0:00:00 | the r i d ecosystem project you w c s c is investigating user centred |
---|
0:00:05 | are id systems in connection with technology business and society |
---|
0:00:10 | well past research with r i d and user warrington settings has been limited to |
---|
0:00:14 | short-term studies in restricted scenarios |
---|
0:00:16 | the r f i d ecosystem provides a living laboratory a long term in depth |
---|
0:00:20 | research in our by the application data management privacy security and systems |
---|
0:00:26 | the overarching goal of this research is to inform the communities including business isn't policymakers |
---|
0:00:32 | of the benefits of challenges of user centred or id systems were proposing technological solutions |
---|
0:00:37 | whenever possible |
---|
0:00:39 | the project uses a large-scale are fide deployment in apology alan centre for computer science |
---|
0:00:44 | and engineering |
---|
0:00:46 | and eighty five thousand square foot state-of-the-art facility for computer science research |
---|
0:00:51 | the deployment covers the seven floors of the onset or which include laboratory spaces |
---|
0:00:56 | student faculty and staff offices |
---|
0:01:00 | students that lounges |
---|
0:01:03 | and break utterance |
---|
0:01:06 | a network of fifty e p c gender to are ready readers is deployed in |
---|
0:01:10 | the hallways of the onset or with additional readers and stop and some laboratory |
---|
0:01:14 | are widely antennas are mounted beneath cable to raise this but which affords hybrid rates |
---|
0:01:19 | well still adhering to f c help required |
---|
0:01:21 | users carry one personal are fide tag and may attach additional text the personal objects |
---|
0:01:27 | users tags are tracked as they move about the building |
---|
0:01:30 | the are my dear readers you see a sees internal network to securely send all |
---|
0:01:34 | tag relevance to one or more servers |
---|
0:01:38 | the servers themselves |
---|
0:01:39 | i physically security and a lot server |
---|
0:01:43 | the complete system architecture has the r i d readers at the bottom forwarding tag |
---|
0:01:47 | relevance to a hierarchy of gateway nodes |
---|
0:01:50 | the real gateway sends a stream of our id data to a data management system |
---|
0:01:54 | that is specially engineered to support user centred applications on top of noisy an uncertain |
---|
0:01:59 | sensor data |
---|
0:02:00 | this includes a particle filter for location estimation a probabilistic event detectors for extracting meaningful |
---|
0:02:06 | high-level events |
---|
0:02:08 | and modules which enforce privacy policies using access control another technique |
---|
0:02:13 | and event manager coordinates this data management system and expose the to applications and tools |
---|
0:02:18 | with the event driven and query based programming interfaces |
---|
0:02:23 | as we did user level tools simplify the definition of events and metadata |
---|
0:02:27 | and also facilitate system administration tasks |
---|
0:02:31 | users and their applications are at the top level of the r i d ecosystem |
---|
0:02:39 | further is a micro blocking in front finder application that uses the or idea ecosystems |
---|
0:02:44 | event detection services to enable groups of users to keep in touch with automatic status |
---|
0:02:48 | updates here dylan is working in a large before meeting with this friend evan |
---|
0:02:52 | curious to see whether evan is left for the meeting don't check spreader for an |
---|
0:02:56 | update on happens most recent location |
---|
0:02:58 | i don't see that evan has already left for the conference room |
---|
0:03:02 | so you packs up and head there himself |
---|
0:03:06 | evan enters the conference room and prepares for the meeting |
---|
0:03:09 | because evan and dylan have previously agreed that their locations be visible around reading times |
---|
0:03:14 | and can check to see whether dylan is on his way as well but he |
---|
0:03:18 | loads the or by d map matched up to see don't location in real time |
---|
0:03:23 | this is that doing design is waiting and so it doesn't bother to email him |
---|
0:03:26 | a reminder |
---|
0:03:28 | like most are idea ecosystem applications and tools greater and the r f i d |
---|
0:03:33 | map match up support both mobile and web interface |
---|
0:03:36 | there is also being integrated with the popular social networking and marker blocking service twitter |
---|
0:03:43 | the digital diary application automatically logs detected events to help users track how where and |
---|
0:03:49 | with whom they've spent their time |
---|
0:03:50 | here on it uses scenic tool to specify an event which you would like to |
---|
0:03:53 | keep track of for all frequent copy breaks |
---|
0:03:56 | scenic allows users to specify common speech your team for immigrants using a direct manipulation |
---|
0:04:00 | interface that embodies an intuitive storyboard metaphor |
---|
0:04:04 | on a specified for coffee break event with two scenes the first showing are some |
---|
0:04:07 | outside the copy room and the second inside the cochlea room watermarking a friend |
---|
0:04:11 | which is done with their specifications estimates the event |
---|
0:04:15 | later on of wants and to have an in the hallway and has a brief |
---|
0:04:18 | conversation |
---|
0:04:19 | they are pretty you can system detects this that's a simple encounter effect because on |
---|
0:04:24 | a has previously configured for digital tirade to subscribe to all encounters with project numbers |
---|
0:04:29 | the are by the ecosystem will for the encountered centre for digital tiring for logging |
---|
0:04:36 | banana has copy with dylan and instance of or copy break event will be detected |
---|
0:04:41 | and forwarded retiree as well |
---|
0:04:43 | on the can review for digital diary using a web based calendar today she sees |
---|
0:04:47 | both earn counter with evan and her copy break with dylan |
---|
0:04:52 | the near field communication enabled phone is a joint project between u w c and |
---|
0:04:57 | intel research santa clara the end of c phone allows users to connect devices as |
---|
0:05:02 | well as to access content and services by simply holding enabled devices near each other |
---|
0:05:06 | one application scenarios access control |
---|
0:05:09 | here but uses is found a marked the you become black once in a lab |
---|
0:05:13 | here's evan listening to some music that he likes |
---|
0:05:15 | evans p c is also enabled with f c technology and run the special application |
---|
0:05:20 | that allows and fc enabled phone users to capture your l to the currently playing |
---|
0:05:23 | song |
---|
0:05:24 | bach captures the url and can immediately playback this on his own |
---|
0:05:35 | and f c technology can also be used to embed links to rich digital content |
---|
0:05:39 | in common physical objects |
---|
0:05:41 | here box tops to read an interesting poster |
---|
0:05:45 | it receives an important phone call for what you will have to hurry up |
---|
0:05:51 | still interested in the poster but uses in f c enabled want to capture linked |
---|
0:05:55 | in the information on the poster so that you can read it later |
---|
0:06:01 | for more information and online demos please visit our website |
---|