Bibliography Critical Review

Running Head: CRITICAL REVIEW 1
CRITICAL RIVIEW
Name
Institutional Affiliation
Date
CRITICAL REVIEW 2
Introduction
This paper is a Critical Review of Satyanarayanan (2001), M. 2001. Pervasive
computing: vision and challenges. Personal Communications, IEEE, 8, 10-17.” VS. Schmidt,
A., Beigl, M. & Gellersen, H.-W. 1999. There is more to the context than location. Computers &
Graphics, 23, 893-901." Satyanarayanan (2001)’s article brings out the challenges in the mobile
computing sector. Schimdt et al. (1999) discuss developing an ambiguous system that explores
the connection that exists between parameter location, and implementation of applications said
termed to be context-aware. He goes forward to the applications ca be applied in as a basis of his
theory.
Problem Identification
Satyanarayanan (2001)’s works is a proposal that brings out the challenges of a new
world of visionary technological advancement. It is an amplification of Mark Weiser’s vision of
1991 of ambiguous computing; that was the need to develop a computer community, with the
capability to compute and communicate while integrated with the human users. However, the
technological progress did not support the idea, until recently, with the hardware advancement,
several of this exotic pervasive computing are currently commercially available. The main
objective of the article, therefore, is to enable the users critically understand the problems posed
by the implementation of pervasive systems and computing (Satyanarayanan, 2001). In Schmidt,
Beigl, & Gellersen (1999) report, the aspiration to support computer usage satisfactorily in the
frequently changing physical environment, led to the investigation of context-awareness in
distributed computing (Schmidt, Beigl, & Gellersen, 1999).
CRITICAL REVIEW 3
Goal of the Rsearch
The reseach, according to Schmidt, Beigl, & Gellersen (1999) proposes that ultra-mobile
computing, described by operational and operated devices, can greatly benefit from the concept
of context.the article, therefore, introduces a working model for the context, highlights the
mechanisms that enable aquire context beyond level, applications of the context-awareness in
ultra mobile computing. As for Satyanarayanan (2001), the article suggests emerging fields of
ubiquitous computing.
Literature Review
Pervasive computing is a recent technology that is a revolutionary step that succeeded
distributed systems and mobile computing. Existing solutions may be applied directly to
problems caused by this case. However, some may require new solutions. Distributed networks
emerged during the intercession personal computers, and local area networks, while mobile
computers appeared afterward, after the problem of distributed systems was confronted.
Distributed systems had limitations; variation of network quality, problems due size and weight,
and battery power concerns. Mobile computing is divided into various categories that include;
mobile networking, mobile information access, support for adaptive applications techniques for
system energy saving, and sensitivity to location. Schmidt, Beigl, & Gellersen (1999) in their
article, proposes various models so as to structure the concept of context. The models are
categorized hierarchically. These categories are depicted in Figure 1 below.
CRITICAL REVIEW 4
Fig. 1. Conceptual Context Feature Space. Adapted from There is more to Context Than
Location. Computers and Graphics, 893-90. By Schmidt, A., Beigl, M., & Gellersen, H.-W.
(1999)
Methodology
Pervasive computing is reliant on mobile computing although it is an improvement of it.
Its ability to support mobility makes it integrated to the users. It adopts various agenda in it that
include; the effective application of smart spaces, invisibility, localized scalability, and masking
uneven conditions. A smart space can either be a room or an open area with computing
infrastructure. Invisibility follows the idea that was expressed by Weisner. Pervasive computing
grows in sophistication as it works in a smart space. This is due to the interaction with the user is
increased between the computer and the surrounding. However, the problem associated with this
CRITICAL REVIEW 5
is that it has a severe bandwidth, energy and implications resulting from destruction. Multiple
users, however, propel this. It was necessary to develop a technique for unmasking the uneven
condition of the environment. Factors such as economics and business models determine the
penetration rate of pervasive computing into the infrastructure. Satyanarayanan (2001) has well
used the example of scenarios to bring real word of application of pervasive technology.
In the article of Schmidt, Beigl, & Gellersen (1999), contexts are either explicitly
acquired when the user specifies, or by implicitly through observing both the user and the
computer-based activity. According to Schmidt, Beigl, & Gellersen (1999), in mobile computing,
the usage of applications is set in different environments at different times, hence establishing a
varying context that will lie separately from the human-computer system interface. According to
Schmidt, Beigl, & Gellersen (1999), ultra-mobile devices are integrated with sensor technologies
that advance in respect to size, processing requirement, power utilization and cost-effectiveness.
The sensor technologies include; vision, audio, motion, location, bio-sensors, specialized
sensors.
Advantages
Satyanarayanan (2001)’s proposal in pervasive computing is crucial for effective
proactivity and ability to track the user’s intention. Satyanarayanan (2001) explains that this
helps in determining the user activity rather than ending it in case of a problem. Accomplishing
this vision will bring into reality the need to have small-size devices, light and long life batteries.
However, this comes with a constraint that mobile users will require capabilities of computing
and manipulation of data beyond those of lightweight mobile computers. However, the problem
can be solved with the application of cyber foraging. In Schmidt, Beigl, & Gellersen (1999),
CRITICAL REVIEW 6
awareness of context benefits ultra-mobile computing in various ways; adapting to the changes
of the environment, and through enhancement of the user interface. Context awareness also helps
in improving human interaction with the ultra-mobile devices.
Disadvantages
The demand for power increase with the use of sophisticated software, furthermore,
restricting computers to be light weight and compact causes problems to the battery. The amount
of memory CPU power and space is directly proportional to the size of the hardware. Reducing
the size of this, means imposing constraints on the hardware design. Satyanarayanan (2001)
suggests that pervasive systems should have the ability to recognize the user’s state and
surrounding, and be able to modify its behavior accordingly, that is, physical location, body
temperatures, and behavior patterns. However, it will be a challenge to obtain the information for
it to function in the a context-awareness manner required. A proactive system can be annoying
and thus unable to meet the goal of invisibility. However, this can solved by the application of
self-tuning. Both mobile computing and distributed systems have the problem of privacy though
pervasive computing complicates it further. Mechanisms such as tracking locations, smart spaces
complicates and reduces privacy (Satyanarayanan, 2001).
Conclusion
Just like Weisner stated in his vision, achieving pervasive computing will be challenging
as a research problem. Therefore, solving the problems will require revisiting past assumptions
broadening discourse in various topics. In case of high demand for pervasive computing, the
strategies put in place for adaptation include; clients should change their behavior so as to use
less of the resource, asking for a guarantee of a certain level of resource, and suggesting
CRITICAL REVIEW 7
correction on the user’s actions. Schmidt, Beigl, & Gellersen (1999) in their work shows that the
application of context-awareness will enhance ultra-modern devices in providing improved
interface with the user. Schmidt, Beigl, & Gellersen (1999) proposed the use of sensors to gain
the context information. However, more research is required so as to acquire information by
networked sensors so as to improve ultra-mobile devices.
CRITICAL REVIEW 8
References
Satyanarayanan, M. (2001). Pervasive Computing: vision and challenges. Personnal
Communicatiions. IEEE, 10-17.
Schmidt, A., Beigl, M., & Gellersen, H.-W. (1999). There is more to Context Than Location.
Computers and Graphics, 893-901.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.