Abstract
The aim of current mobile computing systems is to hide the network as far as possible from applications. This paper introduces location aware computing which makes details of the networked computing environment explicitly available to applications. Objects which move, such as people as located and equipment, are electronically tagged. Depending upon where a person is located, and the capabilities of the machines around a person, applications will after their behaviour. This will automate tasks such as logging on and telephone re-routing. Applications will automatically modify themselves to make best use of a person's nearby environment. Audit trails may be created detailing the person's or object's movement allowing time and motion studies to be conducted and the analysis of product movement efficiency within a factory. It is argued that a location aware computing system must address the three main issues of information gathering, data structure and querying and access control. Ideas within these areas are introduced and explained and the concepts of co-location and spheres of influence suggested as paradigms of person-machine interaction.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.