the r i d ecosystem project you w c s c is investigating user centred

are id systems in connection with technology business and society

well past research with r i d and user warrington settings has been limited to

short-term studies in restricted scenarios

the r f i d ecosystem provides a living laboratory a long term in depth

research in our by the application data management privacy security and systems

the overarching goal of this research is to inform the communities including business isn't policymakers

of the benefits of challenges of user centred or id systems were proposing technological solutions

whenever possible

the project uses a large-scale are fide deployment in apology alan centre for computer science

and engineering

and eighty five thousand square foot state-of-the-art facility for computer science research

the deployment covers the seven floors of the onset or which include laboratory spaces

student faculty and staff offices

students that lounges

and break utterance

a network of fifty e p c gender to are ready readers is deployed in

the hallways of the onset or with additional readers and stop and some laboratory

are widely antennas are mounted beneath cable to raise this but which affords hybrid rates

well still adhering to f c help required

users carry one personal are fide tag and may attach additional text the personal objects

users tags are tracked as they move about the building

the are my dear readers you see a sees internal network to securely send all

tag relevance to one or more servers

the servers themselves

i physically security and a lot server

the complete system architecture has the r i d readers at the bottom forwarding tag

relevance to a hierarchy of gateway nodes

the real gateway sends a stream of our id data to a data management system

that is specially engineered to support user centred applications on top of noisy an uncertain

sensor data

this includes a particle filter for location estimation a probabilistic event detectors for extracting meaningful

high-level events

and modules which enforce privacy policies using access control another technique

and event manager coordinates this data management system and expose the to applications and tools

with the event driven and query based programming interfaces

as we did user level tools simplify the definition of events and metadata

and also facilitate system administration tasks

users and their applications are at the top level of the r i d ecosystem

further is a micro blocking in front finder application that uses the or idea ecosystems

event detection services to enable groups of users to keep in touch with automatic status

updates here dylan is working in a large before meeting with this friend evan

curious to see whether evan is left for the meeting don't check spreader for an

update on happens most recent location

i don't see that evan has already left for the conference room

so you packs up and head there himself

evan enters the conference room and prepares for the meeting

because evan and dylan have previously agreed that their locations be visible around reading times

and can check to see whether dylan is on his way as well but he

loads the or by d map matched up to see don't location in real time

this is that doing design is waiting and so it doesn't bother to email him

a reminder

like most are idea ecosystem applications and tools greater and the r f i d

map match up support both mobile and web interface

there is also being integrated with the popular social networking and marker blocking service twitter

the digital diary application automatically logs detected events to help users track how where and

with whom they've spent their time

here on it uses scenic tool to specify an event which you would like to

keep track of for all frequent copy breaks

scenic allows users to specify common speech your team for immigrants using a direct manipulation

interface that embodies an intuitive storyboard metaphor

on a specified for coffee break event with two scenes the first showing are some

outside the copy room and the second inside the cochlea room watermarking a friend

which is done with their specifications estimates the event

later on of wants and to have an in the hallway and has a brief

conversation

they are pretty you can system detects this that's a simple encounter effect because on

a has previously configured for digital tirade to subscribe to all encounters with project numbers

the are by the ecosystem will for the encountered centre for digital tiring for logging

banana has copy with dylan and instance of or copy break event will be detected

and forwarded retiree as well

on the can review for digital diary using a web based calendar today she sees

both earn counter with evan and her copy break with dylan

the near field communication enabled phone is a joint project between u w c and

intel research santa clara the end of c phone allows users to connect devices as

well as to access content and services by simply holding enabled devices near each other

one application scenarios access control

here but uses is found a marked the you become black once in a lab

here's evan listening to some music that he likes

evans p c is also enabled with f c technology and run the special application

that allows and fc enabled phone users to capture your l to the currently playing

song

bach captures the url and can immediately playback this on his own

and f c technology can also be used to embed links to rich digital content

in common physical objects

here box tops to read an interesting poster

it receives an important phone call for what you will have to hurry up

still interested in the poster but uses in f c enabled want to capture linked

in the information on the poster so that you can read it later

for more information and online demos please visit our website