5th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services

Research Article

A Quantitative Approach to Non-Intrusive Computing

Download508 downloads
  • @INPROCEEDINGS{10.4108/ICST.MOBIQUITOUS2008.3473,
        author={Hao Chen and James P. Black},
        title={A Quantitative Approach to Non-Intrusive Computing},
        proceedings={5th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services},
        publisher={ICST},
        proceedings_a={MOBIQUITOUS},
        year={2010},
        month={5},
        keywords={ubiquitous computing pervasive computing non-intrusive computing context awareness},
        doi={10.4108/ICST.MOBIQUITOUS2008.3473}
    }
    
  • Hao Chen
    James P. Black
    Year: 2010
    A Quantitative Approach to Non-Intrusive Computing
    MOBIQUITOUS
    ICST
    DOI: 10.4108/ICST.MOBIQUITOUS2008.3473
Hao Chen1,*, James P. Black1,*
  • 1: University of Waterloo, 200 University Avenue West, Waterloo, ON, Canada N2L 3G1
*Contact email: h8chen@uwaterloo.ca, jpblack@uwaterloo.ca

Abstract

One important characteristic of pervasive computing, which is how to make it non-intrusive so that users can focus on their tasks, has received little formal attention. Nowadays, many computing entities including smart devices, and software applications, are involved in our daily lives, and users need to deal with them as well as with other people. Besides, people are easy to reach with multiple devices. We believe that there should be a systematic way to help users avoid intrusive interactions. Abstract--- This paper analyzes the intrusion problem for generic interactions and presents a model for posing and answering two questions: will an interaction intrude on its receiver if delivered, and given that the interaction is deliverable, how can it be delivered effectively and not too overtly? The essential factors in the model are quantified for comparison and computation. We also show how a non-intrusive-computing system can be implemented based on the model.