The 5th International Conference on Ubiquitous Intelligence and Computing
Oslo University College, Oslo, Norway, June 23-25, 2008.




Call for papers




Accepted papers

Keynote speakers


Joint panel


Author instructions





UIC-07 website

UIC-07 proceedings

ATC 2008

Keynote speakers

Challenges in the design and development of context-aware applications

Prof. Jadwiga Indulska, The University of Queensland / NICTA, Australia

Jadwiga Indulska


Context-awareness plays an important role in pervasive computing as adaptations of applications to context changes (changes in computing environment and in user activities/tasks) help to achieve the goal of computing services available everywhere and at any time. There is a growing body of research on context-aware applications that are adaptable and capable of acting autonomously on behalf of users. However, there are still many open research issues that challenge the pervasive computing community. In this talk I will discuss several of these research challenges. First, I will outline the state of the art in context information modelling, management and reasoning as well as possible future research directions in this area. This will be followed by a discussion of context information management that allows development of fault-tolerant and autonomic context-aware applications. As one of the challenges inhibiting the development of context-aware applications is their complexity, I will discuss software engineering approaches that ease the task of developing such applications. Context-aware applications adapt to context changes using context information. However this context information may be imprecise or erroneous and therefore can lead to incorrect adaptation decisions creating usability problems and affecting acceptance of context-aware applications. This creates a need for some balance between autonomy of context-aware applications and the user control of the applications. I will describe some early approaches my team is working on to tackle this problem. Finally, I will discuss research issues related to privacy of context information and how context can be used to enhance security mechanisms within pervasive computing environments.

About the speaker

Jadwiga Indulska is a Professor in the School of Information Technology and Electrical Engineering at The University of Queensland, Brisbane, Australia. She received a Masters degree in Mathematics from Jagiellonian University and her PhD degree in Computer Science from AGH University of Science and Technology, both in Krakow, Poland. Her research interests are in the areas of computer networks, distributed computing and pervasive computing. Over the last 10 years, her research has addressed many problems in pervasive and autonomic computing including context information models for context-aware applications; autonomic management of context information; privacy of context information; software engineering of context-aware applications; balancing user control and software autonomy; and autonomic, rapidly deployable mesh networks. She has led research projects on interoperability of distributed applications, mobile computing, and pervasive computing at the DSTC, an Australian Government funded Collaborative Research Centre on Distributed Systems Technology, (1992- 2005). She is currently leading a research project on autonomic networks and systems at NICTA (National Centre of Excellence in Information and Communication Technology). More information on her research can be found at http://www.itee.uq.edu.au/~jaga

The importance of including the haptics factor in interaction design

Prof. Petter Øyan, Akershus University College

Petter Øyan


One aspect of interaction design is communication of information through the use of a screen. Another aspect, the physical or haptic interaction with the device itself, is another important issue, especially to reduce errors when the device is used in critical situations.

Ostfold university college has cooperated with the Institute for Energy Technology in Halden and the Norwegian Defence Research Establishment in Kjeller, and several student groups have been given the opportunity to work on research data and in collaboration with researchers from these two institutions within their final year studies.

The focus of the projects has been realistic; emphasizing the importance of minimizing operating errors to ensure safe operation in critical situations, where the ability to give correct feedback through haptic interaction is as important as the correct understanding of visual communication.

The cases are demonstrating the user centered approach to problem solving used by industrial designers and the analogy between the design- and the resarch process, especially focusing on the use of physical designs to test and review and thereby exploring form as an interaction parameter.

About the speaker

Prof. Petter Øyan has degrees from The Oslo National Academy of the Arts, Norway, Fachhochschule für Gestaltung Pforzheim, Germany and Fachhochschule für Gestaltung Schwäbisch Gmünd, Germany. Prof. Øyan has more than 20 years of experience as an industrial designer both in Norway and Germany with works that have landed him numerous awards for outstanding design. Since 2003 Øyan has been a full professor in industrial design and interaction design at Østfold University College and he is currently the dean of product design at Akershus University College. Prof. Øyan is the chairman of The Professional Board for Design Education in Norway.

Security Challenges for Wireless Sensor Network Applications

Dr. Erdal Cayirci, NATO JWC & University of Stavanger, Norway

Erdal Cayirci


Wireless sensor networks (WSN) have many security and safety applications. BODAS, TADAS and TEDAS are three examples for WSN security applications implemented and deployed recently. BODAS detects threats against the security and safety of pipelines. TADAS is a tactical sensing system to detect and classify the intruders. It is developed for surveillance along borders, through approach routes and around critical facilities. Finally TEDAS detects the intruders passing over, through or under a perimeter fence. All three applications are based on the deployment of a large number of unattended nodes for extended time periods. Therefore, scalability and power awareness are critical design parameters for them. They are also susceptible to security threats different from typical military and commercial systems. We first introduce briefly these applications, and then elaborate the security threats and required security mechanisms for them. We also give our practical solutions for some of these security challenges and experimental results for them obtained through the implementation and deployment of BODAS, TADAS and TEDAS.

About the speaker

Erdal Cayirci graduated from Turkish Army Academy in 1986, and from Royal Military Academy Sandhurst in 1989. He received his MS degree from Middle East Technical University, and the PhD degree from Bogazici University in computer engineering in 1995 and 2000, respectively. He retired from the Turkish Army when he was a colonel in 2005. He was an associated professor in Istanbul Technical University, Yeditepe University and Naval Sciences and Engineering Institute between 2001 and 2005. He was a visiting researcher with Broadband and Wireless Networking Laboratory and a visiting lecturer with the School of Electrical and Computer Engineering at Georgia Institute of Technology in 2001.

He is currently Chief, CAX Support Branch in NATO Joint Warfare Center in Stavanger, Norway, and also a faculty with the Electrical and Computer Engineering Department of University of Stavanger. His research interests include sensor networks, mobile communications, tactical communications, and military constructive simulation.

He was an editor for IEEE Transactions on Mobile Computing, AdHoc Networks (Elsevier Science) and ACM/Kluwer Wireless Networks journals, and guest edited four special issues for Computer Networks (Elsevier Science), AdHoc Networks (Elsevier Science) and Kluwer Journal on Special Topics in Mobile Networking and Applications (MONET).

He received “2002 IEEE Communications Society Best Tutorial Paper” Award for his paper titled “A Survey on Sensor Networks” published in the IEEE Communications Magazine in August 2002, “Fikri Gayret” Award from Turkish Chief of General Staff in 2003, “Innovations” Award from Turkish Navy in 2005, and “Excellence” Award in ITEC 2006.