Abstract
Social Proximity Applications (SPAs) are a promising new area for ubicomp software that exploits the everyday changes in the proximity of mobile users. While a number of applications facilitate simple file sharing between co–present users, this paper explores opportunities for recommending and sharing software between users. We describe an architecture that allows the recommendation of new system components from systems with similar histories of use. Software components and usage histories are exchanged between mobile users who are in proximity with each other. We apply this architecture in a mobile strategy game in which players adapt and upgrade their game using components from other players, progressing through the game through sharing tools and history. More broadly, we discuss the general application of this technique as well as the security and privacy challenges to such an approach.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ackerman, M.S., Malone, T.W.: Answer Garden: A Tool for Growing Organisational Memory. In: Proc. ACM Conf. on Office Information Systems, pp. 31–33 (1990)
Ametller, J., Robles, S., Ortega-Ruiz, J.A.: Self-Protected Mobile Agents. In: Proc. Joint Conference on Autonomous Agents and Multiagent Systems, vol. 1 (2004)
Barkhuus, L., Chalmers, M., Tennent, P., Hall, M., Bell, M., Sherwood, S., Brown, B.: Picking pockets on the lawn: The development of tactics and strategies in a mobile game. In: Beigl, M., Intille, S.S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol. 3660, pp. 358–374. Springer, Heidelberg (2005)
Birsan, D.: On Plug-ins and Extensible Architectures. ACM Queue 3(2) (March 2005)
Chalmers, M., et al.: The Order of Things: Activity-Centred Information Access. In: Proc. WWW 1998, pp. 359–367 (1998)
Chen, F., Yeager, W.: Poblano: A Distributed Trust Model for Peer-to-Peer Networks. JXTA Security White Paper (2001)
Crow, D., Smith, B.: The role of built-in knowledge in adaptive interface systems. In: Proc. ACM IUI, pp. 97–104 (1993)
Cypher, A.: EAGER: programming repetitive tasks by example. In: ACM CHI 1991, pp. 33–39 (1991)
Demers, A., et al.: Epidemic algorithms for replicated database maintenance. In: Proc. 6th ACM Symposium on Principles of Distributed Computing (PODC), pp. 1–12 (1987)
Edjlali, G., Acharya, A., Chaudhary, V.: History-based Access Control for Mobile Code. In: Proc. ACM Computer and Communications Security, pp. 38–48 (1998)
Edwards, W.K., Grinter, R.: At home with ubiquitous computing: Seven challenges. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 256–272. Springer, Heidelberg (2001)
Findlater, L., McGrenere, J.: A comparison of static, adaptive and adaptable menus. In: Proc. ACM CHI 2004, pp. 89–96 (2004)
Goldenberg, J., Shavitt, Y., Shir, E., Solomon, S.: Distributive immunization of networks against viruses using the ‘honey-pot’ architecture. Nature Physics 1(3), 184–188 (2005)
Humble, J., Crabtree, A., Hemmings, T., Åkesson, K.-P., Koleva, B., Rodden, T., Hansson, P.: “Playing with the bits” user-configuration of ubiquitous domestic environments. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 256–263. Springer, Heidelberg (2003)
Khelil, A., Becker, C., et al.: An Epidemic Model for Information Diffusion in MANETs. In: Proc. ACM MSWiM (2002)
Mackay, W.: Patterns of Sharing Customizable Software. In: Proc. ACM CSCW 1990, pp. 209–221 (1990)
Mackay, W.: Triggers and barriers to customizing software. In: Proc. ACM CHI 1991, pp. 153–160 (1991)
MacLean, A., et al.: User-Tailorable Systems: Pressing the Issues with Buttons. In: Proc. ACM CHI 1990, pp. 175–182 (1990)
Nardi, B.A., Miller, J.: Twinkling Lights and Nested Loops: Distributed Problem Solving and Spreadsheet Development. In: CSCW and Groupware, pp. 29–52. Academic Press, London (1991)
Newman, M., et al.: Designing for Serendipity: Supporting End-User Configurations of Ubiquitous Computing Environments. In: Proc. ACM DIS 2002, pp. 147–156 (2002)
Page, J., Zaslavsky, A., Indrawan, M.: A buddy model of security for mobile agent communities operating in pervasive scenarios. In: Proc. Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation. CRPIT, vol. 32 (2004)
Persson, P., Blom, J., Jung, Y.: DigiDress: A Field Trial of an Expressive Social Proximity Application. In: Beigl, M., Intille, S.S., Rekimoto, J., Tokuda, H. (eds.) UbiComp 2005. LNCS, vol. 3660, pp. 195–212. Springer, Heidelberg (2005)
Pfitzmann, A., Pfitzmann, B., Waidner, M.: Trusting Mobile User Devices and Security Modules. Computer 30(2), 61–68 (1997)
Ravi, S., et al.: Security as a new dimension in embedded system design. In: Proc. Design Automation (June 2004)
Rodden, T., Benford, S.: The evolution of buildings and implications for the design of ubiquitous domestic environments. In: Proc. ACM CHI 2003, pp. 9–16 (2003)
Saeb, M., Hamza, M., Soliman, A.: Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree. In: Proc. sOc 2003 (2003)
Weld, D., et al.: Automatically personalizing user interfaces. In: Proc. IJCAI 2003, pp. 1613–1619. Morgan Kaufmann, San Francisco (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bell, M., Hall, M., Chalmers, M., Gray, P., Brown, B. (2006). Domino: Exploring Mobile Collaborative Software Adaptation. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds) Pervasive Computing. Pervasive 2006. Lecture Notes in Computer Science, vol 3968. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11748625_10
Download citation
DOI: https://doi.org/10.1007/11748625_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33894-9
Online ISBN: 978-3-540-33895-6
eBook Packages: Computer ScienceComputer Science (R0)