BlueStar, a privacy centric location aware system.

Page created by Josephine Rhodes
 
CONTINUE READING
BlueStar, a privacy centric location aware system.
BlueStar, a privacy centric location aware system.

        Aaron Quigley1, Belinda Ward2, Chris Ottrey1, Dan Cutting1 and Robert
                                 Kummerfeld1

    Smart Internet Technology Research Group, University of Sydney, Australia1
                      {aquigley, dcutting, ottrey, bob}@it.usyd.edu.au

                 Telstra Research Laboratories, Melbourne, Australia2
                              belinda.ward@team.telstra.com.au

       Abstract. This paper provides the research background and system approach
       for project BlueStar. Our aim is to develop a system using a flexible in/outdoor
       location management scheme that allows for only the end-user to be aware of
       their location, while still enabling them to access location-relevant information
       from a centralised source. In such a system the user can choose the level of
       granularity with which they provide or publish their location details in contrast
       to systems in which a fixed network is used to track the user. BlueStar
       addresses the need for a scalable user-centric end-to-end solution in which end-
       user privacy is protected. As we show in this paper many existing indoor
       tracking systems rely on special purpose receivers (badges) and transmitters in
       conjunction with a costly site radio survey, neither of which is necessary in the
       BlueStar model. Finally, this paper describes one possible location-aware peer-
       to-peer application, using location sniffing, namely an “ad-hocracy”.

1. Introduction

A paradigm shift in human computing interaction from single person, single device
scenarios to multi person, multi-device untethered pervasive computing is currently
underway [7]. This shift supports a more seamless interaction with future ubiquitous
wireless networks, where both services and connectivity can be provided for personal
and professional activities through a range and combination of mobile computing
devices [3,5,23,24].
Research in intelligent environments, pervasive computing, sentient computing, and
ubiquitous computing is attempting to take the current context of the human activity
into account when interacting with the user [13]. Context includes information from
the sensed environment (environmental state) and computational environment
(computational state) that can be provided to alter an application’s behaviour, or is an
application state that is of interest to the user. “Context is any information that can be
used to characterise the situation of an entity. An entity is a person, place, or object
that is considered relevant to the interaction between a user and an application,
including the user and application themselves” [2].
Acknowledgements: The authors would like to acknowledge the support of the Smart
Internet CRC Australia and Telstra Research Laboratories Australia.
BlueStar, a privacy centric location aware system.
2 Position, Location and Navigation Symposium 2004 (PLANS 2004)

Context includes, though is not limited to, spatial information (location, speed),
identity (users and others in vicinity), user model (profile, preferences), temporal
(time of day or year), environmental (noise, light), social (meeting, party), resources
(printers, fax, wireless access), computing (network bandwidth, login), physiological
(hearing, heart rate), activity (supervision, interview), schedules and agendas
[2,23,24]. Based on this, context-aware applications typically fall into the three broad
categories of adaptive, proactive, and automatic. To support the seamless interaction
across a number of devices, context aware applications attempt to reduce the
cognitive burden on the user by offering services that are adaptive, proactive, or
automatic.
Clearly, one aspect of context aware computing is location-awareness. Location-
awareness continues to be integral to a number of research projects both for indoor
and outdoor applications [3,6,9,16]. Location-aware applications include location
based services, finding services such as printing or telephone that are close by,
tracking individuals, goods and resources, locating friends and colleagues, and
localised information and guides [2,5,8,11,17].
The research discussed in this paper proposes a user-centric method based on
“location sniffing” from a fixed infrastructure, which preserves privacy by exposing
only course grained location data. Unlike the hacking term sniffing (eg. packet
sniffing) which pertains to stealing information from the wired or wireless
infrastructure, location sniffing is a method based on simply being able to find a piece
of wireless infrastructure for which the location is known. This method does not rely
on the ability to access the wireless infrastructure but rather know it is there.
Our method does not support all classes of location-aware applications but rather
applications that do not involve tracking or locating other people [16,19,25]. Our
approach couples a network-centric positioning (enhanced cell-ID) system with a
fine-grained indoor location system. The goal is to allow only the end-user to be
aware of their accurate location while indoors, rather than the typical approach which
tracks the users. The end-user can then provide or publish, on varying levels of
granularity, their location details for information or group services. We focus on
addressing the need for a practical user-centric end-to-end location-awareness
solution rather than on improving the accuracy of either the network positioning or
indoor location tracking. Our approach does not rely on special purpose receivers
(badges) and transmitters. Rather it is based on existing wireless networks in the
indoor locations. To address the major privacy issue in a location-aware system, we
keep the accurate location information under the user’s local control. In practice the
more privacy required, the more abstract or redundant data is delivered to ensure the
system cannot deduce where the person is.
The rest of this paper is organized as follows. Section 2 provides a background
summary of both previous approaches to this problem and research currently
underway. Section 3 describes our proposed system, including a description of typical
application scenarios and the development of test bed infrastructure for the
experiments. Section 4 describes a hybrid intelligent environment application
(adhocracy) relying on location. Finally, Section 5 outlines our conclusions for the
current state of this research work.
BlueStar, a privacy centric location aware system.   3

2. Background

The increasing trend in mobile hand-held personal computers and mobile phones
(mobile terminals) has seen the development of many different location-aware
systems and technologies. Traditionally, location-awareness is synonymous with
“tracking” and the entire social, control and big-brother implications. Tracking
systems typically rely on a fixed infrastructure to determine the device’s location
[15,18,20] or having the mobile terminal report its own position on a regular basis.
However, it is now generally considered that location-aware applications can be based
on location information, which is calculated either by the mobile terminal, the
infrastructure, or a combination or hybrid approach [18,19,14]. Where the device has
information, which allows it to locate itself, the applications, which reside on it, are
self location-aware i.e. they do not require the infrastructure to provide the location
calculation [19]. This approach places the responsibility on the device to retrieve,
filter or present information appropriate to the current location.
Location-awareness requires a data model (location space) that can represent the
locations of mobile and fixed objects. A location space can be modelled using a
coordinate system (geometric) or as a set of symbols with relationships between them
(symbolic) [9]. However, before we address the data model, the range of location-
aware systems and technologies can be broadly divided into outdoor and indoor
approaches.

2.1 Outdoors Positioning: Network Based

Due to the availability of telecommunications infrastructure for mobile telephony,
considerable research and development has gone into cellular telecommunications
network-based location or positioning systems. These systems position a mobile
handset using information such as the cell of origin (which may range in size from
hundreds of meters in metropolitan areas to tens of kilometres in rural areas),
measurement of signal strength, direction of arrival of the signal, base station time of
arrival (based on triangulation and base station time synchronisation) and handset
time of arrival (which requires special purpose hardware in the handset). To date
there has been no convergence on a common standard for cellular positioning. For
example, a method called Enhanced Observed Time Difference is included in the
GSM standard, but is not yet supported by many network providers.

2.2 Indoor Positioning

One of the earliest indoor location-aware system was developed by researchers at
Xerox Palo Alto Research Centre (PARC) who created a system to gather location
data from special ID badges worn by each person. The collection points throughout
the campus would then feed the location information into a central computer. The
information in this system represented an accurate picture of where Xerox's PARC
employees were at all times. The system, once deployed, faced two major challenges:
identifying useful applications (follow-me phone, employee locator, and ad-hoc
meeting planner were proposed) and the objections of some employees who
4 Position, Location and Navigation Symposium 2004 (PLANS 2004)

participated in the study to having their every move tracked and recorded (the big-
brother effect). The project produced a few patents but no commercial outcomes [11].

                          Fig. 1. Bat tag and infrastructure grid.

Research during the late 90’s at AT&T Research lab in Cambridge, UK saw the
development of a location-aware system called the Active Bat system [12]. This
system consists of a controller, a fixed node receiver infrastructure and a number of
active bat tags, as shown in Figure 1. The system operates using a combination of, RF
and ultrasound time-of-flight to estimate each tags location. Each tag emits a series of
ultrasonic pulses ( P1, P2, P3, P4 …) directed to a matrix of receiving nodes mounted on
the ceiling in each room, as shown in Figure 1. The system collects the           time
at which each receiver measures the pulses ( P1, P2 , P3, P4 …) and, based on the speed
of the sound waves, determines the location at times (t1, t2, t3, t4…). Although
sensitive to the inter-node placement and requiring a large receiver node
infrastructure, the system can achieve sub-10cm accuracy. The largest test-bed
developed consisted of 720 receivers and 6 radio cells covering an area of
approximately 1000 m2 on three floors. In practice the system was able to determine
the positions of up to 75 objects per second while being accurate to approximately
3cm in three dimensions [18].
The Cricket system from MIT uses a combination of RF and ultrasound technologies
allowing a small “listener” device, which can be carried or attached to equipment, to
estimate its distance to the closet beacon [19]. The infrastructure is based on a
number of non-networked ceiling-mounted beacons fixed throughout a building. The
beacons transmit an RF pulse to a device called a listener. Each listener, upon receipt
of the first few RF bits from the beacon, turns on its ultrasonic receiver to listen for
the upcoming ultrasonic pulse and location data. Based on the measured time
difference between the first RF signal and the ultrasonic signal, the cricket device can
determine the distance to the beacon.
The benefits of the approach employed in the Cricket system include:
    •    decentralised scalability with no grid of ceiling sensors
    •    mobile listeners performing the timing and location computation functions
    •    user-privacy and low cost.
BlueStar, a privacy centric location aware system.   5

However the drawback is that the special purpose listeners, decentralized architecture,
and receiver side computation place a significant power burden on each listener.
The RADAR system from Microsoft Research is an RF in-building user location and
tracking system using 802.11b wireless LAN technology [10]. This approach, which
is analogous to efforts in the Merino System [24] and Aura, uses the signal strength to
measure the distance between each Access Point (AP) and the mobile terminal. These
distances, in conjunction with an estimated signal propagation model or one obtained
from a site survey is used to compute the 2D position by trialateration. Such systems
typically operate with a sub-5m accuracy.
Table 2 (adapted from [16]) shows, in brief, the range of location technologies with
the corresponding location model and identifier employed.

                    Table 1. Location technologies and location model.
    Technology        Location Space       Location Identifier      Model
    Active Bat        Set of sensors       Sensor identifier        Symbolic
    GPS               Coordinate           Coordinate tuple         Geometric
                      system
    ruserd (unix)     Set of terminals     IP address               Symbolic
    GSM Cell-ID       Set of location      MSC/VLR address          Symbolic
                      areas
    Typical Radar     Coordinate           Coordinate tuple         Geometric
                      system

3. Bluestar

BlueStar aims to build a system using scaleable indoor and outdoor location
management schemes. Here the goal is to allow only the end user to be aware of their
accurate location while indoors, akin to the Cricket system, rather than a system such
as the Active Bat, which tracks the user.
In BlueStar the end-user can provide or publish, on varying levels of granularity, their
location details for information or group services. Much of the existing research in
this area has focused on improving the accuracy of either the network positioning or
indoor location tracking, rather than addressing the need for a scalable user-centric
end-to-end solution. Further, many indoor tracking systems rely on special purpose
receivers (badges) and transmitters in conjunction with a costly site “radio survey”.
The accuracy of the location computation is then typically a function of the resolution
of the radio survey.
6 Position, Location and Navigation Symposium 2004 (PLANS 2004)

3.1 Typical Application Scenarios

The application scenarios in BlueStar are centred on people moving from outdoor
environments into confined indoor or localised situations. These indoor situations
may require the provision of both fine-grained maps in conjunction with location
dependent data.
Typical application scenarios include a large multi-storey shopping centre located in a
metropolitan area and a large sporting complex such as Olympic park outside of
Sydney, Australia.
In the shopping centre scenario: A user invokes their BlueStar application on their
Bluetooth enabled smart phone as they approach a large metropolitan shopping
centre. This invocation causes the application to send a network query for a map of
the local area (in SVG format) and information about wireless devices in that area,
including their identities, positions relative to the map, and associated data such as the
names of associated shops. Once the handset-resident application sniffs one of these
wireless devices, it places the user on the map and displays (either visually or aurally)
the data associated with that wireless device. The application may then request more
refined data relating to its newly identified location from the network. This pattern of
interaction continues, with the handset application determining its own position by
sensing wireless nodes, and then using this to position the user on an appropriate map
and to push location dependant meta-data such as shopping offers, specials, lists and
catalogues to the user. To ensure the user’s privacy the number of network
interactions should be small to ensure the user’s exact location and the network
cannot determine shopping patterns. This requires that each request return coarse-
grained pieces of data.
In the Olympic park scenario, a user in the park invokes the BlueStar application and
wireless devices within the buildings of the park act as beacons. The application
proceeds to download a detailed park map, along with information about wireless
access points, and daily information about events, opening times, booking details, and
historical information about the Olympics of 2000. As the user moves from venue to
venue more appropriate mapping and data is displayed.

3.2 Deducing Location

In BlueStar the indoor location information is deduced by handset/PDA-resident
(mobile terminal) applications, which combine two sources of information:
    •    Details about the local wireless infrastructure, which are provided based on
         system knowledge of the user’s approximate location from the GSM network
         positioning system.
    •    Evidence from passive sniffing of existing wireless infrastructure (Bluetooth
         or 802.11b) or low-cost beacons.
The novel aspect of this system is that it combines network based geographic
positioning with local symbolic location information obtained using sniffed
information from existing wireless networks in the indoor locations. It allows only
the end user to be aware of their accurate location, since the network is only used to
determine their location to a very low resolution.
BlueStar, a privacy centric location aware system.   7

The drawbacks of many of the existing location-aware systems described in section 2
include:
    •    the requirement for special purpose expensive infrastructure,
    •    the requirement for special purpose tags or locator devices,
    •    the need to authenticate or formally introduce transmitter and receiver,
    •    user privacy is compromised because the system keeps track of each
         receiver, and
    •    system development is focussed on improving location accuracy.
Our approach addresses the major privacy issue by keeping the high-resolution
location information under the user’s local control. The more privacy someone
wants, the more abstract or redundant data that must be delivered to ensure the system
cannot deduce where the person is. Further, by including a network-centric approach
to the delivery of the mapping, local information and local wireless network
information, the proposed system can be deployed and tested on a large scale.
The primary research component is to develop a scalable delivery and data encoding
mechanism for both the location mapping and location-tied data. The primary
development component of this project is to integrate the approximate network
location technologies currently available with the low-cost localised location-
awareness. Typically, the handset-resident application will query the GSM network
for its approximate location, which will then trigger the delivery of high level
mapping, local information and existing local wireless network information, which
we refer to as MIW (Mapping, Information, Wireless) data.
The local wireless network information delivered will allow the application to
perform a number of tasks: the ability to position the end-user on a venue specific
map, the ability to deliver data when in particular regions of the venue, and the ability
to ask the GSM network for more localised MIW data. This refinement approach
ensures the user’s privacy as the GSM network isn’t being tasked with keeping track
of individuals on a micro level. Here the handset-resident application keeps track of
the user’s location and only queries the GSM network for macro information. Our
approach to location-awareness addresses both scalability and privacy concerns.

3.3 System Architecture

The architecture consists of a number of server-side components with which the
BlueStar server communicates. The handset-resident application transmits to only the
BlueStar server across a GPRS connection. Once the handset-resident location
module makes its initial inquiry, the BlueStar server contacts the location gateway
(typically a GSM mobile positioning centre (MPC)) to determine the handset’s
approximate location. This approximate location is used to query the information
gateway, the wireless infrastructure gateway, and for a map-based application, the
mapping gateway. Rather requiring the handset-resident application to cache all
mapping data and wireless details for all possible locations, utilising the approximate
location measurement allows BlueStar to extract a smaller portion of the world model
for delivery to the handset-resident application. This portion of the world model is
still large enough to ensure the system cannot micro-locate the end user.
8 Position, Location and Navigation Symposium 2004 (PLANS 2004)

The information consists of enough data for the handset-resident application to locate
itself within the indoor setting. Along with this, an amount of SVG data is transmitted
which allows the mapping application to render a high-level view of the area. Once
the handset-resident application sniffs a wireless device of which it knows the
location, it places the user on the map and then uses that location to request more
refined data from the network. This pattern of interaction continues, with the handset
application determining its own position and then using this to locate the user on an
appropriate map and to push location-dependent data such as shopping offers,
specials, lists and catalogues.
We have developed a range of adaptor and battery based low-cost Bluetooth beacons
that provide no data access functionality but instead act as discoverable Bluetooth
devices. These simplified devices require no network connectivity and have been built
into the form factor of an electrical plug, car cigarette lighter socket or even light
bulb.

4. Hybrid Intelligent Environment Application: Adhocracy

Although not providing a full context-aware system, BlueStar consists of many of the
features common to client-server intelligent environments (IE). Broadly speaking, IEs
can be broken into three classes defined as Client-Server, Peer-to-Peer and Hybrid.
The Client-Server model involves fixed infrastructure providing services to mobile
devices, such as a BlueStar system. The Peer-Peer model involves no fixed
infrastructure. All storage and computation is intrinsic to the mobile devices that
communicate without centralised coordination.
The Hybrid model simply combines the two. e.g. communication between mobile
devices may be Peer-to-Peer but devices may use a service from the infrastructure to
initiate the communication. The BlueStar system, without the mapping or information
data can be considered a hybrid model. In this way the handset-resident BlueStar
module determines its location but receives application data only with other devices
in the vicinity (rather than from the BlueStar server in our current implementation).
An adhocracy is a style of IE that allows the storage of location-relevant information
in such a way that it cannot be controlled or censored by a minority of individuals.
This is achieved by storing the information not in centrally administered servers but
across a multitude of mobile devices, using concepts similar to robust distributed file
systems such as Freenet [1].
 The core concept is democratisation of information by keeping it in a physical
location without any fixed storage infrastructure, unlike the basic BlueStar model.
The implications of this concept are several, but a primary use of adhocracy is
envisioned to be the tagging of physical locations without the possibility of
censorship. Since there are no centralised servers storing the information, it cannot be
easily modified or removed.
Building a location-based ad hoc information storage service requires at least two
major elements: a way of determining mobile devices' locations, and a way of storing
information.
Since the concept of location itself is fundamentally fixed, some sort of fixed
infrastructure is highly desirable to determine a mobile device's location. Wi-Fi
BlueStar, a privacy centric location aware system.     9

triangulation, GPS and BlueStar beacons are some examples of fixed infrastructure
that could be used either individually or in concert. (These technologies, though often
controlled by individual corporations in practice would not be involved in the actual
storage of information in an adhocracy.) Various sensor data could be combined or
fused to improve the accuracy of the location estimate. In fact, the actual method of
determining location is relatively unimportant, providing it can be transformed to
some canonical representation suitable for the system. In contrast to the problem of
physical location determination, storing information in an adhocracy does not
necessarily require any fixed infrastructure, only an identifier tying it to a particular
location.
A sample scenario of an adhocracy involves a shop that sells inferior products. After
several customers have discovered this fact for themselves, they may like to leave a
piece of “digital graffiti” on the shop-front informing other adhocracy users. Since the
graffiti is stored on the devices that pass through the area near the shop, there is no
way for the shop owner to censor the opinions. However they may be able to jam or
spam the location with irrelevant information, which is an issue worthy of attention.
The adhocracy concept is a Hybrid IE. It relies on fixed infrastructure, such as
BlueStar, to help mobile devices determine their locations but information in the
system is stored across the mobile devices themselves.

5. Conclusions

Our research and development for BlueStar continues as location-aware services are
slated to be the “killer application” for the next generation of mobile phones which
incorporate large displays, more memory and substantially more processing power
and battery. Along with the natural evolution of mobile phones there is now a
confluence of PDA and mobile functionality into more powerful and flexible
computing devices with “always on” capabilities.
The drive by telecommunication operators to distinguish their products in the fiercely
competitive mobile service sector may see the investment in location-aware services
explode. By focusing on an end-to-end and privacy-centric approach to location-
awareness the techniques and methods developed in this project can be readily
deployed by a telecommunications provider.
Finally, as experience in the Japanese market has shown, commercial partners such as
large business, banks, and services firms are often willing to use mobile application
technology in the provision of customised information for their customers. In a
similar manner, the mapping and data for a citywide BlueStar application, including
museum, shopping centres, government offices and commercial centres may be paid
for by a combination of commercial sponsorship and low-cost end-user pricing.

6. References
  [1]   Clarke, I., Sandberg, O., Wiley, B. and Hong, T.W., “Freenet: A Distributed Anonymous
        Information Storage and Retrieval System”.
10 Position, Location and Navigation Symposium 2004 (PLANS 2004)

  [2]    Salber, D., Dey, A. K., Orr, R. J., and Abowd, G. D. “The Context Toolkit: aiding the
         development of context-enabled applications”. In Proceedings of the 1999 Conference on Human
         Factors in Computing Systems, pages 434-441, Pittsburgh, PA.
  [3]    Andreas Butz, Jorg Baus, Antonio Kruger, “Different Views on Location-Awareness”, Technical
         Report University of Saarbrucken.
  [4]    Elliot D. Caplan, “Understanding GPS: Principles and Applications”, Artech House, Boston, 1996
  [5]    George W. Fitzmaurice. “Situated information spaces and spatially aware palmtop computers”.
         CACM, 36(7):38–49, July 1993.
  [6]    M. van Steen, F. J. Hauck, G. Ballintijn, and A. S. Tanenbaum. “Algorithmic Design of the Globe
         Wide-Area Location Service”. The Computer Journal, 41(5):297–310, 1998.
  [7]    Mark Weiser and John Seeley Brown. 1997. “The Coming Age of Calm Technology”. In Beyond
         Calculation: The Next Fifty Years of Computing. Peter J. Denning and Robert M.Metcalfe (eds).
         Springer Verlag. 75-85.
  [8]    Joseph F. McCarthy, Eric S. Meidel, “ACTIVEMAP: A Visualization Tool for Location-
         Awareness to Support Informal Interactions”, Proceedings of the International Symposium on
         Handheld and Ubiquitous Computing (HUC ’99)
  [9]    Mike Spreitzer and Marvin Theimer. 1993. “Providing Location Information in a Ubiquitous
         Computing Environment”. In Proceedings of the 14th ACM Symposium on Operating Systems
         Principles (SIGOPS ’93). 270-283.
  [10]   P. Bahl, N. Padmanabhan: “RADAR: An In-Building RF-based User Location and Tracking
         System”, in Proceedings of IEEE INFOCOM 2000, Vol. 2, Tel-Aviv, Israel (March 2000
  [11]   Pountain, Dick, "Track People with Active Badges", BYTE, Dec. 1993, pp. 57,58,62,64.
  [12]   R. Want, A. Hopper, V. Falcao and J. Gibbons, "The Active Badge Location System”, ACM
         Transactions on Information Systems, pp. 91-102, Jan. 1992.
  [13]   Schmidt et al.; "Advanced Interaction in Context"; Lecture Notes in Science 1707, Sep. 1999. pp.
         89-101.
  [14]   Spreitzer, M. and M. Theimer, "Providing Location Information in a Ubiquitous Computing
         Environment'', Proc. 14th Symposium on Operating System Principles, ACM Press, December
         1993, pages 270-283.
  [15]   “Ultrasonic Location System”, The Oliveti & Oracle Research Laboratory, Oct. 16, 1998.
  [16]   Ulf Leonhardt, “Supporting Location-Awareness in Open Distributed Systems”, PhD thesis,
         Department of Computing, Imperial College of Science, Technology and Medicine, University of
         London, May 1998.
  [17]   Want, Roy, et al., "Active Badges And Personal Interactive Computing Objects", IEEE
         Transactions, Feb. 1992, pp. 10-20.
  [18]   Ward, A. Jones and A. Hopper, "A New Location Technique for the Active Office", IEEE
         Personal Communications, vol. 4, No. 5, pp. 42-47, Oct. 1997.
  [19]   N. Priyantha, A. Chakraborthy and H. Balakrishnan, “The Cricket Location-Support System”,
         Proceedings of International Conference on Mobile Computing and Networking, pp. 32-43,
         August 6-11, 2000, Boston, MA
  [20]   N. Bulusu, J. Heidemann and D. Estrin, “GPS-less Low Cost Outdoor Localization For Very
         Small Devices”, IEEE Personal Communications Magazine, Special Issue on Networking the
         Physical World, August 2000.
  [21]   G.M. Djuknic and R.E. Richton. “Geolocation and assisted GPS”. IEEE Computer, pages 123–
         125, February 2001.
  [22]   M. W. Kadous and C. Sammut, “Mobile Conversational Characters”, Workshop on Virtual
         Conversational Characters, Human Factors Conference, Melbourne Australia 2002.
  [23]   Andy Harter, Andy Hopper, Pete Steggles, Andy Ward, and PaulWebster. “The anatomy of a
         context-aware application”. In MOBICOM 1999, pages 59–68, August 1999.
  [24]   Bob Kummerfeld, Aaron Quigley, Chris Johnson, Rene Hexel, “Merino:Towards an intelligent
         environment architecture for multi-granularity context description”, Workshop on User Modeling
         for Ubiquitous Computing, UM June 2003 Pittsburgh, USA.
  [25]   Schmidt, A. and Beigl, M. “There is more to context than location” Environment sensing
         technologies for adaptive mobile user interfaces, 1998.
You can also read