This Article 
 Bibliographic References 
 Add to: 
Ubicomp Systems at 20: Progress, Opportunities, and Challenges
January-March 2012 (vol. 11 no. 1)
pp. 14-21
Ramon Caceres, AT&T Labs
Adrian Friday, Lancaster University

This retrospective on 20 years of ubiquitous computing research identifies opportunities for leveraging utility computing and the Internet of Things to grow the ubicomp infrastructure, and discusses remaining challenges to taking ubicomp systems to where they indeed become ubiquitous.

1. M. Weiser, "The Computer for the 21st Century," Scientific Am., vol. 265, no. 3, 1991, pp. 66–75.
2. K. Ducatel et al., Scenarios for Ambient Intelligence in 2010, tech. report, Comisión Europea (office for official publications of the European Communities), 2001;
3. Y. Rogers, "Moving on from Weiser's Vision of Calm Computing: Engaging Ubicomp Experiences," UbiComp 2006: Ubiquitous Computing, vol. 4206, Springer, 2006, pp. 404–421.
4. W. Gaver, "The Video Window: My Life with a Ludic System," Personal and Ubiquitous Computing, vol. 10, nos. 2–3, 2006, pp. 60–65.
5. G. Bell and P. Dourish, "Yesterday's Tomorrows: Notes on Ubiquitous Computing's Dominant Vision," Personal and Ubiquitous Computing, vol. 11, no. 2, 2007, pp. 133–143.
6. D. Salber, A. Dey, and G. Abowd, "The Context Toolkit: Aiding the Development of Context-Enabled Applications," Proc. SIGCHI Conf. Human Factors in Computing Systems: The CHI Is the Limit, ACM Press, 1999, pp. 434–441.
7. M. Assad et al., "Personisad: Distributed, Active, Scrutable Model Framework for Context-Aware Services," Proc. Pervasive Computing, 5th Int'l Conf. (Pervasive 07), LNCS 4480, A. LaMarca, M. Langheinrich, and K.N. Truong eds., Springer, 2007, pp. 55–72.
8. S. Dobson, and P. Nixon, "More Principled Design of Pervasive Computing Systems," Engineering Human-Computer Interaction and Interactive Systems, LNCS 3425, R. Bastide, P. Palanque, and J. Roth eds., Springer, 2005, pp. 103–111.
9. T. Kindberg, and A. Fox, "System Software for Ubiquitous Computing," IEEE Pervasive Computing, vol. 1, no. 1, 2002, pp. 70–81.
10. M. Langheinrich, "Privacy by Design—Principles of Privacy-Aware Ubiquitous Systems," Ubicomp, LNCS 2201, G.D. Abowd, B. Brumitt, and S.A. Shafer eds., Springer, 2001, pp. 273–291.
11. Y. Duan, and J. Canny, "Protecting User Data in Ubiquitous Computing Environments: Towards Trustworthy Environments," LNCS 3424, Springer, 2005, pp. 167–185.
12. J. Krumm, "Inference Attacks on Location Tracks," Proc. Fifth Int'l Conf. Pervasive Computing (Pervasive 07), LNCS 4480, A. LaMarca, M. Langheinrich, and K.N. Truong eds., Springer, 2007, pp. 127–143.
13. R. Mayrhofer, and H. Gellersen, "Shake Well Before Use: Intuitive and Secure Pairing of Mobile Devices," IEEE Trans. Mobile Computing, vol. 8, no. 6, 2009, pp. 792–806.
14. R. Harle and A. Hopper, "Building World Models by Ray-Tracing Within Ceiling-Mounted Positioning Systems," Proc. 5th Int'l Conf. Ubiquitous Computing (UbiComp 03), Springer, 2003, pp. 1–17.
15. J. Park et al., "Growing an Organic Indoor Location System," Proc. 8th Int'l Conf. Mobile Systems, Applications, and Services, ACM Press, 2010, pp. 271–284.
16. E. Welbourne et al., "Longitudinal Study of a Building-Scale FRID Ecosystem," Proc. 7th Int'l Conf. Mobile Systems, Applications, and Services (MobiSys 09), ACM Press, 2009, pp. 69–82.
17. M. Lamming and D. Bohm, "Specs: Another Approach to Human Context and Activity Sensing Research, Using Tiny Peer-to-Peer Wireless Computers," UbiComp 2003: Ubiquitous Computing, LNCS 2864, A. Dey, A. Schmidt, and J. McCarthy eds., Springer, 2003, pp. 192–199.
18. J.A. Kientz et al., , "Pervasive Computing and Autism: Assisting Caregivers of Children with Special Needs," IEEE Pervasive Computing, vol. 6, no. 1, 2007, pp. 28–35.
19. D.J. Patterson et al., "Opportunity Knocks: A System to Provide Cognitive Assistance with Transportation Services," UbiComp 2004: Ubiquitous Computing, LNCS 3205, Springer, 2004, pp. 433–50.
20. N.D. Lane et al., "Hapori: Context-Based Local Search for Mobile Phones Using Community Behavioral Modeling and Similarity," Proc. 12th Int'l Conf. Ubiquitous Computing (UbiComp 2010), ACM Press, 2010, pp. 109–118.
21. A.J.B. Brush, J. Krumm, and J. Scott, "Exploring End User Preferences for Location Obfuscation, Location-Based Services, and the Value of Location," Proc. 12th Int'l Conf. Ubiquitous Computing (UbiComp 2010), ACM Press, 2010, pp. 95–104.
22. E. Miluzzo et al., "Cenceme—Injecting Sensing Presence into Social Networking Applications," Smart Sensing and Context, vol. 4793, no. 5, 2007, pp. 1–28.
23. J. Barton and J. Pierce, "Quantifying Magic in Ubicomp Systems Scenarios," position paper, UbiSys Workshop at Ubicomp 2006, 2006; http://tinyurl.commagicinubi.
24. G. Schiele, M. Handte, and C. Becker, "Pervasive Computing Middleware," Handbook of Ambient Intelligence and Smart Environments, Springer, 2010, pp. 201–227.
25. G. Coulouris et al., Distributed Systems: Concepts and Design, 5th ed., Addison Wesley, 2011.
26. D.B. Terry et al., "Managing Update Conflicts in Bayou, A Weakly Connected Replicated Storage System," Proc. 15th ACM Symp. Operating Systems Principles (SOSP 95), ACM Press, 1995, pp. 172–182.
27. W.K. Edwards et al., "Challenge: Recombinant Computing and the Speakeasy Approach," Proc. 8th Ann. Int'l Conf. Mobile Computing and Networking (MobiCom 02), ACM Press, 2002, pp. 279–286.
28. H. Tokuda et al., "Sf2: Smart Furniture for Creating Ubiquitous Applications," Proc. Int'l Symp. Applications and the Internet Workshops (SAINT 04), IEEE Press, 2004, pp. 423–429.
29. K.N. Truong, E.M. Huang, and G.D. Abowd, "Camp: A Magnetic Poetry Interface for End-User Programming of Capture Applications for the Home," Ubicomp, LNCS 3205, N. Davies, E.D. Mynatt, and I. Siio eds., Springer, 2004, pp. 143–160.
30. S.N. Patel et al., , "At the Flick of a Switch: Detecting and Classifying Unique Electrical Events on the Residential Power Line," Proc. 9th Int'l Conf. Ubiquitous Computing (UbiComp 07), Springer, 2007, pp. 271–288.
31. J. Krumm, G. Cermak, and E. Horvitz, "Rightspot: A Novel Sense of Location for a Smart Personal Object," Ubicomp, LNCS 2864, A.K. Dey, A. Schmidt, and J.F. McCarthy eds., Springer, 2003, pp. 36–43.
32. M. Chalmers et al., "Gaming on the Edge: Using Seams in Ubicomp Games," Proc. 2005 ACM SIGCHI Int'l Conf. Advances in Computer Entertainment Technology, ACM Press, 2005, pp. 306–309.
33. E. Costanza et al., "Ubicomp to the Masses: A Large-Scale Study of Two Tangible Interfaces for Download," Proc. 12th Int'l Conf. Ubiquitous Computing (UbiComp 2010), ACM Press, 2010, pp. 173–182.
34. F. Corbató, and V.A. Vyssotsky, "Introduction and Overview of the Multics System," Proc. Fall Joint Computer Conf., ACM Press, 1965, pp. 185–196.
35. R. Cáceres et al., "Virtual Individual Servers as Privacy-Preserving Proxies for Mobile Devices," Proc. MobiHeld, ACM Press, 2009, pp. 37–42.
36. J. Sully, "TSB's Internet of Things Convergence £4m Funding Call Announced," Connect,26 July 2011; articles/-/blogs4771613.

Index Terms:
Emerging technologies, Mobile Computing, Ubiquitous computing
Ramon Caceres, Adrian Friday, "Ubicomp Systems at 20: Progress, Opportunities, and Challenges," IEEE Pervasive Computing, vol. 11, no. 1, pp. 14-21, Jan.-March 2012, doi:10.1109/MPRV.2011.85
Usage of this product signifies your acceptance of the Terms of Use.