Invisible computing: automatically using the many bits of data we create

  title={Invisible computing: automatically using the many bits of data we create},
  author={Gaetano Borriello},
  journal={Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences},
  pages={3669 - 3683}
  • G. Borriello
  • Published 28 October 2008
  • Computer Science
  • Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences
As we go about our work and our daily lives, we leave a trail of bits behind. Every electronic device we interact with can keep a record of our actions. Even the devices themselves can keep track of their location and radio interactions, even without user involvement. The challenge of invisible computing is to make this wealth of data useful. This paper presents two examples of what has come to be known as ‘invisible computing’, namely, devices recording, distilling and rendering these many… 

Figures from this paper

Wearables in the wet lab: a laboratory system for capturing and guiding experiments

This paper motivates the need for a wearable hands-free system, and introduces the specific design to guide experimenters, and explores the use of gesture recognition for enabling the system to track where the user might be in the experiment.

RFID-based compound identification in wet laboratories with google glass

This paper presents a system for the implicit tracking of RFID-augmented containers with a wrist-worn reader unit, and a voice-interaction scheme based on a head-mounted display.

Sentient Computing meets Social Networking

The aim in this position paper is to identify this intersection between services enabled by ubiquitous computing technologies and applications offered to social networks as a fruitful topic for discussion, provide references to a few examples of relevant research and offer thoughts on lessons learnt and challenges for the future.

Measuring spatial and temporal features of physical interaction dynamics in the workplace

This thesis proves that the data obtained through the technology can be converted in rich information on some aspects of workplace interaction dynamics offering unprecedented insights for designers and managers to produce better buildings and better organisations.

Gamified Self: Factors Influencing Self-Tracking Technology Acceptance

An online survey was conducted and results indicate that perceptions of ease of use and enjoyment of tracking tools are less influential to technology acceptance than perceptions of usefulness.


This issue contains papers from the Royal Society Discussion Meeting entitled ‘From computers to ubiquitous computing, by 2020’, designed to increase awareness of the challenge, its key scientific issues and benefits and risks to society.

How Privacy Affects the Acceptance of Mobile Payment solutions

The model empirically validates privacy concerns and investigates its antecedents and predictive power to explain the intention to use MP systems to be the first to establish an APCO-model for the field of MP, thereby filling an essential research gap.


The rising need of mobility and convenience in payment processes has even forced traditional banking institutions to establish mobile payment (MP) applications in Germany. However, the breakthrough

Revisiting APCO

The APCO framework will help practitioners and scholars to bring different privacy-related aspects of a product to their attention and suggests how these aspects can interrelate.

Chapter 3 Revisiting APCO

The APCO framework will help practitioners and scholars to bring different privacy-related aspects of a product to their attention and suggests how these aspects can interrelate.



Pervasive Computing Goes the Last 100 Feet with RFID Systems

1536-1268/03/$17.00 © 2003 IEEE ■ Published by the IEEE CS and IEEE ComSoc PERVASIVEcomputing 9 W hat if networked computers were as cheap as paper clips and could be attached to things as easily as

Reminding About Tagged Objects Using Passive RFIDs

A system that generates reminders about objects left behind by tagging those objects with passive RFID tags, which leads to a practical and scalable approach in terms of system architecture and user experience as well as being more amenable to maintaining user privacy than previous approaches.

Physical Access Control for Captured RFID Data

This work investigates peer-to-peer privacy for personal RFID data through an access-control policy called Physical Access Control, which protects privacy by constraining the data a user can obtain from the system to those events that occurred when and where that user was physically present.

Cascadia: A System for Specifying, Detecting, and Managing RFID Events

Cascadia copes with ambiguous RFID data and limitations in an RFID deployment by transforming RFID readings into probabilistic events, and it is shown that this approach outperforms deterministic event detection techniques while avoiding the need to specify and train sophisticated models.

The invisible computer

The invisible computer to review, not just read, however likewise download them or perhaps read online, in the sorts of txt, zip, kindle, word, ppt, pdf, and rar.

Implementing a Sentient Computing System

An enhanced version of AT&T Laboratories Cambridge's sentient computing system, which uses sensors to update a model of the real world, is installed throughout an office building.

Microbiology Tray and Pipette Tracking as a Proactive Tangible User Interface

This work uses a camera and projector setup over a lab bench, vision techniques allow a specially marked well tray and pipette to be located in real time with enough precision to determine which well the pipette tip is over.

Systems Support for Ubiquitous Computing: A Case Study of Two Implementations of Labscape

This work analyzes Labscape in terms of the system properties that are required to provide a fluid user experience, and presents, in detail, the concepts embodied in, a runtime system designed specifically to support ubiquitous applications.

Event queries on correlated probabilistic streams

This paper proposes Lahar1, an event processing system for probabilistic event streams that yields a much higher recall and precision than deterministic techniques operating over only the most probable tuples by using a novel static analysis and novel algorithms.