mlnutes __
Thu, Mar 20
Description: Cali Jim Page
Duration: 15 minutes Lead time: 5 minutes
I
Off ice
...
Type of event phone call
DBI~~~TNS Even!
I
EdH Thw EVE#
1
I
Figure 4: On the left is an excerpt from the style sheet used to render caleiidar event objects. On the right side is tlie resulting WWW hypertext presentation. Dtype evaluator cornniands are embedded within "" mark-up tags. This allows for WWW browsers to ignore the eiiibedded commands.
Dtype with all the informat,iori needed by a transport meclianisni to deliver the message. Address objects currently represent a person, a group, or a service.
Timer this structure encodes temporal attributes. In the case of the message object, it is used to defer evaluation and/or delivery of a message.
Event the event structure 1181 allows us to coinmunicate when a particular activity is occurring. It may result in the automatic creation of a message object at a given time.
4.3
Communications Devices
Telephones are probably the most ubiquitous coinrriuiiication devices available. A touch-tone based interface with a synthesized speech unit similar to Schrmndt's PhoneShell 1191 is available to the subjects.. Through this interface, the rnernber uses the touch tone keypad to coinpose a message, as well as a speech synthesizer to read back text messages. In addition, MIT's telephone system provides us with callerID. This is important since the system can infer the caller's location if they are calling from a phone in a fixed 1oca.tion (as opposed to a cellular phone). Building a database with telephone locations is a simple and powerful addition to message analysis. The World Wide Web provides participants a cowsisteiit, interface across tlie many computer platforms available to them. Given this rich cnvironinent, a WWW interface for the subjects to use to manage their coinniunications was specifically crafted. This interface allows them to read and cornpose messages, as well as consult and edit their calendars and address books.
At the time of this writing, a number of devices have been integrated into this framework and the irnplementation of others is being worked on. All of these interfaces are off-the-shelf technologies, albeit some more expensive than others. Motorola Tango two-way pagers have been provided to the experimental subjects. These pagers have the capability of originating free form messages. The pager's discrete form factor makes it extremely portable and likely to accorripany the subjects almost everywhere. It is usually safe to assume that the owner is the only oiie using the pager, and as such, the system can make some inferences about its use. Mainly, if the pager is being used t o originate messages, the person is away from desktop coniniunicatioris access. Pagers send an acknowledgment back to the system, allowing us to know if tlie message has been successfully delivered. Future pagers will have the abi1it.y to do simple processing of messages on the pagers themselves, allowing us to know whether or not the message was actually read. As the local processing power of pagers increases, they will assume some of the roles of wearable computers.
Froin the very beginning, the desire was to integrate the Canard system into the public space of the residence. An electronic whiteboard! capable of digitizing t.he markings on its surface, is being investigated as a replacement to traditional bulletin boards. Coupled with a projection system, this interface makes an ideal connection to the group. Material captured on the whiteboard can be sent to the group's WWW page as an image file. or sent to handwriting recognition software to be transcribed to text form. The projection system can place configurable templates on the surface for formatted entry. In the lorig term future, a digital camera on the whiteboard will be able to take a snapshot of the person when they press the "publish" button, and using face recognition software [a01 [21]!
Case 1:06-cv-01015-JR
Document 30-10
Filed 05/30/2007
Page 8 of 10
attribute whiteboard data to the author. In addition, low cost scrolling LED displays C a l i be placed in other public locations around the residence. Public displays pose an interesting problem in ternis of presenting persorial information without sacrificing privacy. Ttic use of bitmaps to reflect personal information xtivity is being explored. For example, "Joe" may be in the lounge watching T V with his peers wlieii he sees on the LED display his name followed by e-mail icon in red. This would tell hini that an important message is waiting.
based calendars contain schedules of activities. Having a unified representation allows us to create soilware capable of negotiating appointments automatically.
4.4 Integrated Applications Dtypes are used to represent myriad objects in the Canard system. Common routines can be created for manipulation. Viewing objects becomes a simple matter of specifying a desired database and matching it with an appropriate style sheet for presentation (see fig. 4). A number of Dtype manipulation programs have been implemented for the subjects use. This framework allows for the integration of messaging systems. MIT's Zephyr [22] systeni has been incorporated. Zephyr is a distributed window-gram messaging system commonly used at MIT for rnessaging other users on the Atheria computer system witliout knowing at which machine the recipient is located. Zephyr can be used to find individuals on the system as well. Electronic mail is another rich source of information when coupled with structure multimedia message formats like the Multipurpose Internet Mail Extensions (MIME) [23]. Today, merely the text portioii of e-mail is moved into the Canard system, but multimedia messages will be integrat,ed in the future. These rnessage bodies niay be represented using Dtypes as follows:
( (isa "message/mime") (mime-version "1. O s s )
4.5 External Services Iinportant is the ability for participants to author collaborative services. Rather than limit the participant's creativity by imposing a single algorithmic language to author services, an interface with which they specify an address book entry for others to use is provided. Using known protocols, such a the hypertext s transfer protocol (http), the service is accessed as if it were just another message being delivered (in this case to tlic particular service). The differcrice is that a reply is irrimediat.ely composed by the service, and, depending on the situation, is sent as either part of the body of a message to another destinat.ion (in the case of an embedded service), or as a complete message sent back to the person who made the request.
5
Security and Privacy Issues
(mime-type multi alternative) (body(multi/alternative ( (text/ascii "Hello World! " ) (image/@ (4947 3846 6139 . . . 1 ) )
A unified address book database is critical to the usability of the system. It provides a mechanism for the simple addressing of messages, which is independent of the communications channels. It provides pointers t,o other address servers that can authoritatively disclose how t o communicate with someone. Calendars can be rich in context - who we will be with! what we will be doing, and where we will be. Calendar information conies from many streams: E-mail is routinely used to communicate meetings and WWW
This paper describes the representation and evaluation on a "trusted system." The processing can reside on a centralized system, as it does in the current implementation, or can be distributed at the fringe of a network. The use of "secure" transport layers to deliver the messages is not. affected by where the computai,ion takes place. For the WWW interface, we use a Secure Socket Laver [24] http server which provides a secure interface that is widely available in current browsers. As iiew encryption technology emerges, it can be folded into the framework of this project. Public keys can be maintained within the address book database and used to assure secure channels with other correspondents. The plan is to leverage off of available authentication services wherever possible (Le.,Kerberos[25]). Messages that are received in encrypted form using public keys are not automatically decrypted. This does not mean that they are ignored, since niany of the features for evaluating the message are present in clear text forin. In fact, the use of eiicryption can be a feature to infer the urgency of the message.
6
Conclusion
The Canard framework allows for rapid development of collaborative communications projects for wearable computing community. Its open architecture allows components to be developed independently in the programming language familiar to the developer. Its autonomous management of comrnunicatioiis makes it an ideal server environment for wearable computing, where reliability is an issue.
Case 1:06-cv-01015-JR
Document 30-10
Filed 05/30/2007
Page 9 of 10
It is too early to determine how the residents are using the system (while it is being developed), but initial interviews with the subjects indicates that they are receptive to this approach. The experimental group has a diverse background: Some are more technically savvy than ot,hers. It is unclear whether this frainework is simple enough to encourage all the residents to be authors of collaborative services. Focus group studies and individual interviews with the participants will be held to evaluate t,he effectiveness of this approach. The residents will be questioned about the types of services that they authored using this frainework, and the processing rules they used to filter communications. Future work will focus on: transcoding of conimunications from one stream to another; the tracking of people in the community; and a security model for personal access control.
(61 William W. Gaver, "Sound support for collaboration," in Proceedings of the Second European Conference o n Computer-Supported Cooperative Work, Amsterdam, The Netherlands, September 1991. [7] Judith S. Donath, Inhabiting the virtual city: T h e design of social environments f o r electronic communities! Ph.D. thesis, Massachusetts Institute of Technology, 1996.
1 1 Mark Weiser, "Tlie computer for the 21st cen8 tury." Scientific American, vol. 265, no. 3 , pp. 94-104) 1991.
1 1 Jef Posliarizer, Extended Portable Bitmap Toolkit, 9 December 1991.
7 Acknowledgment
The author wishes to thank Walter Bender for his support, of this project as part of the News in the Future research consortium at the Media Laboratory. The author also wishes to thank Jini Page and David Morgan of Motorola. Dana Spiegel, Matthew Mucklo, David Laniacchia arid Dan Gruhl contributed to the design and iinplemeiitation of the system. Jonathan Sheena and Nathan Abramson developed Dtype library and utilities which this system is built upon. Canard has a publicly accessible WWW page 10cated at lnttp://canard.media.init.edu/
[lo] Steplien R. van den Berg, Procmail
- Mail processing Package, RWTH-Aachen, Germany, October 1994, Sources as are available at ftp.informatik.rwth-aaclien.de pub/packages/procmail/procmail. tar.gz.
1111 Thomas U'.blalone, Kenneth R. Grant, Kuin-
Yew Lai, Rao Rao, Ramana, arid David Rosenblitt, "Semistructured messages are surprisingly useful for computer-supported coordination," In Greif [2]: chapter 12, pp. 311-331.
References
[l] Thad Starner, Steve blann, Bradley Rhodes, and
Jeffrey Levin, "Augmentzedrealitg lhotigh wearable computing," Tech. Rep. 397, MIT Media Laboratory Perceptual Computing Section, Carnbridge, MA, 1997.
~
[12] Nathan S. Abramson, "The dtype library or: how to write a server in less time than it takes to read this manual," Tech. Rep., MIT Media Laborat,ory Electronic Publishing Group, Carnridge, MA. 1992. [13] Kenneth IIaase, "Framerd: Representing knowlvol. 35, edge in the large.`` I B M Systerris Jour-r~al. no. 3&4, pp. 381-397, 1996. 1141 Alan Blount, "Bettyserver: More news than you can beat with a stick," Tech. Rep., hlIT Media Laboratory Electronic Publishing Group, Camridge, MA, 1991. [15] Andrew Lippman and Roger Kermode, "Media banks: Entertainment and the internet," I B M Systems J o i ~ m a l vol. 35, no. 3&4, pp. 272-291, , 1996.
[2] Irene Greif, Ed. Computer-Supported Cooperative Work: A Book of Readings? hiorgan Kaufmann, 1988. [3] Jon Orwant, "For want of a bit the user was lost: Cheap user modeling," I B M Systems Journal, vol. 35, no. 3&4, pp. 398-416, 1996.
(1 Mitch Resnick, R e d Martin: Randy Sargeiit! arid 4
Bria.n Silverinan, "Programmable bricks: Toys t.o think with," I B M Systems Journal, vol. 35, no. 3&4, pp. 443-452, 1996.
[5] William J. Mitchell, City of Bits: Space, Place, and the Irifobahir: MIT Press, Cambridge: MA, 1995.
[l6] Pascal Cliesnais, Matthew Mucklo. and Jonathan Sheena, ` T h e fishwrap personalized news system." in Proceedmgs of the 1995 2nd Internatzonal Workshop o n Community Networkzng, Princeton, NJ, June 1995. pp. 275-282.
Case 1:06-cv-01015-JR
Document 30-10
Filed 05/30/2007
Page 10 of 10
Walter Bender, Pascal Chesnais, Sara Elo, Alan Shaw, and Michelle Shaw, "Enriching comiriunities: Harbingers of news in the future," IBM Svstems Journal, vol. 35, no. 3&4, pp. 369-380, 1996. Irene Greif and Suriil Sarin, "Data sharing in group work," In Greif [2], chapter 17! pp. 477.508. Christopher M. Schmandt, "Phorieshell: the telephone as computer terminal," in Proceedings A C M Multimedia 93, New York, 1993, ACM, pp. 373-382. Matthew Turk arid Alex Pentland, "Eigenfaces for recognition," in Journal of Cognitive Neuroscience, 1991, vol. 3, pp. 71-86. B. Moghaddam and A. Pentland, "Probabalistic visual learning for object detection!" in IEEE Int '1 Conference on Computer Vision, Cambridge! MA, 1995, pp. 786-793. C. Anthony DelloFera, Mark W. Eichen; Robert S. French, David C. Jedlinsky, John T. Kohl, and William E. Sommerfeld, "The zephyr notification system," in USENIX Proceedings, 1988. Ned Freed and Nathaniel S. Borenstein, "Multipurpose internet mail extensions (mime) part one: Format of internet message bodies," Network Working Group Request for Comments, t no. 2045, November 1996. Alan 0. Freier, Philip Karlton, and Paul C. Kocher, "The ssl protocol version 3.0," Tech. Rep.! Netscape Comniunications Corporation, March 1996. Jennifer G. Steiner, Clifford Newman, and Jeffrey I. Schiller, "Kerberos: An aut.hentication service for open networli systems," in USENIX Proceedings, 1988.
FishWrap.
Pascal Chesnais is a Ph.D. candidate a t the MIT Media Laboratory. He is a MIT/Motorola Fellow. Mr. Chesnais received the B.S. degree from Hofstra University i r i 1985. He spent two years at t h e Centre Mondial Inforniatique et Rcssourcc Humaine in Paris, France. A4r. Chcsrrais received the M.S.degree in visual studies from M I T in 1988. A member of the Laboratory's Electronic Publishing group, Mr. Chesriais is t h e publislicr of
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?
|