skip to main content
10.1145/1378600.1378631acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Cascadia: A System for Specifying, Detecting, and Managing RFID Events

Published:17 June 2008Publication History

ABSTRACT

Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw RFID data. Cascadia provides three important services. First, it allows application developers and even users to specify events using either a declarative query language or an intuitive visual language based on direct manipulation. Second, it provides an API that facilitates the development of applications which rely on RFID-based events. Third, it automatically detects the specified events, forwards them to registered applications and stores them for later use (e.g., for historical queries).

We present the design and implementation of Cascadia along with an evaluation that includes both a user study and measurements on traces collected in a building-wide RFID deployment. To demonstrate how Cascadia facilitates application development, we built a simple digital diary application in the form of a calendar that populates itself with RFID-based events. Cascadia copes with ambiguous RFID data and limitations in an RFID deployment by transforming RFID readings into probabilistic events. We show that this approach outperforms deterministic event detection techniques while avoiding the need to specify and train sophisticated models.

References

  1. Adaikkalavan, R. and Chakravarthy, S. SnoopIB: Interval-based event specification and detection for active databases. In Proc. of ADBIS 2003 Conf., Sept. 2003.]]Google ScholarGoogle ScholarCross RefCross Ref
  2. Addlesee, M. et al. Implementing a sentient computing system. IEEE Computer, 34(8):50--56, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bacon, J. et al. Event Storage and Federation using ODMG. In In Proc. of POS9, pages 265--281, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Barbara, D. et al. The management of probabilistic data. IEEE Trans. Knowl. Data Eng., 4(5):487--502, Oct. 1992.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bardram, J. E. The Java Context Awareness Framework (JCAF) - A service infrastructure and programming framework for context-aware applications. Proc. of the 3rd Pervasive Conf., pages 98--115, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Chakravarthy, S. et al. Composite events for active databases: Semantics, contexts and detection. In Proc. of the 20th VLDB Conf., Sept. 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Chen, G. and Kotz, D. Context Aggregation and Dissemination in Ubiquitous Computing Systems. In Proc. of WMCSA 2002, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Cormode, G. and Garofalakis, M. Sketching probabilistic data streams. In Proc. of the 2007 SIGMOD Conf., June 2007.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Dalvi, N. and Suciu, D. Efficient query evaluation on probabilistic databases. In Proc. of the 30th VLDB Conf., Sept. 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Dalvi, N. et al. Query evaluation on probabilistic databases. IEEE Data Engineering Bulletin, 29(1):25--31, 2006.]]Google ScholarGoogle Scholar
  11. Dekhtyar, A. et al. Probabilistic temporal databases, I: algebra. ACM TODS, 26(1):41--95, March 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Demers, A. et al. Towards expressive publish/subscribe systems. In Proc. of the 10th EDBT Conf., 2006.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Deshpande, A. and Madden, S. MauveDB: Supporting Model-based User Views in Database Systems. In Proc. of the 2006 SIGMOD Conf., pages 73--84, 2006.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Dey, A. et al. Distributed mediation of ambiguous context in aware environments. In Proc. of the UIST 2002 Conf, pages 121--130, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Dey A. K., et al. a CAPpella: Programming by Demonstration of Context-Aware Applications. In Proc. of CHI 2004 Conf., volume 1, pages 33--40, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. EPCGlobal application level events specification. http://www.epcglobalinc.org/standards/ale, 2005.]]Google ScholarGoogle Scholar
  17. Floerkemeier, C. and Lampe, M. Issues with RFID usage in ubiquitous computing applications. In Proc. of the 2nd Pervasive Conf., Apr. 2004.]]Google ScholarGoogle ScholarCross RefCross Ref
  18. Fox, D. et al. Bayesian filtering for location estimation. IEEE Pervasive Computing, 2(3):24--33, July-September 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Franklin, M. J. et. al. Design considerations for high fan-in systems: The hifi approach. In Proc. of the 2nd CIDR Conf., Jan. 2005.]]Google ScholarGoogle Scholar
  20. Garofalakis, M. N. et. al. Probabilistic Data Management for Pervasive Computing: The Data Furnace Project. IEEE Data Eng. Bull, 29(1):57--63, 2006.]]Google ScholarGoogle Scholar
  21. Gehani, N. H. et al. Composite event specification in active databases: Model & implementation. In Proc. of the 18th VLDB Conf., Aug. 1992.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Gonzalez, H. et al. Warehousing and analyzing massive RFID data sets. In Proc. of the 22nd ICDE Conf., Apr. 2006.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Google. Google Calendar APIs and Tools. http://code.google.com/apis/calendar, 2007.]]Google ScholarGoogle Scholar
  24. Green, T. J. and Tannen, V. Models for incomplete and probabilistic information. IEEE Data Engineering Bulletin, 29(1):17--24, March 2006.]]Google ScholarGoogle Scholar
  25. B. e. a. Hartmann. Authoring Sensor-Based Interactions by Demonstration with Direct Manipulation and Pattern Recognition. In Proc. of CHI 2007 Conf., pages 145--154, 2007.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Heer, J. et al. liquid: Context-Aware Distributed Queries. In Ubicomp 2003, volume 2864, pages 140--148, 2003.]]Google ScholarGoogle ScholarCross RefCross Ref
  27. Hightower, J. et al. Learning and Recognizing the Places We Go. In Ubicomp 2005, volume 3660, pages 159--176, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Hong, J. and Landay, J. A. An Architecture for Privacy-Sensitive Ubiquitous Computing. In Proc. of the 2nd MobiSys Conf., 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Hu, Y. et al. Supporting RFID-based item tracking applications in Oracle DBMS using a bitmap datatype. In Proc. of the 31st VLDB Conf., Sept. 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Jayram, T. S. et al. Efficient aggregation algorithms for probabilistic data. In ACM-SIAM Symposium on Discrete Algorithms, Jan. 2007.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Jayram, T. S. et al. Estimating statistical aggregates on probabilistic data streams. In Proc. of the 26th PODS Conf., June 2007.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Jeffery, S. et. al. Declarative support for sensor data cleaning. In Proc. of the 4th Pervasive Conf., Mar. 2006.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Jeffery, S. R. et al. Adaptive cleaning for RFID data streams. In Proc. of the 32nd VLDB Conf., Sept. 2006.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Jin, Y. and Strom. Relational subscription middleware for Internet-scale publish-subscribe. In Proc of 2nd DEBS Workshop, June 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Johanson, B. and Fox, A. The Event Heap: A Coordination Infrastructure for Interactive Workspaces. In WMCSA, pages 83--93, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Kanagal, B. and Deshpande, A. Online filtering, smoothing and probabilistic modeling of streaming data. Technical Report CS-TR-4867, University of Maryland, May 2007.]]Google ScholarGoogle Scholar
  37. Khoussainova, N. et al. Towards correcting input data errors probabilistically using integrity constraints. In Proc. of Fifth MobiDE Workshop, June 2006.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Khoussainova, N. et al. PEEX: Extracting Probabilistic Events from RFID Data. Technical Report UW-CSE-07-11-02, University of Washington, CSE, Nov. 2007.]]Google ScholarGoogle Scholar
  39. Khoussainova, N. et al. Probabilistic Event Extraction from RFID Data (poster). In Proc. of the 24th ICDE Conf., Apr. 2008.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Kriplean, T. et. al. Physical access control for captured RFID data. IEEE Pervasive Computing, 6(4), Nov. 2007.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Lamming, M. and Bohm, D. SPECs: Another Approach to Human Context and Activity Sensing Research, Using Tiny Peer-to-Peer Wireless Computers. In Ubicomp 2003, pages 192--199, 2003.]]Google ScholarGoogle ScholarCross RefCross Ref
  42. McCarthy, J. F. and Anagnost, T. D. EVENTMANAGER: Support for the Peripheral Awareness of Events. In HUC, volume 1927, pages 227--235, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Oracle sensor edge server. http://www.oracle.com/technology/products/.]]Google ScholarGoogle Scholar
  44. Pascoe, J. The Stick-e Note Architecture: Extending the Interface Beyond the User. In Proc. of 1997 IUI Conf., pages 261--264, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Patterson, D. J. et al. Inferring high-level behavior from low-level sensors. In Proc. of the 5th Ubicomp Conf., Oct. 2003.]]Google ScholarGoogle Scholar
  46. Philipose, M. et al. Inferring activities from interactions with objects. IEEE Pervasive Computing, 3(4), 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Pietzuch, P. R. and Bacon, J. Hermes: A Distributed Event-Based Middleware Architecture. In ICDCS Workshops, pages 611--618. IEEE Computer Society, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Rao, J. et al. A deferred cleansing method for RFID data analytics. In Proc. of the 32nd VLDB Conf., Sept. 2006.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Rastogi, V. et. al. Authorization Views for Pervasive Sensor Networks. In UbiPriv 2007, Sept. 2007.]]Google ScholarGoogle Scholar
  50. RFID Journal. Hospital gets ultra-wideband RFID. http://www.rfidjournal.com/article/view/1088/1/1, Aug. 2004.]]Google ScholarGoogle Scholar
  51. Rizvi et. al. Events on the edge. In Proc. of the 2005 SIGMOD Conf., June 2005. (System demonstration).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Roman, M. et al. Gaia: a middleware platform for active spaces. Mobile Computing and Communications Review, 6(4):65--67, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Salber, D. et al. The Context Toolkit: Aiding the Development of Context-Enabled Applications. In Proc. of CHI 1999 Conf., pages 434--441, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Sousa, J. P. and Garlan, D. Aura: an Architectural Framework for User Mobility in Ubiquitous Computing Environments. In WICSA, volume 224, pages 29--43, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. University of Washington. RFID Ecosystem. http://rfid.cs.washington.edu/.]]Google ScholarGoogle Scholar
  56. Wang, F. and Liu, P. Temporal management of RFID data. In Proc. of the 31st VLDB Conf., Sept. 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Want, R. et. al. An overview of the PARCTAB ubiquitous computing experiment. IEEE Personal Communications, 2(6):28--33, Dec 1995.]]Google ScholarGoogle ScholarCross RefCross Ref
  58. Welbourne, E. et. al. Challenges for Pervasive RFID-based Infrastructures. In PERTEC 2007, Mar. 2007.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Widom, J. Trio: A system for integrated management of data, accuracy, and lineage. In Proc. of the 2nd CIDR Conf., pages 262--276, Jan. 2005.]]Google ScholarGoogle Scholar
  60. Wu, E. et al. High-performance complex event processing over streams. In Proc. of the 2006 SIGMOD Conf., June 2006.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Cascadia: A System for Specifying, Detecting, and Managing RFID Events

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobiSys '08: Proceedings of the 6th international conference on Mobile systems, applications, and services
        June 2008
        304 pages
        ISBN:9781605581392
        DOI:10.1145/1378600

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 17 June 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate274of1,679submissions,16%

        Upcoming Conference

        MOBISYS '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader