Satya Revisits "Pervasive Computing: Vision and Challenges"

被引:5
|
作者
Ebling, Maria R. [1 ]
Want, Roy [2 ]
机构
[1] IBM TJ Watson Res Ctr, Yorktown Hts, NY 10598 USA
[2] Google, Mountain View, CA USA
关键词
big data; history of computing; Internet of Things; pervasive computing; privacy; security; user distraction;
D O I
10.1109/MPRV.2017.2940965
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this interview, Mahadev Satyanarayanan (Satya) looks back 15+ years to consider what motivated him to write his seminal 2001 paper, 'Pervasive Computing: Vision and Challenges.' He considers where we are in terms of battery life, cyber foraging, and smart spaces; explains how the Internet of Things relates to pervasive computing; and addresses issues of user intent, user distraction, and privacy, discussing why, in some ways, we're in worse shape now than we were back in 2001. © 2002-2012 IEEE.
引用
收藏
页码:20 / 23
页数:4
相关论文
共 50 条
  • [31] Research of Pervasive Computing
    Li Gang
    Chen Anfang
    Yan Junhao
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 183 - 185
  • [32] A Pervasive Computing Model of Internet of Things based on Computing Area Network
    Guo, Benjun
    Gan, Jianhong
    Su, Jingwen
    Hu, Yuewen
    Lu, Jun
    JOURNAL OF COMPUTERS, 2012, 7 (07) : 1647 - 1654
  • [33] Practical deniable authentication for pervasive computing environments
    Fagen Li
    Jiaojiao Hong
    Anyembe Andrew Omala
    Wireless Networks, 2018, 24 : 139 - 149
  • [34] Practical deniable authentication for pervasive computing environments
    Li, Fagen
    Hong, Jiaojiao
    Omala, Anyembe Andrew
    WIRELESS NETWORKS, 2018, 24 (01) : 139 - 149
  • [35] Understanding identity exposure in pervasive computing environments
    Zhu, Feng
    Carpenter, Sandra
    Kulkarni, Ajinkya
    PERVASIVE AND MOBILE COMPUTING, 2012, 8 (05) : 777 - 794
  • [36] Probabilistic Data Allocation in Pervasive Computing Applications
    Kolomvatsos, Kostas
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 1006 - 1013
  • [37] Adopting Pervasive Computing for Routine Use in Healthcare
    Orwat, Carsten
    Rashid, Asarnusch
    Holtmann, Carsten
    Woelk, Michaela
    Scheermesser, Mandy
    Kosow, Hannah
    Graefe, Andreas
    IEEE PERVASIVE COMPUTING, 2010, 9 (02) : 64 - 71
  • [38] Anonymous routing protocol in pervasive computing environment
    Wang, Yinglong
    Wang, Jizhi
    Wang, Meiqin
    2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 421 - 424
  • [39] Private and Secure Service Discovery via Progressive Approach in Pervasive Computing Environments
    Durga, S.
    Salaja, S.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 71 - 77
  • [40] A lightweight cyber security framework with context-awareness for pervasive computing environments
    Al-Muhtadi, Jalal
    Saleem, Kashif
    Al-Rabiaah, Sumayah
    Imran, Muhammad
    Gawanmeh, Amjad
    Rodrigues, Joel J. P. C.
    SUSTAINABLE CITIES AND SOCIETY, 2021, 66