TOP
Search the Dagstuhl Website
Looking for information on the websites of the individual seminars? - Then please:
Not found what you are looking for? - Some of our services have separate websites, each with its own search option. Please check the following list:
Schloss Dagstuhl - LZI - Logo
Schloss Dagstuhl Services
Seminars
Within this website:
External resources:
  • DOOR (for registering your stay at Dagstuhl)
  • DOSA (for proposing future Dagstuhl Seminars or Dagstuhl Perspectives Workshops)
Publishing
Within this website:
External resources:
dblp
Within this website:
External resources:
  • the dblp Computer Science Bibliography


Dagstuhl Seminar 04441

Mobile Information Management

( Oct 24 – Oct 29, 2004 )

(Click in the middle of the image to enlarge)

Permalink
Please use the following short url to reference this page: https://www.dagstuhl.de/04441

Organizers



Summary

From October, 25th until 29th, 2004, a Dagstuhl seminar on mobile information management took place. The seminar was attended by 34 researchers from Europe and North America with backgrounds ranging from database systems, mobile information systems, geographic information systems and business informatics to wireless networks and security.

The motivation for organizing this seminar was as follows: The combination of wireless and wired connectivity along with increasingly small and powerful mobile devices, such as laptops, personal digital assistants, handheld/tablet PCs, and smart phones, but also embedded devices and sensors, enables a wide range of new applications and new ways to use existing applications. This will radically change the way information is managed and processed today. Information becomes ubiquitous, highly distributed and at the same time accessible from everywhere at any time. Information access takes place in highly dynamic and instable networks. Nevertheless, users and application developers will expect information processing to continue under similar guarantees as those offered by todays stationary and more or less centralized systems, even if some nodes of the ubiquitous information network are (temporarily) disconnected and/or are in motion. Examples for these guarantees are the ones given by database management systems, i.e. consistency and durability of data. Additional challenges stem from the fact that mobile devices while evolving fast, are (and will always be) less powerful than their stationary counterparts; they are smaller (resulting, e.g., in smaller in- and output devices and less available storage), have restricted energy supplies and communicate via expensive, unreliable wireless communication media and require new solutions to major existing security problems.

The goal of the seminar was to bring together researchers, especially from the area of databases and information systems, to identify open problems and new challenges in data, service, and user management in mobile information processing environments. We were particularly interested to provide a forum for discussing the consequences of the mobility of users and devices on today's and future data management systems. The first aim of these discussions was to clearly identify these consequences. The second and more challenging aim was to determine where existing solutions can be applied, where mobility raises truly new challenges, and which of these challenges are there to last. Of course, these discussions were to take into consideration not only general solutions from the database community at large, but also the approaches that have been developed by the mobile databases community over the last decade, e.g.:

  • Moving objects and mobile users
  • Mobile data dissemination and delivery
  • Mobile data replication and synchronization
  • Discovery and composition of mobile services
  • Mobility awareness and adaptability
  • Location-dependent, context-based querying and optimization
  • Designing location-aware, context-aware services
  • Mobile sensor and stream data management
  • Continuous querying
  • Self-organizing, self-tuning mobile components
  • Ad-hoc processes and networks
  • Mobile transactional processing
  • Quality of Service for mobile databases
  • Low power cryptography and other cryptographic solutions designed for wireless networks
  • Methods of identifying, authenticating, and safely integrating mobile devices into a network

The discussions in this seminar were supposed to result in the identification of promising avenues of research that should be pursued in order to address the new issues that are introduced by mobility.

In order to achieve the goals mentioned above and in particular to foster discussions, the seminar was organized along two main lines: First, a number of overview talks were given. A brief summary can be found in Section 2. Second, a considerable amount of time was spent working in smaller groups of five to fifteen participants. Here, a number of topics were looked into more detail, research challenges and open issues were identified, avenues for future research were looked for. A summary of the working group activities is contained in Section 3.

Working Groups

During the seminar, most of the work was done in working groups. We had two sets of three working groups each. Each group got together for about a day, working on a more (or in one case: less) specific topic. Working group sizes ranged from five to fifteen participants. Working group sessions were concluded by a presentation of the results to the plenum.

The following working groups met. Again, more detailed descriptions of the individual working groups can be found elsewhere in these proceedings:

WG1: Mobile Business . This working group tried to get a better understanding of the key players in mobile business, how powerful they are and what their relationships are. A clear understanding of this system is necessary to enable successful development and deployment of mobile applications.

WG2: Mobile Transactions . The group looked at different scenarios in which mobile transactions are needed, ranging from infrastructure-based networks to ad-hoc networks. Despite the large amount of work that has been done on mobile transactions in the past, a number of challenging research questions remain to be addressed, in particular with respect to networks with little or no infrastructure.

WG3: Mobile Queries . After classifying different kinds of mobile queries and identifying the different dimensions that make mobile query processing so challenging, the working group concentrated on the role of context to ease dealing with mobile queries. There, a number of open research questions were highlighted.

WG4: Mobile Application Design . This working group started with the question "Why is the development of mobile applications harder than that of "normal" software?" In an attempt to answer this question, a number of mobile application scenarios and common experiences with the development were collected. It became evident that mobile application design requires to take a high number of dimensions, most of which are somewhat interrelated into account simultaneously. The group drew up an initial list of these dimensions.

WG5: MANETs, P2P and Self-Organization. This working group addressed a rather broad set of questions. After identifying similarities and differences between the three classes of systems regarded, the group concentrated on identifying open research issues in all three areas.

WG6: Description and Matching of Services in Mobile Environments. The working group classified services in mobile environments along two dimensions: The mobility or non-mobility of the service provider and the location-dependence or independence of the service offered. They suggest that this classification shouldbe reflected in the service description. Therefore, they developed an initial idea how service descriptions should be structured to be suitable in mobile environments: Descriptions should be split into a static part (containing the regular service description) and a dynamic part (describing the current context of the service provider). Depending on the class of service, the dynamic part will be more or less complex and important. Analogously, service requests should be split into several parts. Again, depending on the class of offer and request, different algorithms for matching of offers and requests need to be used. While there was general agreement that the idea seemed plausible, its realization will require considerable research effort.

Results of the Seminar

Mobile information management is a topic that is of immense and growing interest to a number of communities. It seems important to bring these communities together to ensure the development of appropriate solutions. While the databases community certainly is strong in questions of mobile information management and has a lot of solutions to o®er, input from other researchers is needed: For instance, security issues are neglected in a frightening way in today's mobile applications and in particular in research prototypes. If we want these developments to enter the mass market, this needs to change. Research is often carried out without knowledge about or focus on existing business models etc. This, too, obviously, hampers market success.

A second result of the seminar was the identification of a number of promising avenues of research. These were discussed in more detail in the working groups (see above or in the individual working group reports). should we summarize these here once again?

Mobile information management is clearly an area of growing importance, and the research community should focus greater attention on providing the kinds of systems and services required to allow the field to reach its potential for creating new industries and improving people's lives. Mobility is not just an add on, but brings with it challenges that are different enough from more traditional system to warrant dedicated research.

Also, research on mobile data management offers a solid foundation for work on peer-to-peer and self-organizing systems and ultimately for ubiquitous computing. Again, this indicates the importance of this research area.


Participants
  • Susanne Boll (Universität Oldenburg, DE) [dblp]
  • Joos-Hendrik Böse (FU Berlin, DE) [dblp]
  • Stefan Böttcher (Universität Paderborn, DE) [dblp]
  • Martin Breunig (Hochschule Vechta, DE)
  • Nigel Davies (Lancaster University, GB) [dblp]
  • Adrian Friday (Lancaster University, GB) [dblp]
  • Le Gruenwald (University of Oklahoma - Norman, US)
  • Johannes Grünbauer (TU München, DE)
  • Manfred Hauswirth (EPFL - Lausanne, CH) [dblp]
  • Christian S. Jensen (Aalborg University, DK) [dblp]
  • Michael Klein (KIT - Karlsruher Institut für Technologie, DE)
  • Georgia Koloniari (University of Ioannina, GR)
  • Birgitta König-Ries (Universität Jena, DE) [dblp]
  • Franz Lehner (Universität Passau, DE)
  • Wolfgang Lehner (TU Dresden, DE) [dblp]
  • Rainer Malaka (HITS gGmbH - Heidelberg, DE)
  • Pedro Jose Marrón (Universität Stuttgart, DE)
  • Florian Matthes (TU München, DE) [dblp]
  • Philipp Obreiter (KIT - Karlsruher Institut für Technologie, DE)
  • Christos Panayiotou (University of Cyprus, CY)
  • Evaggelia Pitoura (University of Ioannina, GR) [dblp]
  • Key Pousttchi (Universität Augsburg, DE) [dblp]
  • Peter Reiher (UCLA, US)
  • Simonas Saltenis (Aalborg University, DK)
  • George Samaras (University of Cyprus, CY)
  • Kai-Uwe Sattler (TU Ilmenau, DE) [dblp]
  • Thomas Schwarz (Universität Stuttgart, DE)
  • Frank Seliger (IBM Deutschland - Böblingen, DE)
  • Günther Specht (Universität Ulm, DE)
  • Can Türker (ETH Zürich, CH)
  • Klaus Turowski (Universität Augsburg, DE)
  • Jari Veijalainen (University of Jyväskylä, FI)
  • Ouri E. Wolfson (University of Illinois - Chicago, US) [dblp]
  • André Zeitz (Universität Rostock, DE)