Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Developing a context-aware electronic tourist guide: some issues and experiences
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Communications of the ACM
Data on Air: Organization and Access
IEEE Transactions on Knowledge and Data Engineering
People, places, things: Web presence for the real world
WMCSA '00 Proceedings of the Third IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'00)
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
WALRUS: wireless acoustic location with room-level resolution using ultrasound
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Hi-index | 0.00 |
Ubiquitous computing requires ready access to information that is relevant to users' context – especially information relevant to their current location. Applications on our personal devices should be able to autonomously and continuously harvest the information provided at that location and interrupt us only when it is important to do so. Currently, client devices are designed for explicit querying for information rather than continuous background harvesting of relevant information. To enable ubiquitous access to location-specific information, we can take advantage of the widespread deployment of WiFi networks. There is a wealth of location-specific information that network providers are willing to make publicly available to any users. However, today's models for accessing wireless networks do not easily support this due primarily to concerns over security and bandwidth utilization. In this paper, we present and compare the different methods that can be applied to solve the problem of continuous background access to location-specific information. Specifically, we compare client-pull and server-push models and show how tradeoffs can be made involving privacy, power consumption on devices, and utilization of wireless bandwidth. We also present three applications and discuss how the tradeoffs affect their design.