EXTENDED TABLE OF CONTENTS

Similar documents
AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS

Methodology for Agent-Oriented Software

PERSONA: ambient intelligent distributed platform for the delivery of AAL Services. Juan-Pablo Lázaro ITACA-TSB (Spain)

Challenges In Context

preface Motivation Figure 1. Reality-virtuality continuum (Milgram & Kishino, 1994) Mixed.Reality Augmented. Virtuality Real...

Charting Past, Present, and Future Research in Ubiquitous Computing

Computer Challenges to emerge from e-science

The Key to the Internet-of-Things: Conquering Complexity One Step at a Time

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS

Multi-sensory Tracking of Elders in Outdoor Environments on Ambient Assisted Living

HELPING THE DESIGN OF MIXED SYSTEMS

Middleware and Software Engineering for the Internet of Things. Sophie Chabridon Télécom SudParis

The Ubiquitous Lab Or enhancing the molecular biology research experience

Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd

CPE/CSC 580: Intelligent Agents

INTERACTION AND SOCIAL ISSUES IN A HUMAN-CENTERED REACTIVE ENVIRONMENT

BIG DATA EUROPE TRANSPORT PILOT: INTRODUCING THESSALONIKI. Josep Maria Salanova Grau CERTH-HIT

ENGINEERING SERVICE-ORIENTED ROBOTIC SYSTEMS

openaal 1 - the open source middleware for ambient-assisted living (AAL)

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Framework Programme 7

Pervasive Services Engineering for SOAs

How do you teach AI the value of trust?

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain

Definitions of Ambient Intelligence

A CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS DESIGN

The Key to the Internet-of-Things: Conquering Complexity One Step at a Time

The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems

MSc(CompSc) List of courses offered in

TRB Workshop on the Future of Road Vehicle Automation

Computer-Augmented Environments: Back to the Real World

Enabling Trust in e-business: Research in Enterprise Privacy Technologies

DESIGN AND CAPABILITIES OF AN ENHANCED NAVAL MINE WARFARE SIMULATION FRAMEWORK. Timothy E. Floore George H. Gilman

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards

ISO JTC 1 SC 24 WG9 G E R A R D J. K I M K O R E A U N I V E R S I T Y

Designing for an Internet of Humans

OBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK

Course Outline. Textbook: G. Michael Schneider and Judith L. Gersting, "Invitation to Computer Science C++ Version," 3rd Edition, Thomson, 2004.

POLICY SIMULATION AND E-GOVERNANCE

Intelligent Power Economy System (Ipes)

Web of Things for Connected Vehicles. Soumya Kanti Datta Communication Systems Department

Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture

- Basics of informatics - Computer network - Software engineering - Intelligent media processing - Human interface. Professor. Professor.

Indiana K-12 Computer Science Standards

Software-Intensive Systems Producibility

Strategic Considerations when Introducing Model Based Systems Engineering

By Mark Hindsbo Vice President and General Manager, ANSYS

BSc in Music, Media & Performance Technology

GALILEO Research and Development Activities. Second Call. Area 3. Statement of Work

USE-ME.GOV USability-drivEn open platform for MobilE GOVernment. 2. Contributions of the Project to Research under e-government

The Study on the Architecture of Public knowledge Service Platform Based on Collaborative Innovation

An Approach to Integrating Modeling & Simulation Interoperability

FUTURE NETWORKS POSITION PAPER. Author:

A Profile-based Trust Management Scheme for Ubiquitous Healthcare Environment

SOFTWARE ARCHITECTURE

Panel Discussion. Dr. Dr. Norbert A. Streitz. The infinity Initiative Sophia Antipolis, 29. November Darmstadt, Germany

Scientific Data e-infrastructures in the European Capacities Programme

Senior Design Projects: Sample Ethical Analyses

Socio-cognitive Engineering

Advances and Perspectives in Health Information Standards

SDN Architecture 1.0 Overview. November, 2014

Design and Technology Subject Outline Stage 1 and Stage 2

Context-Aware Interaction in a Mobile Environment

CPS Engineering Labs Mini-Courses Smart Cities by Indra Design Centre Spain

Research and implementation of key technologies for smart park construction based on the internet of things and cloud computing 1

ARTEMIS The Embedded Systems European Technology Platform

PYBOSSA Technology. What is PYBOSSA?

Simoco Xd Professional Digital Mobile Radio System. The complete end-to-end DMR solution supporting both Tier II conventional and Tier III trunked

Driving Force for. How cyber physical systems will change the way of future production

Mobile Edge Computing

Networks of any size and topology. System infrastructure monitoring and control. Bridging for different radio networks

Can Linguistics Lead a Digital Revolution in the Humanities?

Why do we need standards?

CHAPTER 1: INTRODUCTION. Multiagent Systems mjw/pubs/imas/

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration

Course Syllabus. P age 1 5

Issue Article Vol.30 No.2, April 1998 Article Issue

By the end of this chapter, you should: Understand what is meant by engineering design. Understand the phases of the engineering design process.

ICT Enhanced Buildings Potentials

Mission Space. Value-based use of augmented reality in support of critical contextual environments

Information Technology Fluency for Undergraduates

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime

On the Economics of Synthetic Biology: Is Openness Feasible?

Chapter 2 Understanding and Conceptualizing Interaction. Anna Loparev Intro HCI University of Rochester 01/29/2013. Problem space

First steps towards a mereo-operandi theory for a system feature-based architecting of cyber-physical systems

Wi-Fi Fingerprinting through Active Learning using Smartphones

DOCTORAL THESIS (Summary)

Industry 4.0: the new challenge for the Italian textile machinery industry

Life Sciences & The Dutch Grid: An Analysis from a Grid Supporter's perspective

CTS-D Job Task Analysis

Smart Waste Management: An IOT and Blockchains based approach

Designing Architectures

PROJECT FINAL REPORT

A Cognitive Framework for Realizing and Exploiting the Internet of Things Concept

2.6.1: Program Outcomes

National Law Enforcement and Corrections Technology Center Communications Technologies Center of Excellence

CSE 435: Software Engineering

TTÜ infotehnoloogiateaduskond Informaatikainstituut. Enn Õunapuu Vanemteadur

Engineering, & Mathematics

The secret behind mechatronics

Transcription:

EXTENDED TABLE OF CONTENTS Preface OUTLINE AND SUBJECT OF THIS BOOK DEFINING UC THE SIGNIFICANCE OF UC THE CHALLENGES OF UC THE FOCUS ON REAL TIME ENTERPRISES THE S.C.A.L.E. CLASSIFICATION USED IN THIS BOOK READER S DIGEST The chapter provides an introduction to and a definition of Ubiquitous Computing as a Computer Science field and relates it to the concept of Real Time Enterprises. The authors describe the main challenges in Ubiquitous Computing and introduce the S.C.A.L.E. classification employed to organize the contents of the book. Finally, recommendations about using the book as a reference and teaching resource are given. Chapter 1: Introduction to Ubiquitous Computing A BRIEF HISTORY OF UBIQUITOUS COMPUTING TERMS AND SELECTED STANDARDS REFERENCE ARCHITECTURES FOR UBIQUITOUS COMPUTING PROPOSED UC COMPONENT REFERENCE ARCHITECTURES UC LAYERED REFERENCE ARCHITECTURES The authors briefly describe the history of Ubiquitous Computing. Some terms and a few important standards are subsequently introduced. In the last part, two kinds of reference architectures for Ubiquitous Computing systems are discussed by way of example. Part I: Scalability Introduction to Part I: Two Aspects of Global Scale GENERAL TO SCALABILITY IMPORTANCE OF SCALABILITY FOR UBIQUITOUS COMPUTING SCALABILITY APPROACHES FOR UBIQUITOUS COMPUTING OVERVIEW OF FURTHER CHAPTERS The introduction is devoted to the notion of scalability and its categories, namely mathematical scalability and economical-technical scalability. After that the importance of scalability for ubiquitous computing systems is discussed as well as important approaches addressing this issue. This prepares the ground for the chapters in part I. Chapter 2: Bionics: Learning from "The Born" BIO-ANALOG COMPUTING ON THE ORGANISM LEVEL BIO-ANALOG COMPUTING ON THE CELL LEVEL SOMS BIO-ANALOG COMPUTING ON THE MOLECULAR LEVEL BIO-ANALOG DATA MANAGEMENT The chapter focuses on distributed approaches to address the scalability challenges in ubiquitous computing by means of bio-analog algorithms, which draw upon the realm of biology. The author describes the algorithms based on the phenomena found on the organism level of biological systems and examines the algorithms imitating procedures both on the cell and the molecular levels. Bio-analog approaches are finally extrapolated to data management as a novel field. Chapter 3: Ubiquitous Services and Business Processes SERVICE-ORIENTED ARCHITECTURE FUNDAMENTALS WEB SERVICES COMPOSITION SCALING SOA FOR UC APPLICATIONS

The author describes Service-Oriented Architecture (SOA) based on Web Services interfaces and messaging, and service composition through single-party process orchestration and multi-party choreography languages. For the latter, concrete patterns are used to describe the capabilities of prospective standards. Ways, in which SOA needs to be extended to allow wider and more flexible service trading, typified in current developments through service marketplaces, are then discussed. Such extensions converge with directions in Ubiquitous Computing through so-called ubiquitous service networks and service ecosystems. Chapter 4: Ontologies for Scalable Services-Based Ubiquitous Computing CHALLENGES IN SERVICE-ORIENTED SMART ITEMS MIDDLEWARE ONTOLOGIES AND SEMANTIC WEB SPECIFICATIONS RDF(S) OWL BENEFITS OF ONTOLOGIES LIMITATIONS OF ONTOLOGIES ONTOLOGIES FOR IMPROVING THE SMART ITEMS MIDDLEWARE CONCLUSIONS Ontologies are proposed to address the scalability problems in Ubiquitous Computing, such as: (i) identifying relevant services for deployment, (ii) verifying a composition by a logical rule framework, and (iii) enabling the mapping of required services to the best available device. The authors focus on the ontology languages emerging from the corresponding W3C Semantic Web Activity. The pros and cons of ontologies are contrasted at a general level and the benefits and challenges in concrete smart items middleware are demonstrated. Chapter 5: Service Discovery SERVICE ORIENTED ARCHITECTURES SERVICE DESCRIPTION & DISCOVERY SERVICE DISCOVERY SYSTEMS JINI UDDI API RESEARCH The chapter briefly discusses the attributes that define SOA and the roles of the participants in a service oriented environment. In essence, SOA permits clients in open systems to use services offered by a service provider in the context of a workflow or complex task. Services are offered with a description at well-known places (also called registries, repositories), where clients choose services according to their needs. The chapter discusses several approaches to describing services and to searching for them. Moreover, some well-known systems and current related research are discussed. Part II: Connectivity Introduction to Part II: Tapping into Humans and Items GENERAL TO CONNECTIVITY IMPORTANCE OF CONNECTIVITY FOR UBIQUITOUS COMPUTING CONNECTIVITY APPROACHES FOR UBIQUITOUS COMPUTING OVERVIEW OF FURTHER BOOK CHAPTERS FURTHER READING Connectivity issues in Ubiquitous Computing are described in a layered approach, from how to get the signals across to novel application paradigms. Well-known approaches for each layer are briefly mentioned, novel ones are linked to the respective chapters of book part II.

Chapter 6: Wireless and Mobile Communication AND FOUNDATIONS THE FIVE MAJOR MOST RELEVANT CLASSES OF WIRELESS NETWORKS The chapter focuses on different wireless and mobile communication systems that form the technological basis for Ubiquitous Computing applications. Depending on many parameters, such as transmission range, desired data rates, cost, mobility, power consumption, scalability in the number of users etc., different communication systems have been developed. They are surveyed and compared and future directions are highlighted. Chapter 7: Event-Based and Publish/Subscribe Communication PUBLISH/SUBSCRIBE DISTRIBUTED EVENT-BASED SYSTEMS ROUTER TOPOLOGIES ROUTING DEBS IN UBIQUITOUS COMPUTING EXAMPLES OF PUBLISH/SUBSCRIBE SYSTEMS The chapter introduces a taxonomy of communication models and emphasizes the event-based model and publish-subscribe paradigm that will supersede the client-server paradigm in the Ubiquitous Computing era. The relevant aspects of the publish-subscribe paradigm are introduced along with known approaches. The inner working of distributed event-based systems is thoroughly treated. Chapter 8: Peer-to-Peer Systems CURRENT SYSTEMS CLASSIFICATION OF EXISTING SYSTEMS RESOURCE LOCATION IN PEER-TO-PEER NETWORKS SUITABILITY OF PEER-TO-PEER SYSTEMS FUTURE OF PEER-TO-PEER SYSTEMS Wide-spread and novel application domains for peer-to-peer technology are described; challenges for appropriate support of the latter are pointed out. Unstructured peer-to-peer networks and their variants are contrasted with structured ones. The suitability and open issues in the context of Ubiquitous Computing are highlighted. Chapter 9: Opportunistic Networks AND MOTIVATION UNDERLYING IDEAS AND CONCEPTS DIFFERENCES TO MOBILE P2P AND MANETS OPPORTUNISTIC NETWORK APPLICATIONS ADDITIONAL HUMAN FACTORS RESEARCH OUTLOOK Opportunistic networks support an increasingly interesting class of Ubiquitous Computing applications, which deliberately limit connectivity to physical proximity of users. This application class and its variants are described and contrasted with wireless ad hoc networks and mobile Peer-2-Peer systems. Important human factors are treated, in particular privacy conservation and incentive schemes. Pertinent approaches are introduced by way of examples. Chapter 10: Smart Items in Real Time Enterprises WHAT ARE SMART ITEMS? HOW BUSINESS PROCESSES BENEFIT FROM SMART ITEMS? A SMART ITEM MIDDLEWARE DEVICE ABSTRACTION REQUEST PROCESSING SMART ITEMS SERVICE DEPLOYMENT

This chapter deals with the idea of how smart items i.e. electronically labeled and augmented physical entities can contribute to the overall vision of the Real Time Enterprise by utilizing different Ubiquitous Computing technologies. The main components of the Smart Items Middleware are described. Part III: Adaptability Introduction to Part III: What is (not) context? WHAT IS CONTEXT? WHY IS CONTEXT IMPORTANT? HOW TO CREATE ''CONTEXT AWARENESS''? STRUCTURE OF PART ADAPTABILITY The introduction outlines the notion of context and explains why it is of crucial importance in Ubiquitous Computing systems. Different types of context are listed as well as issues that have to be dealt with while modeling and using it. Several research projects focusing on context in ubiquitous computing are presented and the structure of part III is then described. Chapter 11: Context Models and Context Awareness WHAT IS CONTEXT? WHAT ARE CONTEXT-AWARE APPLICATIONS? HOW TO BUILD A CONTEXT-AWARE APPLICATION? MIDDLEWARE ARCHITECTURES DEALING WITH UNCERTAINTY This chapter gives an overview of how knowledge of the current context, i.e. information characterizing the situation, can be represented and how this knowledge can be used for enhancing applications. The definitions of context and context-aware applications are given. The authors present guidelines on how to build a context-aware application and some challenges in using context information are discussed. Chapter 12: A Focus on Location Context POSITIONING PRINCIPLES SIGNAL PROPAGATION SELECTED POSITIONING SYSTEMS LOCATION MODELS With respect to the important Ubiquitous Computing issue context awareness, location is presently considered the most important and best supported context. Accordingly, the chapter starts with an overview of relevant location determination technologies. A thorough treatment of the physical and mathematical foundations of location determination follows. Both indoor and outdoor position are treated in detail. The chapter also provides insight into a broad range of available positioning systems. Chapter 13: Adapting to the User ADAPTING TO THE USER MODELING THE USER INFERENCE TECHNIQUES FOR PERSONALIZATION CENTRALIZED, DISTRIBUTED AND ISOLATED PERSONALIZATION SERVICES Adaptation is needed to handle the increasing complexity in today s computing environments. The chapter focuses on the aspect of adaptation that puts the user into focus. It thus provides an important complement to the adaptation via context-awareness that is emphasized in the Ubiquitous Computing community and in the two preceding chapters. It introduces different adaptation types possible in Ubiquitous Computing, like interaction, content, and presentation. Basic requirements for appropriately modelling the users and approaches to personalize applications are presented.

Part IV: Liability Introduction to Part IV: From IT Security to Liability GENERAL TO SECURITY AND LIABILITY LIABILITY IN UBIQUITOUS COMPUTING OVERVIEW OF FURTHER CHAPTERS REFERENCES A general introduction to liability and security in Ubiquitous Computing is given along with the respective definitions. Then, an overview of chapters in part IV is provided and some background readings on the topic are recommended. Chapter 14: Accounting and Billing, Guarantees and Contracts TERMINOLOGY TECHNOLOGIES AND SERVICES CHARGING APPROACHES For IP-based communications, charging is used as a comprehensive term for metering or monitoring, accounting, pricing, charge calculation, and billing. These five actions are detailed in the chapter to provide a clear view on their interdependencies as well as their relations to distributed computing. The legal and contractual relationships between customers and providers as well as technological choices of protocols, mechanisms, and parameters define the area of interest here. With their background purpose of assuring and verifying exactly the flow of service provision and service remuneration intended, the concepts described represent an important ingredient of future liability concepts for Ubiquitous Computing Chapter 15: Security for Ubiquitous Computing FOUR UC SETTINGS A TAXONOMY OF UC SECURITY OVERVIEW OF CRYPTOGRAPHIC TOOLS SAMPLE SOLUTIONS RESEARCH OUTLOOK The chapter motivates the need for a dedicated treatment of security in the context of Ubiquitous Computing. It systematically discusses the particular security challenges and predominant security risks in the Ubiquitous Computing context. The major part of the chapter is dedicated to the description of sample solutions in order to illustrate the wealth of protection mechanisms required and increasingly available. An overview of cryptographic tools is given. Chapter 16: Trust and Accountability TRUST ACCOUNTABILITY RESEARCH OUTLOOK The chapter focuses on the concepts of trust and accountability. The author first introduces the semantics of both concepts and then explains why trust is relevant for Ubiquitous Computing and what the main issues for dealing with trust in computer science are. Then, the chapter discusses how accountability can be achieved in distributed systems using reputation and micropayment mechanisms.

Part V: Ease-of-Use Introduction to Part V: Natural and Multimodal Interaction NATURAL AND MULTIMODAL INTERACTION WHAT IS MULTIMODAL INTERACTION? WHY IS MULTIMODAL INTERACTION IMPORTANT? HOW TO CREATE ''MULTIMODAL APPLICATIONS''? BEST PRACTICES TO CREATE NATURAL INTERFACES RESEARCH AND DEVELOPMENT PROJECTS STRUCTURE OF PART ''NATURAL AND MULTIMODAL INTERACTION'' SUGGESTED FURTHER READINGS The chapter discusses multimodality as an important property of ubiquitous computing systems which supports user interactions with the system involving multiple ways of interacting. It explains what the major components of a multimodal system are and presents some best practices on how to build multimodal applications. Some research projects dealing with multimodality are discussed and the structure of book part V is outlined. Chapter 17: Mobile Speech Recognition OVERVIEW SPEECH RECOGNITION ON EMBEDDED DEVICES SERVICE DEPENDENT SPEECH RECOGNITION DEVICE INHERENT SPEECH RECOGNITION This chapter is considered as a prerequisite for deeper understanding of the subsequent chapter. It gives an overview of the main architectures to enable speech recognition on embedded devices, including their characteristic features and properties. A description of the main challenges for the use of speech recognition on embedded devices and thus, in the Ubiquitous Computing context is given. The author provides a solid base for the selection of the most appropriate architecture for the business case of Real Time Enterprises. Chapter 18: Mouth and Ear Interaction MOTIVATION DIALOG STRATEGIES DOMAIN SPECIFIC DEVELOPMENT MOUTH AND EAR INTERACTION IN SMART ENVIRONMENTS FURTHER EXAMPLES CHALLENGES WITH AUDIO WAYS TO MASTER THESE CHALLENGES Ubiquitous Computing involves users on the move, suggesting hands-and-eyes-free operation, for which speech is an obvious choice. The chapter gives an overview of the challenges that have to be mastered in Ubiquitous Computing while working with audio, which is not easy to handle as a medium. To make things worse, mouth and ear interaction is often performed without focusing attention on the device. The author explains why audio based interfaces are challenging to handle and provides some pointers to the solutions. He shows how to master the challenges and to improve the quality of applications involving mouth and ear interaction. Chapter 19: Advanced Hands and Eyes Interaction AND BASIC PRINCIPLES MULTISCALE OUTPUT LARGE DISPLAYS AND SMALL DISPLAYS INPUT DEVICES AND CHARACTERISTICS INTEGRATION OF PHYSICAL AND VIRTUAL WORLD ATTENTION AFFECTION

While mouth-and-ears interaction is becoming more important for Ubiquitous Computing, hands-and-eyes interaction, especially in novel forms, remains essential. The chapter gives an overview of the broad range of pertinent interaction techniques. The chapter gives a short introduction to the fundamentals of human computer interaction and the traditional user interfaces. It then surveys multi-scale output devices, gives a general idea of hands and eyes input, specializes them by merging the virtual and real world, and introduces attention and affection for enhancing the interaction with computers and especially with disappearing computers. Chapter 20: Intelligent User Interfaces BUILDING GOOD USER INTERFACES EVALUATIONS, ALTERNATIVES AND PROTOTYPES SPECIFIC CHALLENGES OF USER-INTERFACES FOR UBIQUITOUS COMPUTING INTELLIGENT AND DUMB INTERFACES FOR UBIQUITOUS COMPUTING HOW MUCH INTELLIGENCE? CONCLUSIONS The chapter introduces a set of general approaches for designing user interfaces with a special focus on the specific needs for Ubiquitous Computing scenarios. The author learns from good interface design for other classical devices and applies many of those user interface design principles to Ubiquitous Computing as well. A central aspect is the design process that helps to find the right sequence of steps in building a good user interface. Chapter 21: Multimodal and Federated Interaction THE BASICS OF MULTIMODALITY MULTIMODALITY ON THE DESKTOP MULTIMODALITY FOR MOBILE DEVICES DEVICE FEDERATION SOCIAL IMPACT OF VOICE TECHNOLOGIES The authors first introduce some of the various modalities available for human computer interaction. Then, they discuss how multimodality can be used both in desktop and mobile computing environments. The goal of the chapter is to familiarize scholars and researchers with the range of topics covered under the heading multimodality and suggest new areas of research around the combination of modalities, as well as the combination of mobile and stationary computing devices to improve usability. Chapter 22: Multimodal Software Engineering WEB-CENTRIC APPROACHES ABSTRACT USER INTERFACES MODEL BASED USER INTERFACES Ubiquitous Computing makes it necessary to supplant the desktop metaphor of graphical user interfaces by other kinds of user interfaces for a multitude of devices and interaction modalities. The chapter presents three different software engineering approaches that address this challenge: extensions to Web based approaches, abstract user interface definitions that add a level of abstraction to the user interface definition, and model based approaches that extend model based application development to integrate user interface issues as well. Chapter 23: Ambient Learning UBIQUITOUS COMPUTING AND LEARNING LEARNING THEORIES SUPPORTING AMBIENT LEARNING IT STARTS WITH THE PRIMITIVES ENABLING AMBIENT INTELLIGENCE AND LEARNING SMART PRODUCTS THE DEVICE LAYER BUILDING AMBIENT INTELLIGENCE

Ambient Learning is a new area in Ubiquitous Computing, dealing with the different learning processes that occur between people and smart technology environments. The chapter provides a definition of what ambient learning is and discusses its relevance to Ubiquitous Computing. It presents the learning concepts behind ambient learning and a detailed example of training a user. The technological building blocks behind the smart products supporting their ability to learn from each other and assemble or compose their functionality are examined in detail. Part VI: Pilots and Trends at SAP-Research Chapter 24: CoBIs: Collaborative Business Items BACKGROUND APPLICATION SCENARIO ARCHITECTURE/DESIGN IMPLEMENTATION EVALUATION CONCLUSION The chapter describes an example of Ubiquitous Computing technology in a corporate environment. The goal of the pilot was reduction of the risk in handling hazardous substances by detecting potentially dangerous storage situations and raising alarms if certain rules are violated. The lesson learnt: if employed in a shop floor, warehouse, or retail environment, UC technology can improve real-world business processes, making them safer and more efficient. Chapter 25: PROMISE: Product Lifecycle Management and Information Tracking using Smart Embedded Systems PROJECT GOALS INNOVATIONS IN PLM BUSINESS PROCESSES TECHNICAL SOLUTION OVERVIEW IMPLEMENTATION BENEFITS AND LIMITATIONS The goals and application scenarios of the PROMISE project are presented. The PROMISE project aims to close the information loop in Product Lifecycle Management by employing product embedded information devices (PEIDs) in products. Special attention is given to the middleware design and implementation well as the role of Universal Plug and Play (UPnP) as device-level protocol. Chapter 26: Real-time Location Tracking Mashup for the Enterprise AUTOMATIC VEHICLE LOCATION (AVL) NEW TECHNOLOGIES SYSTEM ARCHITECTURE APPLICATION FLOW APPLICATION FEATURES AND SCREENSHOTS LESSONS LEARNED CONCLUSION The chapter describes a new Automatic Vehicle Location (AVL) system designed to take advantage of technologies that are currently gaining popularity in the enterprise, namely, online maps, real-time GPS location tracking, and service-oriented architectures. The system uses a service-oriented architecture and Ajax-style user interface technology. The authors show that for Ajax technology to be widely adopted in the applications involving real-time data updates, a server-side push mechanism is needed. Chapter 27: Towards Adaptive Security for UC Systems: MOSQUITO and Serenity MOBILE WORKERS SECURE BUSINESS APPLICATIONS IN UBIQUITOUS ENVIRONMENTS THE MOSQUITO PROJECT BACKGROUND MOSQUITO ARCHITECTURE MOSQUITO SCENARIO

PERVASIVE WORKFLOW EVALUATION SYSTEMS ENGINEERING FOR SECURITY AND DEPENDABILITY THE SERENITY PROJECT BACKGROUND THE SERENITY APPROACH PATTERNS AND INTEGRATION SCHEMES EVALUATION CONCLUSIONS The authors introduce two example projects that contribute to meeting the challenges in adaptive security. The first project focuses on an architecture that allows for adaptive security in mobile environments based on security services whose adaptation is guided by context information derived from sensor networks. The second project addresses engineering aspects of secure Ubiquitous Computing systems through making security solutions accessible and deployable on demand and following emerging application-level requirements. Chapter 28: Multimodal Warehouse Project THE PICKING PROCESS PROBLEM DESCRIPTION THE MULTIMODAL WAREHOUSE APPLICATION THE WAREHOUSE PILOT PROJECT CONCLUSION The Multimodal Warehouse Project is presented which aims at applying multimodal interaction to a warehouse picking process. The authors provide an overview of the warehouse picking procedure as well as the overall architecture of the multimodal picking application and technologies applied to design the application. Then, they describe the execution of user tests of the picking application at a warehouse and present the results of these tests. Chapter 29: Business Grids Grid Computing for Business Applications BUSINESS GRIDS: MOTIVATION AND OBJECTIVES A VISION FOR BUSINESS GRIDS STATE OF THE ART The second short contribution about emerging trends proposes business grids as a means to provide enterprise computing infrastructures "as a utility" so that software and hardware resources (such as applications, components, systems, and servers) can be easily operated under frequently changing business conditions (such as changing strategies, models, processes, workload etc.). The chapter details the vision of Business Grids from various solution perspectives, describes the state of the art in Grid Computing and compares Business Grids and escience Grids.