ABSTRACT
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw RFID data. Cascadia provides three important services. First, it allows application developers and even users to specify events using either a declarative query language or an intuitive visual language based on direct manipulation. Second, it provides an API that facilitates the development of applications which rely on RFID-based events. Third, it automatically detects the specified events, forwards them to registered applications and stores them for later use (e.g., for historical queries).
We present the design and implementation of Cascadia along with an evaluation that includes both a user study and measurements on traces collected in a building-wide RFID deployment. To demonstrate how Cascadia facilitates application development, we built a simple digital diary application in the form of a calendar that populates itself with RFID-based events. Cascadia copes with ambiguous RFID data and limitations in an RFID deployment by transforming RFID readings into probabilistic events. We show that this approach outperforms deterministic event detection techniques while avoiding the need to specify and train sophisticated models.
- Adaikkalavan, R. and Chakravarthy, S. SnoopIB: Interval-based event specification and detection for active databases. In Proc. of ADBIS 2003 Conf., Sept. 2003.]]Google ScholarCross Ref
- Addlesee, M. et al. Implementing a sentient computing system. IEEE Computer, 34(8):50--56, 2001.]] Google ScholarDigital Library
- Bacon, J. et al. Event Storage and Federation using ODMG. In In Proc. of POS9, pages 265--281, 2000.]] Google ScholarDigital Library
- Barbara, D. et al. The management of probabilistic data. IEEE Trans. Knowl. Data Eng., 4(5):487--502, Oct. 1992.]] Google ScholarDigital Library
- Bardram, J. E. The Java Context Awareness Framework (JCAF) - A service infrastructure and programming framework for context-aware applications. Proc. of the 3rd Pervasive Conf., pages 98--115, 2005.]] Google ScholarDigital Library
- Chakravarthy, S. et al. Composite events for active databases: Semantics, contexts and detection. In Proc. of the 20th VLDB Conf., Sept. 1994.]] Google ScholarDigital Library
- Chen, G. and Kotz, D. Context Aggregation and Dissemination in Ubiquitous Computing Systems. In Proc. of WMCSA 2002, 2002.]] Google ScholarDigital Library
- Cormode, G. and Garofalakis, M. Sketching probabilistic data streams. In Proc. of the 2007 SIGMOD Conf., June 2007.]] Google ScholarDigital Library
- Dalvi, N. and Suciu, D. Efficient query evaluation on probabilistic databases. In Proc. of the 30th VLDB Conf., Sept. 2004.]] Google ScholarDigital Library
- Dalvi, N. et al. Query evaluation on probabilistic databases. IEEE Data Engineering Bulletin, 29(1):25--31, 2006.]]Google Scholar
- Dekhtyar, A. et al. Probabilistic temporal databases, I: algebra. ACM TODS, 26(1):41--95, March 2001.]] Google ScholarDigital Library
- Demers, A. et al. Towards expressive publish/subscribe systems. In Proc. of the 10th EDBT Conf., 2006.]] Google ScholarDigital Library
- Deshpande, A. and Madden, S. MauveDB: Supporting Model-based User Views in Database Systems. In Proc. of the 2006 SIGMOD Conf., pages 73--84, 2006.]] Google ScholarDigital Library
- Dey, A. et al. Distributed mediation of ambiguous context in aware environments. In Proc. of the UIST 2002 Conf, pages 121--130, 2002.]] Google ScholarDigital Library
- Dey A. K., et al. a CAPpella: Programming by Demonstration of Context-Aware Applications. In Proc. of CHI 2004 Conf., volume 1, pages 33--40, 2004.]] Google ScholarDigital Library
- EPCGlobal application level events specification. http://www.epcglobalinc.org/standards/ale, 2005.]]Google Scholar
- Floerkemeier, C. and Lampe, M. Issues with RFID usage in ubiquitous computing applications. In Proc. of the 2nd Pervasive Conf., Apr. 2004.]]Google ScholarCross Ref
- Fox, D. et al. Bayesian filtering for location estimation. IEEE Pervasive Computing, 2(3):24--33, July-September 2003.]] Google ScholarDigital Library
- Franklin, M. J. et. al. Design considerations for high fan-in systems: The hifi approach. In Proc. of the 2nd CIDR Conf., Jan. 2005.]]Google Scholar
- Garofalakis, M. N. et. al. Probabilistic Data Management for Pervasive Computing: The Data Furnace Project. IEEE Data Eng. Bull, 29(1):57--63, 2006.]]Google Scholar
- Gehani, N. H. et al. Composite event specification in active databases: Model & implementation. In Proc. of the 18th VLDB Conf., Aug. 1992.]] Google ScholarDigital Library
- Gonzalez, H. et al. Warehousing and analyzing massive RFID data sets. In Proc. of the 22nd ICDE Conf., Apr. 2006.]] Google ScholarDigital Library
- Google. Google Calendar APIs and Tools. http://code.google.com/apis/calendar, 2007.]]Google Scholar
- Green, T. J. and Tannen, V. Models for incomplete and probabilistic information. IEEE Data Engineering Bulletin, 29(1):17--24, March 2006.]]Google Scholar
- B. e. a. Hartmann. Authoring Sensor-Based Interactions by Demonstration with Direct Manipulation and Pattern Recognition. In Proc. of CHI 2007 Conf., pages 145--154, 2007.]] Google ScholarDigital Library
- Heer, J. et al. liquid: Context-Aware Distributed Queries. In Ubicomp 2003, volume 2864, pages 140--148, 2003.]]Google ScholarCross Ref
- Hightower, J. et al. Learning and Recognizing the Places We Go. In Ubicomp 2005, volume 3660, pages 159--176, 2005.]] Google ScholarDigital Library
- Hong, J. and Landay, J. A. An Architecture for Privacy-Sensitive Ubiquitous Computing. In Proc. of the 2nd MobiSys Conf., 2004.]] Google ScholarDigital Library
- Hu, Y. et al. Supporting RFID-based item tracking applications in Oracle DBMS using a bitmap datatype. In Proc. of the 31st VLDB Conf., Sept. 2005.]] Google ScholarDigital Library
- Jayram, T. S. et al. Efficient aggregation algorithms for probabilistic data. In ACM-SIAM Symposium on Discrete Algorithms, Jan. 2007.]] Google ScholarDigital Library
- Jayram, T. S. et al. Estimating statistical aggregates on probabilistic data streams. In Proc. of the 26th PODS Conf., June 2007.]] Google ScholarDigital Library
- Jeffery, S. et. al. Declarative support for sensor data cleaning. In Proc. of the 4th Pervasive Conf., Mar. 2006.]] Google ScholarDigital Library
- Jeffery, S. R. et al. Adaptive cleaning for RFID data streams. In Proc. of the 32nd VLDB Conf., Sept. 2006.]] Google ScholarDigital Library
- Jin, Y. and Strom. Relational subscription middleware for Internet-scale publish-subscribe. In Proc of 2nd DEBS Workshop, June 2003.]] Google ScholarDigital Library
- Johanson, B. and Fox, A. The Event Heap: A Coordination Infrastructure for Interactive Workspaces. In WMCSA, pages 83--93, 2002.]] Google ScholarDigital Library
- Kanagal, B. and Deshpande, A. Online filtering, smoothing and probabilistic modeling of streaming data. Technical Report CS-TR-4867, University of Maryland, May 2007.]]Google Scholar
- Khoussainova, N. et al. Towards correcting input data errors probabilistically using integrity constraints. In Proc. of Fifth MobiDE Workshop, June 2006.]] Google ScholarDigital Library
- Khoussainova, N. et al. PEEX: Extracting Probabilistic Events from RFID Data. Technical Report UW-CSE-07-11-02, University of Washington, CSE, Nov. 2007.]]Google Scholar
- Khoussainova, N. et al. Probabilistic Event Extraction from RFID Data (poster). In Proc. of the 24th ICDE Conf., Apr. 2008.]] Google ScholarDigital Library
- Kriplean, T. et. al. Physical access control for captured RFID data. IEEE Pervasive Computing, 6(4), Nov. 2007.]] Google ScholarDigital Library
- Lamming, M. and Bohm, D. SPECs: Another Approach to Human Context and Activity Sensing Research, Using Tiny Peer-to-Peer Wireless Computers. In Ubicomp 2003, pages 192--199, 2003.]]Google ScholarCross Ref
- McCarthy, J. F. and Anagnost, T. D. EVENTMANAGER: Support for the Peripheral Awareness of Events. In HUC, volume 1927, pages 227--235, 2000.]] Google ScholarDigital Library
- Oracle sensor edge server. http://www.oracle.com/technology/products/.]]Google Scholar
- Pascoe, J. The Stick-e Note Architecture: Extending the Interface Beyond the User. In Proc. of 1997 IUI Conf., pages 261--264, 1997.]] Google ScholarDigital Library
- Patterson, D. J. et al. Inferring high-level behavior from low-level sensors. In Proc. of the 5th Ubicomp Conf., Oct. 2003.]]Google Scholar
- Philipose, M. et al. Inferring activities from interactions with objects. IEEE Pervasive Computing, 3(4), 2004.]] Google ScholarDigital Library
- Pietzuch, P. R. and Bacon, J. Hermes: A Distributed Event-Based Middleware Architecture. In ICDCS Workshops, pages 611--618. IEEE Computer Society, 2002.]] Google ScholarDigital Library
- Rao, J. et al. A deferred cleansing method for RFID data analytics. In Proc. of the 32nd VLDB Conf., Sept. 2006.]] Google ScholarDigital Library
- Rastogi, V. et. al. Authorization Views for Pervasive Sensor Networks. In UbiPriv 2007, Sept. 2007.]]Google Scholar
- RFID Journal. Hospital gets ultra-wideband RFID. http://www.rfidjournal.com/article/view/1088/1/1, Aug. 2004.]]Google Scholar
- Rizvi et. al. Events on the edge. In Proc. of the 2005 SIGMOD Conf., June 2005. (System demonstration).]] Google ScholarDigital Library
- Roman, M. et al. Gaia: a middleware platform for active spaces. Mobile Computing and Communications Review, 6(4):65--67, 2002.]] Google ScholarDigital Library
- Salber, D. et al. The Context Toolkit: Aiding the Development of Context-Enabled Applications. In Proc. of CHI 1999 Conf., pages 434--441, 1999.]] Google ScholarDigital Library
- Sousa, J. P. and Garlan, D. Aura: an Architectural Framework for User Mobility in Ubiquitous Computing Environments. In WICSA, volume 224, pages 29--43, 2002.]] Google ScholarDigital Library
- University of Washington. RFID Ecosystem. http://rfid.cs.washington.edu/.]]Google Scholar
- Wang, F. and Liu, P. Temporal management of RFID data. In Proc. of the 31st VLDB Conf., Sept. 2005.]] Google ScholarDigital Library
- Want, R. et. al. An overview of the PARCTAB ubiquitous computing experiment. IEEE Personal Communications, 2(6):28--33, Dec 1995.]]Google ScholarCross Ref
- Welbourne, E. et. al. Challenges for Pervasive RFID-based Infrastructures. In PERTEC 2007, Mar. 2007.]] Google ScholarDigital Library
- Widom, J. Trio: A system for integrated management of data, accuracy, and lineage. In Proc. of the 2nd CIDR Conf., pages 262--276, Jan. 2005.]]Google Scholar
- Wu, E. et al. High-performance complex event processing over streams. In Proc. of the 2006 SIGMOD Conf., June 2006.]] Google ScholarDigital Library
Index Terms
- Cascadia: A System for Specifying, Detecting, and Managing RFID Events
Recommendations
Physical Access Control for Captured RFID Data
RFID security is a vibrant research area, and many protection mechanisms against unauthorized RFID cloning and reading attacks are emerging. However, little work has yet addressed the complementary issue of privacy for RFID data after it has been ...
SnoopIB: interval-based event specification and detection for active databases
Detection-based semantics does not differentiate between event detection and event occurrence and has been used for detecting events in most of the active systems that support Event-Condition-Action rules. However, this is a limitation for many ...
A demonstration of Cascadia through a digital diary application
SIGMOD '08: Proceedings of the 2008 ACM SIGMOD international conference on Management of dataThe Cascadia system provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw RFID data. Cascadia allows application developers and even users to specify ...
Comments