By Bernhard Rinner
Pervasive computing integrates computation into the environment, rather than having computers which are distinct objects. Computation is embedded into the environment and everyday objects and would enable people to interact with information-processing devices more naturally and casually than they currently do, and in ways that suit whatever location or context they find themselves in.
This lecture focuses on the fundamentals of pervasive computing and covers a variety of technological topics. The lecture is complemented by a dedicated lab courses where students can improve their practical skills.
- Introduction and motivation
- Trends and enabling technologies
- Wireless personal networking
- Sensor network
- Wearable computing
- Middleware systems
- Non-technical aspects
The course takes place in the winter term and has two teaching units per week. Please check the AAU Campus site for details on schedule and lecture rooms.
Prerequisites and Related Courses
This course is intended for master students in ECE or CS and PhD students in engineering who have a master from a different field. The course aims to cover the key technological topics in the field of pervasive computing, and is therefore intentionally designed as an “overview course”. Participants should have passed (bachelor) courses on computer organization, computer networks and programming. This course is included in the catalogues “Networks and Communications: Advanced” and “ICE: Supplements”.
Related (master) courses include sensor networks (Rinner), mobile communications (Bettstetter), wireless networks (Bettstetter), digital signal processors (Rinner) and simulation of networked systems (Elmenreich).
The course material is available via the links below. Most of the documents are password protected. The password will be provided for enrolled students at the beginning of the course.
Grading of this course is composed by two components:
- Presentation of an assigned topic.
Topics and presentation schedule will be arranged within the first few weeks of the course
- Written exam (75 minutes) at the end of the semester.
No documents are allowed. The written exam can only be taken, if the student has successfully presented the assigned topic in that semester.
Sample exam (PDF)
The overall grade is composed by the written exam (75%) and the student presentation (25%).
The assigned topics can be found here.
Student presentations will take place on December 14, 2017, January 18 and January 25, 2018.
- IEEE Pervasive Computing (Magazine)
- Personal and Ubiquitous Computing (Journal)
- Stefan Poslad. Ubiquitous Computing. Wiley 2009
- Hansmann, Merk, Nicklous, Stober. Pervasive Computing. Springer 2003
- Adelstein, Gupta, Richard, Schwiebert. Fundamentals of Mobile and Pervasive Computing. McGraw-Hill. 2005
1. Introduction and Motivation
The vision of Pervasive Computing; A new era of computing
- Chapter 1: slides (PDF)
- Mark Weiser. The Computer for the 21st Century. Scientific American. 1991
- Davis, Gellersen. Beyond Prototypes: Challenges in Deploying Ubiquitous Systems. IEEE Pervasive Computing 1(1), 2002
2. Trends and Enabling Technologies
Selected Trends in Computing and Communications; Enabling Technologies for Pervasive Computing; Related Fields
3. Wireless Personal Networking
Overview and Classification; Wireless Personal Area Networks; Wireless Local Area Networks
- Chapter 3: slides (PDF)
- Chapter 3: self evaluation (PDF)
- Infrared Data Association (IrDA)
- IEEE 802.11 Working Group
- IEEE 802.15 Working Group
Fundamentals and Terminology; Satellite-based Positioning; Localization in WLANs; Methods for Improvement
- Chapter 4: slides (PDF)
- Chapter 4: self evaluation (PDF)
- Hofmann-Wellenhof, Lichtenegger, Wasle. Global Navigation Satellite Systems. Springer 2008
- Gu et al. A survey for Indoor Positioning Systems for Wireless Personal Networks. IEEE Comm. Surv. 11(1) 2009
- Fox et al. Bayesian Filtering for Location Estimation. IEEE Pervasive Computing 2(3). 2003
Fundamentals; Biometrics; Radio Frequency Identification
- Chapter 5: slides (PDF)
- Chapter 5: self evaluation (PDF)
- Jain et al. An Introduction to Biometric Recognition. IEEE Trans. on Circuits and Systems for Video Technology. 14(1),2004
- Facwett. An Introduction to ROC Analysis. Pattern Recognition Letters, 2006
- Want. An Introduction to RFID Technology. IEEE Pervasive Computing. 5(1), 2006
Fundamentals; Context-aware Computing and Applications; Sensors; Sensor data analysis
- Chapter 6: slides (PDF)
- Chapter 6: self evaluation (PDF)
- Schilit et al. Context-Aware Computing Applications. IEEE Proc. W. Mobile Computing Syst. 2005
- Erickson. Some Problems with the Notion of Context-Aware Computing. Comm ACM. Feb 2002
- Baldauf et al. A Survey on Context-Aware Systems. J AdHoc and Ubi. Systems. 2007
7. Sensor Networks
Motivation Basic; Services Sensor; Network Platforms
- Chapter 7: slides (PDF)
- Chapter 7: self evaluation (PDF)
- Akyildiz et al. A survey of wireless multimedia sensor networks. Computer Networks, 2006
8. Wearable Computing
Introduction; Wearable Computers; Interaction; Human-powered Wearable Computing
- Chapter 8: slides (PDF)
- Chapter 8: self evaluation (PDF)
- Gemperle et al. Design for Wearability. ISWC 1998
- T. Starner. Human Powered Wearable Computing. IBM Systems Journal, 1996
- Gandi et al. Universal Design: Lessons for Wearable Computing. Pervasive 2003
- Cakmakci, Rolland. Head-worn displays: a review. IEEE Journal on Display Technology 2(3), p199-216, 2006.
Multi-agent Systems; Decision Making
- Chapter 9: slides (PDF)
- Chapter 9: self evaluation (PDF)
- Wooldridge. An Introduction to Multi Agent Systems. JohnWiley. 2009
- Conitzer. Making decisions based on the preferences of multiple agents. Communications of the ACM. 2010
10. Middleware Systems
Introductions; Service-oriented Architectures; Middleware for Pervasive Computing Applications
- Chapter 10: slides (PDF)
- Miran et al. A Survey of Service Discovery Protocols in Multihop Mobile Ad Hoc Networks. IEEE Pervasive Computing 8(1) 2009
11. Presence and Future (non-technical issues)
The current State; Example Applications and Case Studies; Discussion