Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises Max Mühlhäuser Technische Universität Darmstadt, Germany Iryna Gurevych Technische Universität Darmstadt, Germany InformatIon scIence reference Hershey • New York Acquisitions Editor: Development Editor: Editorial Assistants: Senior Managing Editor: Managing Editor: Copy Editors: Typesetter: Cover Design: Printed at: Kristin Klinger Kristin Roth Ross Miller, Deborah Yahnke Jennifer Neidig Sara Reed Alana Bubnis, Erin Meyer Michael Brehm Lisa Tosheff Yurchak Printing Inc Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E Chocolate Avenue, Suite 200 Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: cust@igi-global.com Web site: http://www.igi-global.com and in the United Kingdom by Information Science Reference (an imprint of IGI Global) Henrietta Street Covent Garden London WC2E 8LU Tel: 44 20 7240 0856 Fax: 44 20 7379 0609 Web site: http://www.eurospanonline.com Copyright © 2008 by IGI Global All rights reserved No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher Product or company names used in this set are for identification purposes only Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark Library of Congress Cataloging-in-Publication Data Handbook of research on ubiquitous computing technology for real time enterprises / Max Muhlhauser and Iryna Gurevych, editors p cm Summary: "This book combines the fundamental methods, algorithms, and concepts of pervasive computing with current innovations and solutions to emerging challenges It systemically covers such topics as network and application scalability, wireless network connectivity, adaptability and "context-aware" computing, information technology security and liability, and human-computer interaction" Provided by publisher Includes bibliographical references and index ISBN-13: 978-1-59904-832-1 (hardcover) ISBN-13: 978-1-59904-835-2 (ebook) Ubiquitous computing Handbooks, manuals, etc Real-time data processing Handbooks, manuals, etc I Mühlhäuser, Max II Gurevych, Iryna QA76.5915.H35 2007 004 dc22 2007032050 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library All work contributed to this book set is original material The views expressed in this book are those of the authors, but not necessarily of the publisher If a library purchased a print copy of this publication, please go to http://www.igi-global.com/reference/assets/IGR-eAccess-agreement.pdf for information on activating the library's complimentary electronic access to this publication Editorial Advisory Board Erwin Aitenbichler Technische Universität Darmstadt, Germany Max Mühlhäuser Technische Universität Darmstadt, Germany Hidir Aras University of Bremen, Germany Christof Müller Technische Universität Darmstadt, Germany Gerhard Austaller Technische Universität Darmstadt, Germany Daniel Oberle SAP Research, Germany Alexander Behring Technische Universität Darmstadt, Germany Andreas Petter Technische Universität Darmstadt, Germany Dirk Bradler Technische Universität Darmstadt, Germany Robert Porzel University of Bremen, Germany Martin Faust University of Bremen, Germany Sebastian Ries Technische Universität Darmstadt, Germany Iryna Gurevych Technische Universität Darmstadt, Germany Dirk Schnelle Technische Universität Darmstadt, Germany Andreas Hartl Technische Universität Darmstadt, Germany Daniel Schreiber Technische Universität Darmstadt, Germany Melanie Hartmann Technische Universität Darmstadt, Germany Julian Schröder-Bernhardi Technische Universität Darmstadt, Germany Andreas Heinemann Technische Universität Darmstadt, Germany Jürgen Steimle Technische Universität Darmstadt, Germany Marc Herrlich University of Bremen, Germany Joachim Steinmetz Technische Universität Darmstadt, Germany Jussi Kangasharju Technische Universität Darmstadt, Germany Stefan-Georg Weber Technische Universität Darmstadt, Germany Tobias Klug Technische Universität Darmstadt, Germany Markus Weimar Technische Universität Darmstadt, Germany Tobias Limberger Technische Universität Darmstadt, Germany Torsten Zesch Technische Universität Darmstadt, Germany Fernando Lyardet Technische Universität Darmstadt, Germany Table of Contents Detailed Table of Contents viii Foreword xvi Preface xix Acknowledgment xli Chapter I Introduction to Ubiquitous Computing / Max Mühlhäuser and Iryna Gurevych Section I Scalability: Two Issues of Global Scale Chapter II Bionics: Learning from “The Born” / Tobias Limberger 38 Chapter III Ubiquitous Services and Business Processes / Alistair Barros 57 Chapter IV Ontologies for Scalable Services-Based Ubiquitous Computing / Daniel Oberle, Christof Bornhövd, and Michael Altenhofen 88 Chapter V Service Discovery / Gerhard Austaller 107 Section II Connectivity: Tapping into Humans and Items Chapter VI Wireless and Mobile Communications / Jochen H Schiller 133 Chapter VII Event-Based and Publish/Subscribe Communication / Erwin Aitenbichler 152 Chapter VIII Peer-to-Peer Systems / Jussi Kangasharju 172 Chapter IX Opportunistic Networks / Andreas Heinemann 190 Chapter X Smart Items in Real Time Enterprises / Zoltán Nochta 211 Section III Adaptability: What is (Not) Content? Chapter XI Context Models and Context Awareness / Melanie Hartmann and Gerhard Austaller 235 Chapter XII A Focus on Location Context / Erwin Aitenbichler 257 Chapter XIII Adapting to the User / Matthias Jöst 282 Section IV Liability: From IT Security to Liability Chapter XIV Accounting and Charging: Guarantees and Contracts / Burkhard Stiller, David Hausheer, Jan Gerke, Peter Racz, Cristian Morariu, and Martin Waldburger 302 Chapter XV Security for Ubiquitous Computing / Tobias Straub and Andreas Heinemann 337 Chapter XVI Trust and Accountability / Sebastian Ries 363 Section V Ease-of-Use: Natural and Multimodal Interaction Chapter XVII Mobile Speech Recognition / Dirk Schnelle 397 Chapter XVIII Mouth and Ear Interaction / Dirk Schnelle 421 Chapter XIX Advanced Hands and Eyes Interaction / Michael Weber and Marc Hermann 445 Chapter XX Intelligent User Interfaces for Ubiquitous Computing / Rainer Malaka 470 Chapter XXI Multimodal and Federated Interaction / Frankie James and Rama Gurram 487 Chapter XXII Multimodal Software Engineering / Andreas Hartl 508 Chapter XXIII Ambient Learning / Fernando Lyardet 530 Section VI Pilots and Trends at SAP Research Chapter XXIV CoBIs: Collaborative Business Items / Patrik Spieß and Jens Müller 551 Chapter XXV PROMISE: Product Lifecycle Management and Information Tracking Using Smart Embedded Systems / Jürgen Anke, Bernhard Wolf, Gregor Hackenbroich, Hong-Hai Do, Mario Neugebauer, and Anja Klein 559 Chapter XXVI Real-Time Location Tracking Mashup for Enterprise / Louenas Hamdi, Rama Gurram, , and Samir Raiyani 567 Chapter XXVII Towards Adaptive Security for Ubiquitous Computing Systems: MOSQUITO and Serenity / Volkmar Lotz, Luca Compagna, and Konrad Wrona 574 Chapter XXVIII Multimodal Warehouse Project / Samir Raiyani and Matthias Winkler 585 Chapter XXIX Business Grids: Grid Computing for Business Applications / Wolfgang Gerteis 591 About the Contributors 601 Index 611 Detailed Table of Contents Foreword xvi Preface xix Acknowledgment xli Chapter I Introduction to Ubiquitous Computing / Max Mühlhäuser and Iryna Gurevych The authors briefly describe the history of ubiquitous computing Some terms and a few important standards are subsequently introduced In the last part, two kinds of reference architectures for ubiquitous computing systems are discussed by way of example Section I Scalability: Two Issues of Global Scale Chapter II Bionics: Learning from “The Born” / Tobias Limberger 38 The chapter focuses on distributed approaches to address the scalability challenges in ubiquitous computing by means of bio-analog algorithms, which draw upon the realm of biology The author describes the algorithms based on the phenomena found on the organism level of biological systems and examines the algorithms imitating procedures both on the cell and the molecular levels Bio-analog approaches are finally extrapolated to data management as a novel field Chapter III Ubiquitous Services and Business Processes / Alistair Barros 57 The author describes service-oriented architecture (SOA) based on Web services interfaces and messaging, and service composition through single-party process orchestration and multi-party choreography languages For the latter, concrete patterns are used to describe the capabilities of prospective standards Ways in which SOA needs to be extended to allow wider and more flexible service trading, typified in current developments through service marketplaces, are then discussed Such extensions converge with directions in ubiquitous computing through so-called ubiquitous service networks and service ecosystems Chapter IV Ontologies for Scalable Services-Based Ubiquitous Computing / Daniel Oberle, Christof Bornhövd, and Michael Altenhofen 88 Ontologies are proposed to address the scalability problems in ubiquitous computing, such as: (i) identifying relevant services for deployment, (ii) verifying a composition by a logical rule framework, and (iii) enabling the mapping of required services to the “best” available device The authors focus on the ontology languages emerging from the corresponding W3C Semantic Web Activity The pros and cons of ontologies are contrasted at a general level and the benefits and challenges in concrete smart items middleware are demonstrated Chapter V Service Discovery / Gerhard Austaller 107 The chapter briefly discusses the attributes that define SOA and the roles of the participants in a service oriented environment In essence, SOA permits clients in open systems to use services offered by a service provider in the context of a workflow or complex task Services are offered with a description at well-known “places” (also called registries, repositories), where clients choose services according to their needs The chapter discusses several approaches to describing services and to searching for them Moreover, some well-known systems and current related research are discussed Section II Connectivity: Tapping into Humans and items Chapter VI Wireless and Mobile Communications / Jochen H Schiller 133 The chapter focuses on different wireless and mobile communication systems that form the technological basis for ubiquitous computing applications Depending on many parameters, such as transmission range, desired data rates, cost, mobility, power consumption, scalability in the number of users, and so forth, different communication systems have been developed They are surveyed and compared and future directions are highlighted Chapter VII Event-Based and Publish/Subscribe Communication / Erwin Aitenbichler 152 The chapter introduces a taxonomy of communication models and emphasizes the event-based model and publish-subscribe paradigm that will supersede the client-server paradigm in the ubiquitous computing era The relevant aspects of the publish-subscribe paradigm are introduced along with known approaches The inner working of distributed event-based systems is thoroughly treated 0 About the Contributors Max Mühlhäuser is head of the Telecooperation Division at Technische Universität Darmstadt, Computer Science Department He has about 25 years of experience in research and teaching in areas related to ubiquitous computing (UC) at the Universities of Kaiserslautern, Karlsruhe, Linz, Darmstadt, Montréal, Sophia Antipolis, and San Diego (UCSD) In 1993, he founded the TeCO Institute (www.teco.edu) in Karlsruhe, Germany that became one of the pacemakers for UC research in Europe SAP Research is one of his major industrial partners Max regularly publishes in UC conferences and journals and is an author of chapters about ubiquitous computing in computer science textbooks, readers, and so forth, with a total of more than 200 publications He is a reviewer for UC conferences, member of editorial boards in journals, and guest editor in journals like Pervasive Computing, ACM Multimedia, Pervasive and Mobile Computing, and so forth Iryna Gurevych is head of the Ubiquitous Knowledge Processing Group at the Technische Universität Darmstadt She has a PhD in natural language processing (NLP) and worked in the Mobile Assistance Systems and Natural Language Processing Groups in basic and applied research at European Media Lab in Heidelberg, Germany Her expertise is in unstructured information management, knowledge-based methods, and human-computer interaction Gurevych is principal investigator in several research projects funded by the German Research Foundation in the areas of semantic computing, ontology applications and language based human-computer interaction She publishes and is a reviewer for international conferences about NLP, dialogue systems and computational semantics *** Erwin Aitenbichler received an MSc in computer science from Johannes Kepler University in Linz, Austria and a PhD in computer science from Darmstadt University of Technology, Germany Currently he is a post-doctoral researcher in the Telecooperation Group in the Department of Computer Science at the Technische Universität Darmstadt His research interests are smart environments and ubiquitous computing Aitenbichler is a member of the ACM Michael Altenhofen studied computer science at the University of Karlsruhe, where he graduated in 1990 with his diploma thesis on tutoring support in NESTOR, a joint research project between the University of Karlsruhe and the CEC Karlsruhe, the European Applied Research Center of Digital Equipment Corporation After joining Digital at the CEC Karlsruhe, he became technical project leader in various German and European funded research projects working on multi-media collaboration and electronic Copyright © 2008, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited About the Contributors commerce systems Within the national L3 Lighthouse Project, he designed and developed various runtime components and coordinated their transfer into SAP product offering, the SAP Learning Solution In his current role as a development architect within SAP Research, he is working on topics in the areas of software engineering, service-oriented architectures, modelling, and semantics Jürgen Anke is research associate and joined SAP Research in early 2005 In the PROMISE Project, he is mainly responsible for the middleware He studied information systems at Dresden University of Technology and the University of Auckland, New Zealand, and holds a master’s degree in that subject Currently, he is working on his PhD thesis on deployment planning of components in smart item environments Emile Aarts holds an MSc and a PhD in physics For more than 20 years he has been active as a research scientist in computing science Since 1991 he has held a teaching position at the Eindhoven University of Technology as a part-time professor of computing science He also serves on numerous scientific and governmental advisory boards He holds a part-time position of senior consultant with the Center for Quantitative Methods in Eindhoven, The Netherlands Aarts is the author of 10 books and more than 150 scientific papers on a diversity of subjects including nuclear physics, VLSI design, combinatorial optimization and neural networks In 1998 he launched the concept of ambient intelligence, and in 2001 he founded Philips’ HomeLab His current research interests include intelligent systems and interaction technology Gerhard Austaller received a master’s degree in computer science from the Johannes Kepler University Linz in 1999 For another two years he worked there as research assistant and was involved in an industrial project with Siemens, Austria The focus of his research was distributed object-oriented systems In 2001 he joined the Telecooperation Group at the Technische Universität Darmstadt led by Dr Max Mühlhäuser The focus of his current research is service-oriented architectures in the context of ubiquitous computing His research interests are the application of SOA to UC This includes service descriptions for services in UC and feasible application development models Alistair Barros is research leader at SAP Research with interests in business process management, software architectures and services sciences He has a PhD in computer science from the University of Queensland and 21 years experience working at CITEC and the Distributed Systems Technology Centre, before joining SAP in 2004 Barros has around 40 publications in referred journals and international conferences, and his research has contributed to international standards, references (notably patterns in the BPM field), product transfers, patents and consultancies including Boeing, Queensland Government and Australian Defence At SAP Research, he leads the Internet of Services research field Christof Bornhövd is a senior research scientist at the SAP Research Center in Palo Alto focusing on data management, semantics and event-based computing for SAP’s next-generation enterprise business applications architecture Prior to joining SAP Labs, he worked from 2002 to 2004 as a research staff member at the IBM Almaden Research Center on database caching and replication for e-business applications and the integration of DB2 and WebSphere From 2000 to 2002 he worked at HP Labs on CRM and data warehousing projects During his time at the Technische Universität Darmstadt, where he received a PhD in computer science in 2000, he was working on semantic data integration and metadata 0 About the Contributors methods, and human-computer interaction Gurevych is principal investigator in several research projects funded by the German Research Foundation in the areas of semantic computing, ontology applications and language-based human-computer interaction She publishes and is a reviewer for international conferences about NLP, dialogue systems and computational semantics Rama Gurram is currently working as a research scientist at SAP Labs, Palo Alto, USA In his current role at SAP, he is involved in the research of advanced Web technologies for enterprise applications Prior to joining SAP, Gurram worked as a software architect at Hewlett-Packard, USA His current interests include Web 2.0, SOA, REST, messaging, mobility, HCI and open source frameworks Gurram received a master’s degree in computer science from Birla Institute of Technology & Science (BITS - Pilani), India Gregor Hackenbroich is a senior researcher at SAP Research He is responsible for several research projects with German or EU funding He manages the PROMISE project that explores the strategic advantages of smart items in product lifecycle management Hackenbroich received his habilitation in theoretical physics from Essen University, and his doctoral degree and diploma in physics from the University of Munich Do Hong Hai finished his PhD thesis in 2006 on “Schema Matching and Mapping-based Data Integration” in computer science at the University of Leipzig, Germany Since 2005, he has worked as a senior researcher for SAP AG at the SAP Research CEC Dresden and is currently involved in project activities of smart items and data management and analytics Louenas Hamdi received an engineer diploma in computer science from Université de Tizi-Ouzou, Algeria and a master’s degree in software engineering from ETS (École de Technologie Supérieure), Montreal, Canada He joined the SAP Research team in Montreal in January 2004 He is leading a project in Web 2.0 for Mobility and has been involved in different projects related to real world awareness, mobility and the advanced Web technologies His research interests are: mobile applications/architectures, occasionally dis-/connected architectures, Mobile Web 2.0, mobile search and real world awareness Andreas Hartl has been working on adaptive user interfaces since 1999 Born in 1977, he studied computer science at the Johannes Kepler University in Linz, Austria where he worked on user interfaces for cell phone applications as a junior researcher After finishing his Master of Engineering in 2002, he joined the Telecooperation Group of the Technische Universität Darmstadt in Germany with the goal to couple usability with ubiquitous computing via adaptive user interfaces At the time of writing, he is about to finish a PhD thesis on the subject and to move back to Austria Melanie Hartmann received her diploma degree in 2006 from the Technische Universität Darmstadt Then she joined the Telecooperation Group at the Technische Universität Darmstadt led by Dr Max Mühlhäuser She is working there for the project “AUGUR” and is investigating how context can be used for building proactive user interfaces Her research interests are context-aware computing, intelligent user interfaces and ubiquitous computing 0 About the Contributors David Hausheer received his diploma degree in electrical engineering and his doctoral degree in communication systems from ETH Zurich in 2001 and 2006, respectively During his PhD studies, he was involved in the European Union projects M3I and MMAPPS Since 2005 Dr Hausheer is employed as a postdoctoral researcher in the Department of Informatics (IFI) at the University of Zurich, focusing on accounting and charging for grid and P2P services as well as decentralized auctions for bandwidth trading He is currently involved in several EU projects, such as EMANICS, Akogrimo, and EC-GIN Furthermore, he served as PC co-chair for the 2006 IEEE International Workshop on Bandwidth on Demand, Tutorial Co-chair for ACM Autonomous Infrastructure, Management and Security (AIMS 2007), and TPC member for AIMS 2007 and ICC 2007 He has written more than 10 peer-reviewed publications and acted as a reviewer for more than 20 conferences and workshops Andreas Heinemann received his diploma degree in 1999 from the University of Tübingen, Germany From 2000 to 2001 he worked as a software developer for a financial institute From 2002 to 2005, he was a PhD student in the PhD program “Enabling Technologies for Electronic Commerce.” The program studies the technical, legal and social aspects of electronic commerce Since 2005 he has worked as a research assistant at the Telecooperation Group, led by Dr Max Mühlhäuser at the Technische Universität Darmstadt His research interests are opportunistic networks, mobile peer-to-peer networks and security for ubiquitous computing Marc Hermann received his diploma degree in 2001 from the Ulm University He then joined the e-learning project “Docs ‘n Drugs – The Virtual Polyclinic” at the Ulm University Institute of Media Informatics led by Dr Michael Weber He is currently working there as research associate His research interests are alternative user interfaces, especially tangible interfaces and ambient displays for use in ubiquitous computing Frankie James is a senior researcher in human-computer interaction at SAP Research Dr James received a PhD in computer science from Stanford University in June 1998 for research on audio HTML interfaces for blind users While at Stanford, she also worked with the Archimedes Project at the Center for the Study of Language and Information (CSLI) Dr James joined SAP Research in March 2001 from RIACS (Research Institute for Advanced Computer Science), a NASA contractor, where she studied voice interfaces She is a member of ACM’s Special Interest Groups on Computer-Human Interaction (SIGCHI) and Accessible Computing (SIGACCESS) Matthias Joest is a senior scientist active in the areas of location-based services, spatial-information theory, human-computing interaction, personalization and context-aware applications Since 1998 he has been contributing at the European Media Laboratory to a number of third-party funded research projects such as SmartKom and ATTRACT, or projects funded by the Klaus Tschira Foundation, for example Deep Map I & II He has published various book chapters, journal and conference papers in the above-mentioned areas Furthermore he is assistant lecturer for geographic information systems and location-based services at the University of Heidelberg Since 2005 he has been managing the transition of some of EML’s research results into a product, namely a wireless pedestrian information portal This product is currently deployed in Heidelberg and Beijing 0 About the Contributors Jussi Kangasharju received an MSc from Helsinki University of Technology in 1998 and a DEA from the University of Nice Sophia Antipolis, also in 1998 He received a PhD from the University of Nice Sophia Antipolis/Institut Eurecom in 2002 Currently he is an assistant professor in the Department of Computer Science at the Technische Universität Darmstadt, heading the research group “Ubiquitous Peer-to-Peer Infrastructures.” His research interests are peer-to-peer technologies, Internet content distribution, and ubiquitous computing He has published over 40 articles in major international journals and conferences Kangasharju is a member of IEEE and ACM Anja Klein is a research associate at SAP Research She is currently working on the PROMISE project, where her focus lies on management and visualization of product lifecycle data in smart item environments Furthermore, she participates in the SAP PhD program Her thesis discusses data quality and non-functional requirements for streaming data and data analytics Tobias Limberger studied computer science at the Technische Universität Darmstadt where he also received a doctor’s degree from the Department of Computer Science and the Department of Psychology In his first course of studies, he concentrated on artificial intelligence and neural networks, choosing neurobiology as a minor field of study His special interest in data bionics influenced his PhD in which he worked on bio-analog data management software and cooperated with the Center of Biotechnical Engineering Darmstadt Volkmar Lotz is the research program manager for security and trust at SAP Research His responsibilities include the definition and implementation of SAP’s security research agenda, its strategic alignment to SAP's business needs, and the maintenance of a global research partner network Before joining SAP, he was heading the Formal Methods in Security Analysis Group at Siemens Corporate Technology, emphasizing on security requirements engineering, evaluation and certification, cryptographic protocol verification, and mobile code security He has been the main contributor to the LKW model, a formal security model for smartcard processors His experience includes context-aware mobile systems, legally binding agent transactions, and authorization and delegation in mobile code systems Fernando Lyardet obtained an MSc in informatics from the Universidad Nacional de La Plata (UNLP), Argentina, where he then worked as a software developer and subsequently as a research assistant, until August 2002 After that, he joined the Telecooperation group as a PhD candidate at the Technische Universität Darmstadt, Germany His research interests include smart environments and ubiquitous computing Rainer Malaka is a professor of computer science at the University of Bremen and heads the Digital Media Research Group He has been responsible for a number of research projects related to human-computer interaction, mobile systems and adaptive systems These projects were done in close collaboration with various national and international institutes and companies He started working at the University of Bremen in April 2006 Before that, he worked at the European Media Laboratory (EML) where he initiated and led a research group, which worked on projects dealing with mobile assistance systems, language understanding, geographical information systems, and computer vision Before joining the EML, he did a diploma at the University of Karlsruhe and worked there as a research scientist on neural networks and modeling the learning mechanisms in biological brains 0 About the Contributors Cristian Morariu received an MSc from the Technical University of Cluj-Napoca, Romania (June 2004) His major at the Faculty of Automation and Computer Science was performed in computer science While holding an ERASMUS scholarship he developed his master’s thesis at ETH Zürich, Laboratory of Software Technology Since September 2004 he has been a junior researcher at the University of Zurich, Department of Informatics, Communication Systems Group His work experience includes—besides being an instructor on laboratory demonstrators and the Cisco Certified Networking Associate (CCNA) Program—managing Unix systems and networks His areas of research include the theory of operation, design principles, and troubleshooting of protocols, such as TCP/IP, IP routing (BGP, OSPF, RIP), multicast, and data link layer protocols In detail he knows about ethernet, fast ethernet, PPP, and frame relay Additionally, he has much practical experience with network management systems, network security, AAA Architectures, and QoS mechanisms Jens Müller studied computer science at the University of Tübingen He is a research associate at SAP Research in Karlsruhe and a PhD student at the Wilhelm-Schickard-Institute for Computer Science, University of Tübingen He is a member of the ACM Mario Neugebauer is a senior researcher at SAP Research He works in the EU-funded project PROMISE and explores the potential of embedded systems for enterprise software Previously, he worked at the chair for technical information systems at the TU Dresden Neugebauer received his doctoral degree in computer science in the area of wireless sensor networks from the TU Dresden Zoltán Nochta studied computer science at the Budapest University of Technology and Economy in Hungary and at the University of Karlsruhe, Germany He worked for four years as research assistant at the Institute for Telematics at the University of Karlsruhe and conducted research in the area of secure networking and applied cryptography He was involved in several industrial projects with Deutsche Telekom In 2004, he joined the Smart Items research team of SAP Research Since then he has been contributing to several research projects in this area He is focusing on the conceptual design of ubiquitous system architectures as well as on their service-oriented integration into enterprise business software systems Daniel Oberle received a PhD from the University of Karlsruhe, Germany, Institute AIFB, Professor Studer’s Group, in 2005 His thesis discussed the application of Semantic Web technologies (ontologies, reasoning) in current middleware solutions, such as application servers and Web services, to facilitate the daily tasks of developers and administrators The corresponding book is entitled Semantic Management of Middleware (Springer Verlag) Oberle (co-)authored about 40 refereed publications in selected books, conferences, and journals He has been working at SAP Research since March 2006 Peter Racz received an MSc in computer science from the Budapest University of Technology and Economics (BME) in 2000 After his studies he joined the Department of Mobile Networks at Siemens AG, Germany, and worked for three years as a researcher, focusing on next generation mobile networks and QoS provisioning in 3G networks In 2003 he joined the University of Federal Armed Forces Munich (UniBwM) as a research assistant and started his doctoral studies Since 2005 he has been a research assistant at the Department of Informatics (IFI) at the University of Zurich and is pursuing his doctoral degree His main research area includes accounting and charging for IP-based services in mobile, multi- 0 About the Contributors a PhD student in the Telecooperation Group at the Technische Universität Darmstadt, led by Dr Max Mühlhäuser His research interests are voice user interface design in the ubiquitous computing area Since 2007 he has worked as a solution architect with a focus on workflow processes Patrik Spieß is a research associate at SAP Research’s CEC Karlsruhe Prior to joining SAP Research in 2004, he obtained a Diplom (master’s equivalent) from the University of Karlsruhe He works in the SOCRADES project, which transfers best practices of enterprise software design (like SOA) to automation systems engineering Collaborating with the Institute of Operating Systems and Computer Networks of the University of Braunschweig, he is pursuing a PhD on the topic of efficient integration of ubiquitous systems with business processes His research interests include ubiquitous systems, userfriendly software, end-user development, open source research, and social networking research Burkhard Stiller received his diploma degree in computer science and his doctoral degree from the University of Karlsruhe in 1990 and 1994, respectively After being a research assistant at the University of Karlsruhe, and on leave for an EC research fellowship at the University of Cambridge, Computer Laboratory, UK, he joined the Computer Engineering and Networks Laboratory, TIK of ETH Zürich After his assistant professorship for communication systems at ETH he held a full professorship at the University of Federal Armed Forces Munich (UniBwM) Since September 2004 he has held the communication systems full professorship at the University of Zürich, Department of Informatics, IFI He participated in or managed several national research projects within Germany, Switzerland, and the UK as well as European IST projects, such as Akogrimo, Daidalos, EMANICS, MMAPPS, MobyDick, CATI, M3I, DAMMO, DaCaPo++, and BioLANCC His main research interests include charging and accounting for IP-based networks, economics of IP services, grid services, auctions for services, communication protocols in the Internet, biometric access control, quality-of-service aspects, peer-to-peer systems, and network management Tobias Straub has been a researcher at the Fraunhofer Institute for Secure Information Technology in Darmstadt since 2005 Currently, he is in charge of the Fraunhofer Competence Center PKI Tobias Straub received his PhD in computer science from the Technische Universität Darmstadt and a master’s degree in mathematics from the University of Tübingen Since 2001, he has worked as a part-time lecturer at the Information Technology Department of the University of Cooperative Education in Lörrach His research interests include PKI and its applications as well as usability aspects of cryptography Martin Waldburger holds a Master of Science in informatics (MSc), which he received in 2004 from the University of Zurich In the same year, he joined the Communication Systems Group (CSG) at the University of Zurich in the position of an assistant and doctoral student He participates in the EU project “Access to Knowledge through the Grid in a Mobile World” (Akogrimo) and the European Union Network of Excellence “Management of Internet Technologies and Complex Services” (EMANICS) His research work is mainly concerned with legal aspects of electronic service provisioning in multidomain environments, adding business modeling, service level agreements, and various applications of these methods in the aquaculture supported by mobile grid services Michael Weber holds a PhD in computer science from the University of Kaiserslautern After a number of years in industry, working on parallel and multimedia systems, he joined the University of Ulm as a 0 About the Contributors professor for computer science in 1994 and was appointed director of the Institute of Media Informatics in 2000 He has authored and co-authored more than 100 peer reviewed contributions, edited three books and written a textbook He has led projects funded by the state of Baden-Württemberg, by the German Ministry for Education and Research (BMBF), by the European Commission and by industrial partners His current research interests include mobile and ubiquitous computing systems and humancomputer interaction Matthias Winkler received a bachelor’s degree in media and computer science from Dresden University of Technology, Germany, and a master’s degree in interactive systems engineering from the Royal Institute of Technology (KTH) in Stockholm, Sweden He joined the SAP Research group in Dresden in 2006 There he is leading the “EMODE” project, which investigates the modelling of multimodal, adaptive applications His research interests are multimodal user interfaces and UI adaptation, and model-driven development Bernhard Wolf is a research associate in SAP Research’s PhD program and joined the PROMISE project at the beginning of 2006 His current area of research is the integration of field device information with enterprise software systems He holds a master’s degree in electrical engineering with specialization in automation from the Dresden University of Technology Konrad Wrona is currently a principal investigator at SAP Research Lab in Sophia Antipolis, France He has over 10 years of work experience in an industrial (SAP Research and Ericsson Research) and in an academic (RWTH Aachen University, Media Lab Europe, and Rutgers University) research and development environment He earned his MEng in telecommunications from Warsaw University of Technology, Poland and a PhD in electrical engineering from RWTH Aachen University, Germany He is an author and a co-author of over twenty publications, as well as a co-inventor of several patents The areas of his professional interests include security in communication networks, wireless and mobile applications, distributed systems, applications of sensor networks, and electronic commerce He was a technical coordinator of the EU FP6 Specific Targeted Research Project: Mobile Workers’ Secure Business Applications in Ubiquitous Environments (MOSQUITO) 0 Index Symbols 2-D mouse 458 3-D mouse 458 A absolute positioning 430 abstract user interfaces 509, 520 abstract user interfaces, examples of 522 abstract user interfaces, requirements of 521 account, definition 305 accountability 364, 378 accountability, definition 305 accounting 303 accounting, definition 305 accounting, events 322 accounting, protocols 313 accounting records, definition 305 accumulative systems 380 activity based costing (ABC) 318 ad-hoc network 43 adaptability 230 adaptation, and computing environments 283 adaptation, interaction 284 adaptation, of content 285 adaptation, personalized 286 adaptation, presentation 285 adaptive, computing 597 adaptive, security 575 adaptivity 237 addressing 180, 181 ad hoc, interaction 340 ad hoc, wireless federation 501 advanced hands and eyes interaction 446 affordance 449 Ajax 573 ambient, display 464 ambient, intelligence ambient, learning 531 analytic approach 39, 54 angulation 263 ant colony optimization 40 application service provider 306 artificial intelligence (AI) 3, 4, 6, 7, 8, 545 artificial neural networks (ANN) 417 asset tracking 259 asymmetric, cryptosystems 346 asymmetric, digital subscriber line (ASDL) cable 325 asymmetric, intelligence 543 asynchronous transfer mode (ATM) services 324 attention-awareness 462 attention detection 461 attribute-value-pairs (AVP) 314 audio, output 429 audio, streaming 404 audio, streaming, speech recognizer 404 audio, user interfaces (AUIs) 425 auditing, definition 305 auditory, displays 456 auditory, icons 429 augmented reality 460 automated teller machines (ATMs) 495 automatic, speech recognition (ASR) request 406 automatic vehicle location, (AVL) technology 568, 569 autonomous system (AS) number 309 average systems 380 AVL application architecture 570 AVL mashup application 570 B back-end enterprise systems 552 background sounds 429 beginning-of-life (BOL) 562 behaviorism 534 billing, definition 305 bio-analogy 50, 54 bionics 38, 39, 54, 55, 38 BitTorrent 174, 175, 176, 177, 186, 187, 189 blocker tags 358 Bluetooth 135, 137, 139, 145, 146, 147, 148, 150 Copyright © 2008, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited Index Bluetooth, service discovery protocol (SDP) 118, 119, 125 blurred systems 380 Bombardier 562 Bonjour 113, 116, 117, 118, 126 bootstrapping secure communication 354 business, grids 592, 599 business, grids, vision for 594 business, process, management 63 business, process, platform (BPP) 598 business, support systems (BSS) layer 314 C call detail records (CDR) 305 carrier sense multiple access with collision avoidance (CSMA/CA) 144 case-based reasoning 291 Caterpillar 562 cell phone 268 central accounting 311 charge, calculation, definition 305 charge, definition 305 charging 303 charging, approaches 323 charging, components 325 charging, definition 305 charging records, definition 305 charging scheme, definition 305 charging value-added services 327 ciphers 345 COBIS 552 code division multiple access (CDMA) 139, 140, 142, 143, 151, 152 collaborative business items 552 collaborative business items (CoBIS) 542 collective welfare 378 command and control environments 424 commercial service providers 303 commercial service provisioning 307 Common Reliable Accounting for Network Element (CRANE) protocol 315 communication, item-to-item 216 communication channel protection 575 complementary modalities 493 complex behavior 541 computational optimization 416 computational power 401 computer-based training (CBT) 534 computing, pervasive 19 computing, ubiquitous (UC) 1, 2, 3, 5, 6, 7, 8, 4, 5, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19 computing, ubiquitous (UC), synonyms conceptual model 98 constraint 449 constructive approach 39 constructivism 534 context, definition of 237 context, management 248, 256 context, representation 245, 247, 254 context, sensors 244 context, sources 241, 242, 249, 250, 254 context, storage 242, 248 context, toolkit 251 context-aware applications 240 context-aware applications, the building of 242 context-awareness 499 context adaptation 483 Context Information Acquisition and Trust Service (CATS) 578 continuous trainings 535 corporate social responsibility (CSR) 552 cross-media adaptation 484 cryptographic primitives 345 cryptographic tools 338 cryptographic tools, overview of 345 cryptography, limitations of 348 cryptography, potential of 348 cryptosystems 345 customer, definition 305 customer order application 589 D data, centre automation 594 data, dissemination 191, 192, 193, 194, 198, 199, 200, 201, 207, 209 data, grids 597 data, management 38, 40, 50, 52, 53, 54 data, origin authentication 347 data, source federation 502 decentralized accounting 311 decision trees 292 decoupling 153, 155 decoupling, flow 155 decoupling, space 155 decoupling, time 155 decryption 345 degree of freedom (DOF) 457 denial-of-service (DoS) attack 342 deployment 594 desktop computer 450 human-computer interaction 446, 509 human interaction cycle 449 hybrid accounting 311 hybrid encryption 348 I ID-based cryptography 579 IEEE 802,11 See WLAN IEEE 802.15.1 See Bluetooth IEEE 802.15.4 See ZigBee IEEE 802.16 See WiMAX IETF (Internet Engineering Task Force) 308 implicit learning 534 incentive schemes 191, 196, 198, 203, 204, 205, 206, 210 individual rationality 378 informal learning 534 information, clouds (iClouds) 194, 200, 203, 208 information, have list (iHave-list) 200, 201 information, sprinkler (IS) 194, 195, 194 information, storage 213–214 information, wish list (iWish-list) 200, 201 information technology (IT) 338 Information Technology (IT) services 304 infrared, badge 266, 271, 273 infrared, in remote controls 265 infrared light 356 input and output federation 501 input device characteristics 457 input device types 457 input modalities for mobile devices 497 integration middleware 553 intelligent user interfaces 471 inter-system communication 564 interaction techniques 446 interactive voice response (IVR) systems 427 International Civil Aviation Organization (ICAO) 358 Internet Protocol (IP)-based services 304 Internet Protocol Detail Record Organization (IPDR) 314 Internet Service Provider 306 Internet Service Provider (ISP) 306 Internet Service Providers (ISP) 304 Intrusion Detection Systems (IDS) 308 IP-based communications 303 IPDR XDR format 314 IP flow, definition 305 IP Flow Export (IPFIX) protocol 309 J Java Enterprise Edition (Java EE) 558 Java Messaging Service (JMS) 558 JavaScript 573 Javascript Application Programming Interface (API) 569 K Kazaa 176, 180, 185, 187 Kelly, Kevin 5, 7 key exchange 348 L lateration 261, 263, 270, 271 learning theories 534 LEDs (light emitting diodes) 462 legal contracts 318 lexical decoding 416 local area networks (LANs) 144, 151, 152 localized location computation (LLC) 248 location, based services 258 location, context 258 location, models 258, 259, 275, 276, 278, 279, 280 long running processes 541 lost in space 440 M man-in-the-middle (MITM) 343 management application 557 mapping 449 mapping services 570 mass hosting 595 Mel Cepstrum 411 Mel Spectrum 411 memory 401 message authentication codes (MACs) 347 message handlers 557 metadata 95 metering, definition 306 MICA (Multimodal Interaction in Context-Adaptive Systems) 499 micropayments, classifications 381 micropayment systems 381 middle-of-life (MOL) 562 middleware 167, 170, 171, 172 mixed initiative 425 mobile ad hoc networks (MANETs) 192, 194, 195, 196, 198, 200, 208 mobile computing 339 mobile speech recognition 398 modality 591 model-based user interfaces 523 model-based user interfaces, examples of 526 modification detection code (MDC) 346 monetary micropayments 381 MOSQUITO 577 MOSQUITO architecture 577 MOSQUITO components 577 MOSQUITO framework 578 MOSQUITO scenario 578 mouth and ear interaction 422 MRCP 405 MRCP ASR request 405 MRCP TTS request 405 multicast 157, 166, 170, 171, 172 multimodal 510 multimodal, different purposes 490 multimodal and federated interaction 488 multimodal fusion 490 multimodal interaction 484, 489 multimodality 488 multimodality, basics of 488 multimodality, different forms 489 multimodality, idea of 509 multimodality and accessibility 495 multimodality and security 494 multimodality for mobile devices 497 multimodality on the desktop 491 multimodal output 496 multimodal software engineering 509 multimodal technology 586 multimodal user interface 587 multimodal user interface (UI) technology 586 multimodal warehouse application 586 multimodal warehouse project 586 Multipurpose Internet Mail Extension (MIME) 405 multiscale output 450 MundoCore 16, 17, 159, 167, 168, 268, 269, 274 Museum Guide 433 N Napster 174, 176, 177, 178, 180, 181, 185, 187 natural language understanding (NLU) 425 navigation 258, 259, 260, 262, 263, 264, 267, 277, 279, 281 nearest-neighbor algorithm 292 network-based transcoding 514 Network Access Server (NAS) 313 network bandwidth 404 network dependency 403 Network Monitoring Station (NMS) 309 neural networks 44, 45, 46, 293, 296, 297 non-fungible micropayments 384 non-monetary micropayments 383 non-redundant accounting 312 Norman, Donald 5, 6, 7, 9 notification manager 557 notification system 464 O observation point 308 off-line charging mechanism 324 on-line charging mechanism 324 online maps 569 ontologies 89, 90, 92, 93, 94, 95, 96, 98, 99, 100, 101, 102, 104, 105, 107 ontology languages 89, 93, 95, 99, 101, 104 Open Grid Forum (OGF) 596 Open Grid Services Architecture (OGSA) 596 opportunistic networks 191, 192, 193, 194, 195, 196, 197, 198, 203, 205, 207 orchestration 545 out-of-band channels 356 output modalities for mobile devices 499 OWL DL 96–97 OWL Full 97 OWL Lite 96–98 P particle filtering 252, 253 passive collaboration 340 patient monitoring 341 pattern language 441 pattern recognition 43, 46, 56 peer-to-peer (P2P) networks, mobile 191, 192, 195, 197 peer-to-peer (P2P) system 310 peer-to-peer (P2P) systems 173, 174, 177, 173, 174, 175, 176, 178, 177, 179, 180, 182, 184, 185, 186, 187, 188 peer-to-peer (P2P) systems, hybrid 176 peer-to-peer (P2P) systems, structured 177, 178, 179, 182, 187 peer-to-peer (P2P) systems, unstructured 177–178 peer accounts 316 perimeter security 575 peripheral awareness 463 peripheral display 464 peripheral displays 456 personalization 289 pervasive workflow 579 phoneme-based speech recognizer 400 Pick by Voice 433 Place Lab system 268, 269, 274 plan 545 Platform for Privacy Preferences Project (P3P) 352 platform gateway 557 PLM business process 562 policy-based mechanism 352 positioning systems 259, 266, 274, 278, 280 power consumption 401 power spectrum 410 prepaid charging option 324 pricing, definition 306 privacy-enhancing technologies 350 privacy issues 191, 198, 203, 205 private authentication 351 Product Data and Knowledge Management (PDKM) 561 product embedded information devices (PEIDs) 560 product lifecycle management (PLM) 560 projective displays 452 PROMISE 560 PROMISE architecture 563 PROMISE middleware 563 PROMISE project 560 PROMISE technology 562 proof-of-work (PoW) 384 proof-of-work (PoW) techniques 353 proximity tags 358 public key cryptosystems 346 public key infrastructure (PKI) 346 publish/subscribe, communication 153, 155, 156, 164, 157, 162, 158, 159, 165, 155, 163, 156, 159, 165, 166, 167, 168, 169, 170, 171, 172 publish/subscribe, routing 167 radio frequency identification (RFID) reader coordination 553, 555 radio frequency identification (RFID) tags 554 radio frequency identification (RFID) technology 554 radio waves 265 reactive composition 545 reactive composition approaches 545 real-time data management service 569 real-time enterprises 341 real-time GPS location 569 real-time inventory 553, 555 real-time location tracking mashup for enterprise 568 Real-time Traffic Flow Measurement Architecture (RTFM) 309 real-world application scenarios 586 real time enterprises 89, 90, 91 real time enterprises, and smart items 212–229 received signal strength (RSS) 259 redundant accounting 312 relative positioning 430 remote accounting 311 Remote Authentication Dial In User Service (RADIUS) protocol 313 Remote Management Information Base (RMON) 309 replacement modalities 492 reputation systems 379 reputation systems, classifications 380 request/reply communication 153, 154 resource, definition 306 resource adaptation 594 resource allocation 594 resource description framework (RDF) 90, 95, 96, 104, 106, 107 resource sharing 173 responsiveness 404 Q S quality of service (QoS) 304, 596 quality of service (QoS), definition 306 safe entry into confined vessels 553, 554 scalability 89, 90, 91, 92 scalability, challenges 90, 91, 92 scheduling 47 screen readers 496 searching 177, 178, 180, 181, 182, 183 secure transient association 355 self-organizing map 44, 45 semantic analysis 416 semantic service descriptions 127 R radio frequency identification (RFID) 264, 273, 274, 281, 341 radio frequency identification (RFID)-based warehouse management 341 radio frequency identification (RFID) privacy 341 sensory voice recognition module 413 Serenity approach 581 Serenity framework 582 Serenity modeling artifacts 583 server load 404 service, client 109 service, composition model 90 service, definition 306 service, deployment 225, 226, 227 service, description 110, 111, 114, 115, 123, 126 service, discovery 110, 111, 112, 118, 119, 122, 123, 125, 126, 127 service, interaction patterns 75, 77 service, location protocol (SLP) 110, 122, 123 service, lookup 111, 120, 122 service, oriented architecture (SOA) 58, 59, 60, 74, 77, 81, 83, 84, 89, 90, 108, 109, 110, 111, 126 service, provider 108, 109, 121 service, registry 109 service-oriented architecture 569 Service-Oriented Knowledge Utilities (SOKU) 595 service composition 544 service dependent speech recognition 404 service federation 483 service functionality 321 service invocations 557 Service Level Agreement (SLA) 321 Service Level Agreement (SLA), definition 306 Service Level Agreements (SLAs) 304 service parameters 321 service repository 557 services-based ubiquitous computing applications 89, 90, 104 session, definition 306 session accounts 316 signal-to-noise-ratio (SNR) 403 signal processor 399, 405 signal propagation 259, 262, 263, 278 simple, object access protocol (SOAP) 59, 61, 62, 63, 64, 65, 66, 67, 84 simple, service discovery protocol (SSDP) 110, 112, 113, 114 simple behaviors 539 Simple Network Management Protocol (SNMP) 315 Simple Object Access Protocol (SOAP) 569 single hop communication 199 skimming 358 Skype 174, 175, 176, 177, 179, 180, 185, 186, 187, 188 sleep deprivation torture 343 small and medium-sized enterprises (SMEs) 595 smarter RFID shelves 555 smart items 213 smart items, and communication 215–216 smart items, middleware 218 smart product conceptual architecture 538 smart products 532, 537 smart spaces 340 smart technology 531 SNMP (Simple Network Management Protocol) 308 SNMP Management Information Base (MIB) 315 social learning 534 socionics 38, 55, 38 software performance engineering (SPE) method 598 speaking mode 403 speaking style 403 speech contexts 426 Speech Graffiti 426 speech recognition on embedded devices 400 speech recognizers in UC 403 speech signal 399 Sphinx 3.5 408 STAIRS, features of 429 Stream Control Transmission Protocol (SCTP) 313 Structured Audio Information Retrieval System (STAIRS) 428 subjective logic 374 supervision of hazardous goods 553 surround-screen displays 453 symmetric cryptosystems 345 symmetric intelligence 542 symmetric intelligence, limitations of 543 synthesis 545 system initiative 425 systems engineering 581 system state 557 T Talking Assistant (TA) 428 tangible interaction 465 tangible user interface (TUI) 465 tariff, definition 306 tariff formula, definition 306 tariff parameters, definition 306 TCP (Transmission Control Protocol) 309 technical accounting 304 telecommunication service provider 306 Web, services, interface definition (WSDL) 59, 61, 63, 65, 66, 67, 68, 69, 76, 81, 83 Web, services, orchestration 62, 63, 67 Web-based approaches 509 Web-based training technologies (WBT) 534 Web-centric approaches 511 Weiser, Mark 1, 2, 3, 4, 5, 6, 7, 8, 9, 17 wide area networks (WANs) 134, 136, 140 widget 249, 250, 251 windowing 409 wireless, local area network (WLAN) 136, 138, 139, 140, 143, 145, 146, 147, 148, 149 wireless, personal area networks (WPAN) 145, 147, 151 wireless, sensor networks (WSN) 136, 145, 147, 148 wireless multi-hop communication 343 WLAN (Wireless Local Area Network) 325 word-based speech recognizers 400 workflow 542 workflow patterns 59, 70, 73, 84, 86, 71 worldwide interoperability for microwave access (WiMAX) 135, 136, 143, 150, 152 X XQuery 168 Xybernaut 433 Z ZigBee 135, 145, 146, 147 ... by IGI Global of the trademark or registered trademark Library of Congress Cataloging-in-Publication Data Handbook of research on ubiquitous computing technology for real time enterprises / Max... very considerable and measurable economic potential of UC technology for real time enterprises The editors have reasons to believe that real time enterprises presently represent the most profitable... wealth of non-formal approaches to SLA exist for non-software, for example, call center or help-desk services, but some concepts have been formalized for software-based negotiation and control