Posted: December 12th, 2005 | No Comments »
Dans «Moi, Chinois de Boston vivant à Paris», Le Temps mentionne l’apparition d’une nouvelle catégorie de migrants: les transnationaux, qui passent régulièrement d’un horizon à l’autre sans choisir et sans en quitter vraiment aucun . De plus en plus d’hommes et de femmes réalisent des parcours constituant d’allers et retour et de multiples étapes. Portés par la démocratisation du transport aérien et le développement des télécommunications, et de la libre circulation ils passent d’un horizon à un autre sans plus en choisir et sans plus en quitter vraiment aucun.
Les transnationaux sont un signe de l’émmergence de la creative class [fr] (qui par choix ou contraite vivent dans 2 villes bien connectées en même temps (Barcelone-Genève, Zürich-Paris, Genève-Lyon, …).
Posted: December 11th, 2005 | No Comments »
In The Drop: Pragmatic Problems in the Design of a Compelling, Pervasive Game, Ian Smith, Sunny Consolvo, and Anthony LaMarca discuss the technical, social, and business challenges faced while creating and implementing a pervasive game. It has some similarities with my Building a mobile, locative, and collaborative application.
The Drop is a capture the flag type of game. The description of its scenario is not the most interesting part of this paper. The pragramtic issues are relevant for moving pervasive game away from labs and implement them in the real world.
- Player movement: prevent physical collisions between people
- Location systems: do calibration only in areas where the enhances accuracy is valuable
- Boundaries and maps: understand the game limites
- Organizational issues and business model: what space would allow such a game
Posted: December 11th, 2005 | No Comments »
In Collaboration in Context-Aware Mobile Phone Applications by Jonna Häkkilä and Jani Mäntyjärvi examine collaboration in relation to context-aware mobile terminals and discuss possibilities on enhancing the collaboration and improving usability of mobile applications if these two technologies are combined.
Dey and Abowd (Towards a Better Understanding of Context and Context-awareness) describe context-awareness to be
any information that can be used to characterize the situation of an entity. An entity is a person, place, or object that is considered relevant to the interaction between a user and an application including the user and applications themselves. Context-aware mobile devices have so far been investigated mainly from the technological point of view, examining context-recognition and sensor technologies. Location is probably the most commonly used context attribute.
Computer supported collaboration scenarios divide according to the simultaneousness, and location in time and space (Groupware: some issues and experiences). Mobility is divided into three different forms: locational, operational and interactional mobilities.
There is an interesting reference to conducting the collaborative task and the importance of the infrastructure:
While executing the collaboration task, the contextual questions related to infrastructure become important. Sufficient and stabile network connection is crucial especially in time consuimg tasks. Network coverage may have an effect on communication and delays may occur. A context-aware system can try to prevent unwanted situations by switching appropriate settings or warning the user of critical fluctuations.
Moreover:
When the collaborative task is in process, the infrastructure becomes to play a bigger role, and the system can help the user by being aware and able to respond to crucial changes in network connection, data traffic and prices.
Critical question with context-aware mobile collaborative systems include privacy issues and technological restrictions (small power consumption, network connections, small memory and reduced computation power. To avoid crucial mistakes in application design, the concerns and criticism as well as positive feedback from phone end-users need to be studies.
Posted: December 11th, 2005 | No Comments »
Quotes from Norbet Streitz and Paddy Nixon their editorial of the March 2005 special issue of the Communication of the ACM on the Disappearing Computer:
Since the infrastructure structure is meant to be invisible it will be necessary to develop an understanding of what failure means and how malfunctioning is communicated to the user.
and in a more general level:
The increasing ubiquity of computer and their diffusion into our environment requires reconsidering the complex interplay between technology and the human.
Posted: December 11th, 2005 | No Comments »
In How Do Users Think about Ubiquitous Computing, Kai N Truong, Elaiine M. Huang, Molly M. Stevens and Gregory D. Avowd investigate how people describe and conceptualize ubiquitous computing applications and technology. Current systems that allow end-users to create ubicomp applications generally embody a technology-centered perspective. There is a need to bridge the needs-technology gap in such systems.
By surveying 45 participants, the authors examine how users express their ideas about ubicomp applications, specifically for the purpose of capturing event and information in the home of the future. Ideas are grouped in three categories of applications:
- provide peace of mind: to help users feel secure by allowing them to monitor their home and children
- collect records of everyday tasks or objects: keep track of objects (such as car keys)
- preserve sentimental memories from experiences: the house should capture memories of people during special events instead of people having to manually capture them
Not surprisingly people tend to conceptualize ubicomp in terms of human needs, situations, and tasks rather than devices and interactions between devices. There was a general lack of reference to devices of any kind. Participants rarely mentioned cameras, microphones, digital displays, sensors, or any other type of device in their responses.
Posted: December 11th, 2005 | 3 Comments »
In Recording and Understanding Mobile People and Mobile Technology, Paul Tennent and Matthew Chalmers present the Replayer system to record and understand the activity of people moving and interacting with each other via mobile technologies. Their focus is the combination of observational techniques, usually based on video recording, and system-based techniques that log or instruments the technologies in use.
Their approach mixing qualitative and quantitave data is explained as:
One one side we have the more exploratory and qualitative assessment often favoured by ethnographers, and on the other hand is the more hypothesis-driven and quantitative approach often favored by technologists. Replayer does not subscribe completely to either of these views instead seeking to enhance each with aspects of the other.
One main challenge of such analysing tool is to synchronise hetegoreneous data comming from multiple distributed sources (clients, server, videos, audios, …). Logs may be inconsistent (i.e. when users are out of wireless network hotspots). One approach to this issue is keying:
Manually examining a single data set in great detail, for example a video recording of a system trial, and then using it as a “key” to select important or relevant periods of time in the experience to investigate with the help of relevant subsets of other data such as system logs
Posted: December 11th, 2005 | No Comments »
In Analyzing User Confusion in Context Aware Mobile Applications by K. Loer and M. D. Harrison analyse that would allow designer of context-aware interfaces to predict potential pitfalls before the design is fielded. Instead of building and explore experimental prototypes, their exploration highlights the possibility that early models of an interaction system might be used to predict problems with embedding in context before costly mistakes have been made. The goal is of course to make user interfaces more intuitive and prevent subtle and confusing mode changes in context-aware environment. It can also be used to find recovery strategies in a “fail-over” situation.
The benefits that context awareness brings can be obscured by difficulties. Techniques are required to help predict these difficulties at design time. The work underlying this paper uses formal modeling techniques and model checking. In this case study the environment is described simply in terms of physical positions in the environment and transitions between these positions (the context is oversimplisticly modeled).
In their scenario (operators in a power plant), context is used in identifying position of an operator, checking validity of a given action, inferring an operator’s intention, checking action against an operator’s schedule assessing and indicating urgency. Confusion can arise if there is more than one plant component in close proximity, if the operator forgets which component they have saved, if one operator forgets that another operator is nearby. These problems can be exaggerated by poor design. Context confusion can be avoided through design by changing the action structure (for example, using interlocks) so that these ambiguities are avoided or by clearly marking the difference to users.
One question require more exploration is “What are the key features of the design that are relevant to these context confusions?“
Posted: December 11th, 2005 | 1 Comment »
A current investigation topic already mentioned in Defining Uncertainties in Can You See Me Now? is to visualise the current state of GPS availability in real-time for scenario planning for certain types of mobile applications and as aid for analysis of location logs. Supporting Mobile Applications with Real-Time Visualisation of GPS Availability by Anthony Steed introduces a tool called satview which visualises the current likely availability of GPS coverage. The tool takes a 3D model of the local environment, and the satellites positions. In real-time, the tool shows where on the ground plane one would likely be able to get a position fix from three or more satellites.
GPS units usually report position estimates and the satellites in view (azimuth, elevation and signal strength) using the NMEA 0183 communications standard. Anthony uses a graphical shadow algorithm on a 3D model for any one satellite (acting as the light source).
The development of satview was motivated by two scenarios
- Predicting and showing current black spots to GPS users and therefor prevent frustration caused by inaccuracy or availability.
- Planning data collectiong sessions that need GPS. Satview is used to plan which regions are more favorable at what time to collect logs of pollution levels.
A reference I should get my eyes on is:
Galileo Performance: GPS Interoperability and Discriminators for Urban and Indoor Environments. GPS World June 2003
Posted: December 11th, 2005 | No Comments »
In Picking Pockets on the Lawn: The Development of Tactics and Strategies in a Mobile Game, Louise Barkhuus, Matthew Chalmers, Paul Tennent, Malcolm Hall, Market Bell, Scott Sherwood, and Barry Brown present Treasure, an outdoor mobile multiplayer game inspired by Weiser’s notion of seams, gaps and breaks in different media. A seam is a break, gap or “loss in translation” in a number of tools or media, designed for use together as a uniformly and unproblematically experienced whole. Well, constant network connectivity is often assumed, but it is yet not always the case when mobile systems really are mobile. In urban areas it is likely that there are variations, gaps and overlaps in networks’ coverage.
The study and design of games has added diversity to many areas of ubicomp research. Games are not only worthy of academic attention in themselves, they introduce challenges in terms of designing enjoyable (the technical novelty can wear off very quickly) experience. The authors aimed for the game to be engaging in order to better understand the relationship between game play and the system’s design. The research question would be:
Understand how people use and react to a design which makes an element of ubicomp infrastructure an explicit part of an interaction design.
The trial participants seemed to achieve what Salen and Zimmermann call “meaningful play” through their experience in that, through multiple plays, the relationships between actions and outcomes were both discernible and integrated into the larger context of the game. For example, because of the lags in GPS, the movement of a player’s icon on the PDA was often delayed by several seconds – resulting in problems picking up coins. Most of the players learning this over the course of their games. Moreover, because some players realized the inconsistency of what was on their screen was not the same as what appeared on the other’s screens, they played more boldly, raising their shields and attempting to steal.
During the iterative development of Treasure designs often changed in response to ongoing findings, which were generally reflections from observational studies of system use.
Technically they used UDP instead of TCP for the messaging subsystem because the play often takes place on the edge of the network (weakly connected). The server “heartbeats” the game state, broadcasting all game state information (scores, positions, etc) every second across the network. The messaging system was found to be robust, but it would not scale well to high numbers of clients creating large volumes of state information and net traffic.
In the discussion section, the authors mention that their reinforced opinion that user trials of such games, and of ubicomp systems more generally, should involve repeated use and/or use over a long time than a single, short session. A recording and replaying system (lke replayer and CatchBob!’s replay tool) are of a big aid in developing tactics and strategies for future play, but may also be an important means for players to show each other how they played in the past. EA’s game Burnout rely on playbacks.
Weiser’s narrow design focus only concentrated on transparent use. It is at odds with the findings of user studies of how people develop their use of ubicomp systems through experience of both transparent and analytic use. Transparent and analytic activity use are mutually interdependent with the former unaviodably influenced by analytic activity such as handling “breakdown”, working on or adapting it. learning about it, teaching others how to use it, considering how to act so that it works better, and considering how to present oneself to others through it.
Design that makes the system so starkly open to analysis by users may seem contradictory to the design goal of “invisibillity” or “transparency” usually associated with ubicomp, but people use past, present and potential activity involving the system in developing their understanding of it.
Reference I should get my eyes on:
Chalmers, M. A Historical View of Context. J. CSCW vol 13 (2004) 223-247
Salen, K, Zimmerman, E. Rules of Play: Game Design Fundamentals, MIT Press (2004)
Posted: December 10th, 2005 | No Comments »
Micorosft Virtual Earth has now become Live Local. They added a “Locate Me” feature to display current location of the user by by using Wi-Fi technology. Very similar to James Howard’s Google Maps WiFi Locator and my MapMe. Microsoft uses their own Location Finder program that has to be installed. Location Finder is probably related to Microsoft’s efforts to locate APs. If you do not install Location Finder, or if your computer does not support Wi-Fi, Windows Live Local can attempt to find your location by using the IP address of your computer. Apparently Microsoft
In their privacy policy they mention that “Microsoft may use the information collected to provide you with more effective customer service, to improve Location Finder and any related Microsoft products or services”. They show a clear lack of sensitivity towards privacy issues. Location-based applications should be designed to present location coordinates privately to a user, without querying, or notifying the network.
Moreover, Mike Liebold proves in the Place Lab mailing list that “Clearly Microsoft’s IP location database includes spooky datamined information about users’ actual location that is not normally available by querying the publically accessible databases.”