Exploiting Context in Mobile Applications

Exploiting Context in Mobile Applications

Benou Poulcheria
DOI: 10.4018/978-1-60566-026-4.ch236
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Pervasive computing is nowadays becoming a reality, exploiting the capabilities offered by both computing infrastructure and communication facilities. The pervasive computing environment encompasses a multitude of diverse devices, operating systems, protocols, and standards. It includes mobile devices such as cellular phones, smart phones, PDAs, and handheld computers for information access, smart cards, and smart labels for identification and authentication, smart sensors, and actuators that perceive the surroundings and react accordingly. Voice technologies such as automatic speech recognition (ASR), text to speech (TTS) and VoiceXML enable the construction of convenient user interfaces and Web services are a key mechanism for interoperability. Wireless wide area networking allows long distance communication through cellular radio while wireless local and personal area networking and standards such as the Wi-Fi, Bluetooth and IrDA allow short distance communication through radio waves and infrared beams. In the mobile and pervasive computing environment, software engineering should not treat diversity and mobility as problems to overcome, but seek methods of which it could take advantage instead. In these environments, the selection of purpose-oriented and timely information, tailored to user preferences and media characteristics will ensure optimised information delivery. To this end, the context—the information that surrounds the human-computer interaction—plays a key role and is rapidly changing in mobile settings, and the understanding of it is indispensable for application designers in order to choose, capture and exploit it. The importance of the context is to use it to make context-aware applications, that is, those applications that are interested in who, where, when and what, in order to determine why the situation occurs and adapt their behavior accordingly.
Chapter Preview
Top

Introduction

Pervasive computing is nowadays becoming a reality, exploiting the capabilities offered by both computing infrastructure and communication facilities. The pervasive computing environment encompasses a multitude of diverse devices, operating systems, protocols, and standards. It includes mobile devices such as cellular phones, smart phones, PDAs, and handheld computers for information access, smart cards, and smart labels for identification and authentication, smart sensors, and actuators that perceive the surroundings and react accordingly. Voice technologies such as automatic speech recognition (ASR), text to speech (TTS) and VoiceXML enable the construction of convenient user interfaces and Web services are a key mechanism for interoperability. Wireless wide area networking allows long distance communication through cellular radio while wireless local and personal area networking and standards such as the Wi-Fi, Bluetooth and IrDA allow short distance communication through radio waves and infrared beams.

In the mobile and pervasive computing environment, software engineering should not treat diversity and mobility as problems to overcome, but seek methods of which it could take advantage instead. In these environments, the selection of purpose-oriented and timely information, tailored to user preferences and media characteristics will ensure optimised information delivery. To this end, the context—the information that surrounds the human-computer interaction—plays a key role and is rapidly changing in mobile settings, and the understanding of it is indispensable for application designers in order to choose, capture and exploit it. The importance of the context is to use it to make context-aware applications, that is, those applications that are interested in who, where, when and what, in order to determine why the situation occurs and adapt their behavior accordingly.

Key Terms in this Chapter

Application-Aware Adaptation: It is the adaptation process to context, which takes place within the application as well as out of it.

Laisser-Faire Adaptation: It is the adaptation process to context, which takes place inside the application.

Service: It is piece of an information product that materializes a concrete functionality.

Context: Context is any information that can be used to characterize the situation of an entity. An entity is a person, or object that is considered relevant to the interaction between a user and an application, including the user and the application themselves.

Adaptivity or Adaptability: It is the ability of a service/application to react to its environment and change its behavior according to the context.

Application Transparent Adaptation: It is the adaptation process to context, which takes place exclusively outside the application.

Context-Aware: Context-aware is a system that uses context to provide relevant information and/or services to the user, where relevancy depends on the user’s task.

Complete Chapter List

Search this Book:
Reset