each ninety-minute class, three papers will be presented. In conference program-committee style, each paper will be discussed for about thirty minutes by three students: a presenter, an advocate, and a devil’s advocate. The rest of the class acts as the program committee for an imaginary conference on pervasive computing.

 

The presenter gives a fifteen-minute presentation describing the basic ideas in the paper and the main contributions. The advocate then has five minutes to convince the class that the paper should be accepted for our imaginary conference. The devil’s advocate, playing the role of a reviewer who has decided the paper should be rejected, is given five minutes to highlight the shortcomings of the technical arguments and the presentation of the paper.

                                                                                                             

A five-minute question-and-answer period follows these presentations, after which the class votes to accept or reject the paper for our conference.

 

*      Click Here to View the Paper Signup Matrix

 

Session 1

Tuesday, February 4, 2003

Handout

http://www.oxygen.lcs.mit.edu/

Session 2

Thursday, February 6

Pervasive Computing: Vision and Challenges

 

1.   Satyanarayanan, M.: Pervasive Computing: Vision and Challenges. In: IEEE Personal Communications. Carnegie Mellon University. (2001).

2.   R. Grimm, J. Davis, B. Hendrickson, E. Lemar, A. MacBeth, S. Swanson, T. Anderson, B. Bershad, G. Borriello, S. Gribble, D. Wetherall, "Systems directions for pervasive computing," Proceedings of the 8th Workshop on Hot Topics in Operating Systems, May 2001.

3.   M. Weiser. Some computer science issues in ubiquitous computing. Communications of the ACM, 36(7):75-85, July 1993.

4.*  Guruduth Banavar, James Beck, Eugene Gluzberg, Jonathan Munson, Jeremy Sussman, Deborra Zukowski. Challenges: an application model for pervasive computing Proc. 6th ACM MOBICOM , Boston, Mass., August 2000.

5.*  D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, "Next century challenges: Scalable coordination in sensor networks," Tech. Rep., USC/Information Sciences Institute, 2000.

*  =  optional paper

Session 3

Tuesday, February 11

Embedded Architectures

 

1.    Michael Bedford Taylor, Jason Kim, Jason Miller, David Wentzlaff, Fae Ghodrat, Ben Greenwald, Henry Hoffman, Jae-Wook Lee, Paul Johnson, Walter Lee, Albert Ma, Arvind Saraf, Mark Seneski, Nathan Shnidman, Volker Strumpen, Matt Frank, Saman Amarasinghe and Anant Agarwal, The Raw Microprocessor: A Computational Fabric for Software Circuits and General Purpose Programs, IEEE Micro, Mar/Apr 2002.

3.    C. Kozyrakis, D. Patterson: “A New Direction in Computer Architecture Research,” in IEEE Computer, vol. 31, no. 11, November 1998 (pp. 24-32).

4.*  Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, Kristofer Pister, System architecture directions for network sensors, ASPLOS 2000.  

Session 4

Thursday, February 13

[Tuesday, Feb. 18:

  no class, Monday schedule]

Session 5

Thursday, February 20

Tuesday, February 25

Session 6

Thursday, February 27

Pervasive Networks

 

 

 

Session 4: Wireless Technologies

1.    J. Haartsen, M. Naghshineh, J. Inouye, O. J. Joeressen, and W. Allen, "Bluetooth: vision, goals, and architecture," Mobile Computing and Communications Review, vol. 2, pp. 38-45, Oct. 1998.

2.*  B. Ghribi and L. Logrippo, "Understanding GPRS: the GSM packet radio service," Computer Networks, vol. 34, pp. 763-779, 2000.

3.    Wireless Local Area Networks.  

 

Session 5: Mobile Networking 1

1.  Stuart Cheshire and Mary Baker, "Internet mobility 4x4." Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '96), August 1996, Stanford, California. Pages 318-329.

2.    A. C. Snoeren and H. Balakrishnan, An End-to-End Approach to Host Mobility, Proceedings of 6th International Conference on Mobile Computing and Networking (MobiCom '00), Boston, MA, August 2000.

3.*  Victor C. Zandy and Barton P. Miller, "Reliable Network Connections." Proceedings of the eighth ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '02), September 2002, Atlanta, Georgia. Pages 95-106.

4.*  D. A. Maltz and P. Bhagwat, MSOCKS: An Architecture for Transport Layer Mobility, Proceedings of the 1EEE INFOCOM '98, pp. 1037-1045, San Francisco, CA, 1998.

 

Session 6: Mobile Networking 2

1.    Balakrishnan H., Padmanabhan V. N., Seshan S., Katz R. H., A Comparison of Mechanisms for Improving TCP Performance over Wireless Links, in IEEE/ACM Transactions on Networking, December 1997.

2.    J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and Jorjeta Jetcheva, "A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols," In Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, ACM, Dallas, TX, 1998.

3.*  Jinyang Li, Charles Blake, Douglas S. J. DeCouto, Hu Imm Lee, and Robert Morris, "Capacity of ad hoc wireless networks, " in Mobicom, 2001.

4.*  W. R. Heinzelman, J. Kulik, and H. Balakrishnan. Adaptive protocols for information dissemination in wireless sensor networks. In Proceedings of the fth annual ACM/IEEE international conference on Mobile computing and networking, pages 174-185, Seattle, Washington, USA, 1999.

Session 7

Tuesday, March 4

Session 8

Thursday, March 6

Session 9

Tuesday, March 11

Session 10

Thursday, March 13

Location, Naming, and Context-Awareness

 

Session 7: Location Detection and Tracking

1.    J. Hightower, G. Borriello. Location Systems for Ubiquitous Computing. IEEE Computer, August 2001, Vol. 34, No. 8, pp. 57-66

2.    N. B. Priyantha, A. Chakraborty, and H. Balakrishnan. The Cricket locationsupport system. In Proc. of the sixth annual international conference on Mobile computing and networking (MobiCom 2000), page 32 to 43. ACM Press, 2000.

3.*  P. Bahl, V. Padmanabhan, RADAR: An In-Building RFBased User Location and Tracking System, IEEE Infocom, Israel, March 2000.

4.*  Roy Want, Andy Hopper, Veronica Falcao, and Jonathan Gibbons. The Active Badge Location System. In ACM Transactions on Information Systems, January 1992.

 

Session 8: Pervasive Naming and Discovery

1.    William Adjie-Winoto, Elliot Schwartz, Hari Balakrishnan, and Jeremy Lilley. The design and implementation of an intentional naming system. In Proc. of the Symposium on Operating Systems Principles, Kiawah Island, USA, December 1999.

2.    T. D. Hodes, S. E. Czerwinski, B. Y. Zhao, A. D. Joseph, R. H. Katz, An Architecture for Secure Wide-Area Service Discovery, ACM Wireless Networks Journal, special issue. Volume 8, Issue 2/3, March/May 2002, pp. 213-230

3.*  J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. Ganesan, Building efficient wireless sensor networks with low-level naming, In Proceedings of the Symposium on Operating Systems Principles, pages 146--159, Banff, Alberta, Canada, Oct. 2001.

4.*  Changhao Jiang and Peter Steenkiste, A Hybrid Location Model with a Computable Location Identifier for Ubiquitous Computing, The Fourth International Conference on Ubiquitous Computing (UBICOMP 2002), September 2002.

 

Session 9: Context-Awareness

1.    A. Harter et al., "The Anatomy of a context-Aware Application," Proc. 5th Ann. Int'l Conf. Mobile Computing and networking (MOBICOM 99),ACM Press, New York, 1999, pp. 59-68.

2.*  Chen, G., Kotz, D.: A Survey of Context-Aware Mobile Computing Research. Dartmouth College, Department of Computer Science. (2000)

3.    Umar Saif, Justin Mazzola Paluska, “Service-oriented Network Sockets,” MobiSys 2003.

4.*  A. Ranganathan, R. Campbell, A. Ravi and A. Mahajan, ConChat: A Context-Aware Chat ProgramIEEE Pervasive Computing, pp. 52-58, July-Sept 2002.

 

Session 10: Adaptation

1.    Brian Noble, System Support for Mobile, Adaptive Applications, IEEE Personal Communications Vol. 7, No. 1, February, 2000.

2.    E. Brewer, R. Katz, E. Amir, H. Balakrishnan, Y. Chawathe, A. Fox, S. Gribble, T. Hodes, G. Nguyen, V. Padmanabhan, M. Stemm, S. Seshan, and T. Henderson. A Network Architecture for Heterogeneous Mobile Computing. IEEE Personal Communications, October 1998.

3.*  FLINN, J., AND SATYANARAYANAN, M. Energy-aware adaptation for mobile applications. In Proceedings of the 17th ACM Symposium on Operating System Principles (Kiawah Island, SC, Dec. 1999), ACM Press, pp. 48-63.

4.*  Inouye, J., Binkley, J. and Walpole, J.: Dynamic Network Reconfiguration Support for Mobile Computers, Proceedings of The Third Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'97), pp. 13--22 (1997).

Session 11

Tuesday, March 18

Pervasive Data Access

 

1.    J. Kistler, M. Satyanarayanan. Disconnected Operation in the Coda File System. ACM Transactions on Computer Systems, 10(1), February 1992.

2.*  D. Terry, M. Theimer, K. Peterson, A. Demers, M. Spreitzer, and C. Hausen, "Managing Update Conflicts in Bayou, a Weakly Connected Replicated Storage System," Proceedings of the fifteenth Symposium on Operating systems Principles, pp 49-70 ACM, October 1983.

3.    John Kubiatowicz et. Al., "OceanStore: An Architecture for Global-Scale Persistent Storage ", Proceedings of ASPLOS 2000.

Session 12

Thursday, March 20

Session 13

Tuesday, April 1

Session 14

Thursday, April 3

 

Session 15

Tuesday, April 8

Programming Environments for Pervasive Computing

 

Session 12: Mobile Applications and Platforms

1.    Robert Grimm, Janet Davis, Eric Lemar, and Brian Bershad, Migration for pervasive applications.[moved to session 13]

2.*  Steven Osman, Dinesh Subhraveti, Gong Su, and Jason Nieh, "The Design and Implementation of Zap: A System for Migrating Computing Environments", Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002), Boston, MA, December 9-11, 2002, pp. 361-376.

3.    Minar, N., Gray, M., Roup, O., Krikorian, R., Maes, P.: Hive: Distributed Agents for Networking Things. ASA/MA (1999).

4.*  A. Joseph, J. Tauber, and M. Kaashoek. Mobile computing with the Rover toolkit. IEEE Transactions on Computers, 46(3):337--352, March 1997.

 

Session 13: Pervasive Computing Environments 1

1.    David Garlan, Dan Siewiorek, Asim Smailagic, and Peter Steenkiste, “Project Aura: Towards Distraction-Free Pervasive Computing”, IEEE Pervasive Computing, special issue on "Integrated Pervasive Computing Environments", Volume 1, Number 2, April-June 2002, pages 22-31.

2.    Robert Grimm, Janet Davis, Eric Lemar, and Brian Bershad, Migration for pervasive applications.[moved from session 12]

 

Session 14: Pervasive Environments + project proposals

 

1.    Umar Saif, Chris Terman, Steve Ward, A Case for Goal-oriented Programming Semantics.

 

 

2.        Project Proposals Overview

 

 

 

Session 15: Pervasive Computing Environments 2

1.    Robert Grimm, Janet Davis, Eric Lemar, Adam MacBeth, Steven Swanson, Steven Gribble, Tom Anderson, Brian Bershad, Gaetano Borriello, and David Wetherall. Programming for pervasive computing environments. Technical report UW-CSE-01-06-01, University of Washington, Department of Computer Science and Engineering, June 2001.

2.      Manuel Román, Christopher K. Hess, Renato Cerqueira, Anand Ranganathan, Roy H. Campbell, and Klara Nahrstedt, Gaia: A Middleware Infrastructure to Enable Active Spaces. IEEE Pervasive Computing, pp. 74-83, Oct-Dec 2002

 

3.*  M. Addlesee, R. Curwen, S. Hodges., J. Newman, P. Steggles, A. Ward, and A. Hopper. Implementing a Sentient Computing System. IEEE Computer, 34(8):42 to 48, August 2001.

4.*  Michael Coen, Brenton Phillips, Nimrod Warshawsky, Luke Weisman, Stephen Peters, and Peter Finin. Meeting the Computational Needs of Intelligent Environments: The Metaglue System. In Proceedings of MANSE'99. Dublin, Ireland. 1999

5.*  Christopher K. Hess, Francisco Ballesteros, Roy Campbell, and M. Dennis Mickunas. An Adaptable Data Object Service for Pervasive Computing Environments. Proceedings of the 6th USENIX Conference on Object-Oriented Technologies and Systems (COOTS'2001), San Antonio, Texas, February, 2001,  pp. 31-45.

Session 16

Thursday, April 10

Session 17

Tuesday, April 15

Security in Pervasive Systems

 

Session 16

1.    Jalal Al-Muhtadi, Roy Campbell, Apu Kapadia, Dennis Mickunas, Seung Yi, Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. International Conference of Distributed Computing Systems (ICDCS 2002), pp. 65-74, Vienna, Austria, July 3, 2002.

2.*  Geetanjali Sampemane, Prasad Naldurg, and Roy H. Campbell, Access control for Active Spaces. Annual Computer Security Applications Conference (ACSAC2002), Las Vegas, Nevada, Dec 9-13 2002.

3.    M. Burnside, D. Clarke, A. Maywah, T. Mills, S. Devadas, and R. Rivest, "Proxy-Based Security Protocols in Networked Mobile Devices", Proceedings of the Symposium on Applied Computing (SAC'02), March 2002.

 

Session 17

1.*  George Necula and Peter Lee. Safe kernel extensions without run-time checking. In Proceedings of OSDI'96, Seattle, Washington, October 1996.

2.    Frank Stajano and Ross Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks," pp. 172--194.

3.    A. Perrig, R. Szewczyk, V. Wen, D. culler, and J. Tygar. SPINS: Security Protocols for Sensor Networks. In Seventh Annual ACM International Conference on Mobile Computing and Networks(Mobicom 2001), Rome Italy, July 2001.

Session 18

Thursday, April 17

[Tuesday, April 22:  no class]

Session 19

Thursday, April 24

Human Interaction in Pervasive Systems

Session 18

1.    Gregory D. Abowd and Elizabeth D. Mynatt, Charting Past, Present and Future Research in Ubiquitous Computing, ACM Transactions on Computer-Human Interaction, Special issue on HCI in the new Millennium, 7(1):29-58, March. 

2.    G. D. Abowd, C. G. Atkeson, J. Hong, S. Long, R. Kooper, and M. Pinkerton. Cyberguide: A Mobile Context-Aware Tour Guide. Baltzer/ACM Wireless Networks, 3(5):421 to 433, October 1997.

3.*  Ullmer, B. and Ishii, H., Emerging Frameworks for Tangible User Interfaces, in IBM Systems Journal, Vol. 9, Nos. 3&4, 2000.

 

Session 19

1.    T. Starner, S.Mann, B.Rhodes, J.Levine, J.Healey, D.Kirsch, R.Picard, and A.Pentland. Augmented reality through wearable computing. Presence, 6(4):386-398, 1997.

2.    Tim Kindberg et al, People, Places, Things: Web Presence for the Real World, ACM Journal Mobile Networks and Applications

3.*  Blackwell, A.F. and Hague, R. (2001). AutoHAN: An Architecture for Programming the Home. In Proceedings of the IEEE Symposia on Human-Centric Computing Languages and Environments, pp. 150-157.

Session 20
Tuesday, April 29

Session 21
Thursday, May 1

Streaming and Energy-Management

 

 

 

Session 20

1.      M. Gordon, W. Thies, M. Karczmarek, J. Wong, H. Ho mann, D. Maze, and S. Amarasinghe. A stream compiler for communication-exposed architectures. In In the Proceedings of the Tenth Conference on Architectural Support for Programming Languages and Operating Systems, October 2002.

2.      Ujval J. Kapasi, William J. Dally, Scott Rixner, John D. Owens, and Brucek Khailany, The Imagine Stream Processor. Proceedings of the IEEE International Conference on Computer Design, September 16-18, 2002, Freiburg, Germany, pp. 282-288.

Session 21

1.      M. Zhang and K. Asanovic. Highly-Associative Caches for Low-Power Processors. Kool Chips Workshop, MICRO-33, 2000.

2.      J. Flinn and M. Satyanarayanan, "Energy-Aware Adaptation for Mobile Applications," in Symposium on Operating Systems Principles, pp. 48--63, December 1999.

Session 22

Tuesday May 6

Session 23

Thursday May 8

 

Energy-Management, Software Radios, and Multi-modal Interfaces

 

Session 22

1.     Ulrich Kremer, Jamey Hicks, and James M. Rehg. Compiler-directed remote task execution for power management. In Workshop on compilers and operating systems for low power (COLP'00), October 2000.

2.     Heng Zeng, Carla Ellis, Avlin Lebeck, and Amin Vahdat, “ECOSystem: Managing Energy as a First-Class Operating System Resource”.  Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2002.

Session 23

1.      Vanu Bose, Alok Shah, Michael Ismert. Software Radios for Wireless Networking. Infocomm '98.

2.      Kevin Wilson, Vibhav Rangarajan, Neal Checka, Trevor Darrell, Audiovisual Arrays for Untethered Spoken Interfaces, Proceedings of International Conference on Multimodal Interfaces, 2002. (You might want to read the first few pages of the optional paper to understand the concept of beam-forming)

3.      * Giuliani, D., Matassoni, M., Omologo, M., and Svaizer, P. (1997). Use of Different Microphone Array Configurations for Hands-free Speech Recognition in Noisy and Reverberant Environment In Proc. of EUROSPEECH. 31

 

Session 24

Tuesday May 13

Session 25

Thursday May 15

 

 

 

 

Project Presentations.