Summer School is over

Have a look at the photos to get an impression of how exciting is was :-) Michael Frey and Stefan Grösbrink are the winners of the programming contest. Congrats!

Program online!

The program of the school is online (still subject to changes)!

Participants list online!

The list of participants is online... see who's going to be around!

Current Page: Program


Sunday July 24th

15.00 - 20.00 Arrival of participants and registration
20.00 Reception

Monday July 25th

7.30 -  8.45 Breakfast
8.45 -  9.00 Welcome (Kay Roemer, Friedemann Mattern, Luca Mottola)
9.00 - 10.30 Participatory Sensing (Mark Hansen) - undefinedSlides
10.30 - 11.00 Coffee break
11.00 - 12.30 Mobile Social Cloud Computing To Enable Next-Generation Context-Aware Applications (Rick Han) - undefinedSlides
12.30 - 14.00 Lunch
14.00 - 15.30 Embedded Interaction (Marc Langheinrich) - undefinedSlides
15.30 - 16.00 Coffee break
16.00 - 17.30 Designing Digital Artifacts: Understanding Interaction with Smart Objects (Lars Erik Holmquist) - undefinedSlides
19.30 - 22.00 Dinner (restaurant)

Tuesday July 26th

7.30 -  9.00 Breakfast
9.00 - 10.30 Contiki COOJA Hands-on Crash Course (Thiemo Voigt) - undefinedSlides, undefinedHandouts
10.30 - 11.00 Coffee break
11.00 - 12.30 Contiki COOJA Hands-on Crash Course (Thiemo Voigt)
12.30 - 14.00 Lunch
14.00 - 15.30 Contiki COOJA Hands-on Crash Course (Thiemo Voigt)
15.30 - 15.45 Programming Contest: Introduction (Luca Mottola)
15.45 - 16.15 Coffee break
16.15 - 18.00 Programming Contest: Lab Session (Luca Mottola and Thiemo Voigt) - undefinedSlides
19.30 - 20.30 Dinner

Wednesday July 27th

7.30 -  8.45 Breakfast
8.45 -  9.00 Programming Contest: Checkpoint (Luca Mottola)
9.00 - 10.30 Participants workshop I (Christoph Beck - undefinedSlidesKevin O Mahony - undefinedSlides, Jonas Michel - undefinedSlidesLinda Onnasch - undefinedSlidesMarco Pasch - undefinedSlidesChristoph Stahl - undefinedSlides)

10.30 - 11.00 Coffee break
11.00 - 12.30 Participants workshop II (Benedikt Ostermaier, Prabhakar Venkata, Reinholds Zviedris - undefinedSlidesDavid Boyle - undefinedSlidesTeemu Leppänen  - undefinedSlidesEhsan Warriach - undefinedSlides
12.30 - 14.00 Lunch
14.00 - 23.00 Excursion and dinner (restaurant)

Thursday July 28th

7.30 -  9.00 Breakfast
9.00 - 10.30 Machine Learning for Wireless Sensor Networks: Learning from the Environment and from Users (Anna Förster) - undefinedSlides
10.30 - 11.00 Coffee break
11.00 - 12.30 Sensors, People, Animals and Robots (Peter Corke) - undefinedSlides
12.30 - 14.00 Lunch
14.00 - 15.30 Wireless Sensor Networks Deployments: From Research to the Real-World---and Back (Gian Pietro Picco) - undefinedSlides
15.30 - 16.00 Coffee break
16.00 - 17.30 Haptic Interaction in Human-human and Human-robot Dyads (Angelika Peer) - undefinedSlides
19.30 - 20.30 Dinner

Friday July 29th

7.30 -  9.00 Breakfast
9.00 - 10.30 Debugging Networked Embedded Systems (Kay Roemer) - undefinedSlides
10.30 - 11.00 Coffee break
11.00 - 12.30 Bullet-proof Software Development for Networked Embedded Systems: Dream or (Future) Reality? (Luca Mottola) - Slides (undefinedpdf, prezi)
12.30 - 14.00 Lunch
14.00 - 15.30 Computers and Privacy (Marc Langheinrich) - undefinedSlides
15.30 - 16.00 Coffee break
16.00 - 17.30 Physical-Layer Security for Embedded Wireless Networks (Srdjan Capkun) - undefinedSlides
19.30 - 22.00 Dinner (restaurant)

Saturday July 30th

7.30 -  9.00 Breakfast
9.00 - 10.30 Smart Energy (Friedemann Mattern) - undefinedSlides
10.30 - 11.00 Coffee break
11.00 - 12.30 Wireless Health: Opportunities and Challenges for Wireless Sensor Networks (Andreas Terzis) - undefinedSlides
12.30 - 12.45 Closing of the School, Results and Winners of the Programming Contest (Kay Roemer, Friedemann Mattern, Luca Mottola)
12.45 - 14.00 Lunch
14.00 Departure

Lecture Abstracts

More information on the speakers are available at the speakers page.

Physical-Layer Security for Embedded Wireless Networks 
(90 min, Srdjan Capkun)

Abstract: This talk is concerned with the impact of the physical layer and physical locations on the security of wireless networks and their applications. We specifically discuss the problems of secure location verification, secure time synchronization and jamming-resistant communication.

Sensors, People, Animals and Robots 
(90 min, Peter Corke)

Abstract: The talk will use real-world case studies to ground discussion on topics such as design, implementation, operations and security of cyberphysical systems. The case studies include distributed sensing and actuation to control the movement of cattle in the landscape, and the creation of systems that comprise sensors, robots and people.

Machine Learning for Wireless Sensor Networks: Learning from the Environment and from Users 
(90 min, Anna Förster)

Abstract: Machine Learning enables wireless sensor networks to interact actively with their environment and users and to optimize their behavior during run-time. Two general approaches exist: pre-deployment learning and runtime learning. In the first case, already widely used in WSNs, the network is optimized before deployment by analyzing user or environmental data for better parameter fitting or pattern learning. For example, the mobility patterns of users can be learnt to predict where to deliver data in the network. The second application assumes that the network is deployed in its targeted environment with little information about it and is able to adapt to it in a continuous manner to better meet the users requirements. For example, it can analyze the occurring events in the environment to optimize its sleep behavior and thus minimize energy consumption. In this tutorial we will explore various ML techniques and will learn about their advantages and costs and how they can be efficiently applied to WSN applications and communication protocols. We will explore both approaches, pre-deployment and runtime learning, with a special emphasis on the second one. We will explore several real world WSN applications with machine learning step by step.

Mobile Social Cloud Computing To Enable Next-Generation Context-Aware Applications
(90 min, Rick Han)

Abstract: This talk will investigate how intersecting three emerging powerful trends - mobile computing, social networks, and cloud computing - can create a rich new world of context-aware computing.  We will discuss what kinds of infrastructure will likely be necessary to enable a new generation of mobile social applications backed by a context-aware cloud, including services both within and on top of IaaS clouds.  A chief concern in such a richly contextual world is the tradeoff between personalization and privacy, so that new privacy services will be needed to protect multi-dimensional user data streams generated by mobile smartphones, wireless sensor networks, and social networks.

Participatory Sensing 
(90 min, Mark Hansen)

Abstract: Participatory sensing is an approach to data collection and interpretation in which individuals, acting alone or in groups, use their personal mobile devices, possibly coupled with various webservices, to systematically explore aspects of their worlds, ranging from personal/community health and environmental monitoring to civic engagement and cultural expression. The real potential of PS can be found in the 3 billion mobile phone owners worldwide, who are carrying increasingly feature- and sensor- rich handsets, and have access to an ever-expanding wireless, cloud-connected infrastructure. In this lecture, I will discuss participatory research practices that have inspired PS, illustrate the concept with real-world deployments (or, in the language of PS, “data campaigns”), and attempt to distill some design strategies and research challenges. Along the way, we will examine an emerging set of tools that support PS, from data collection frameworks and campaign configuration languages to group interpretation platforms. We will also consider the research questions posed by this work for computer scientists, statisticians and various "domain scientists" who want to apply these tools. From recruitment and participant engagement to privacy and effective models for data sharing, there is a lot of work to do!

Designing Digital Artifacts: Understanding Interaction with Smart Objects 
(90 min, Lars Erik Holmquist)

Abstract: Digital artifact are man-made object that rely on computation to perform their function. From having been expensive and limited to specific settings (like the office computer), digital artifacts are now everywhere and integrated in everyday situations. This has created a whole new class of products, which are different from traditional, non-digital products. I will present a number of digital artifacts that have been designed in my research group, going back almost 15 years, including artifacts for information visualization, personal communication, supporting creativity, and more. Through this history we can derive some important lessons about designing digital artifacts.

Embedded Interaction 
(90 min, Marc Langheinrich)

Abstract: Future scenarios of smart environments often envision a world where we don't have to laboriously login to a computer, call up a program, and fiddle with some mouse cursor to make things happen. Instead, some omnipresent background assistance continuously observes and analyzes our actions and activity, and then magically "does-the-right-thing" for us. In this talk, I want to introduce the basic principles of interaction, and then discuss the issues that we will face when interacting with such "invisible computers". Will it make our lives better? Or will this only increase our frustrations?

Computers and Privacy 
(90 min, Marc Langheinrich)

Abstract: The issue of privacy quickly rears its ugly head once we start deploying sensor networks, cyber-physical systems, and cooperating objects into your daily lives, which have the potential to continuously and often intimately monitor us. Interestingly enough, the public at large seems strangely ambivalent about such trends: While novel technology developments such as RFID or wearable computing are often accompanied by highly critical press coverage, consumers seem equally eager to disclose ever more parts of their lives in exchange for lower prices, better service, and more security. What is it about privacy that we can be both highly emotional and almost indifferent about? In this talk, I want to discuss the principle of "privacy": where it comes from, what it means, and how computers in general - and networked embedded systems in particular - affect it. I will thus not only try to briefly explain the most common technical approaches and challenges to privacy protection, but also attempt to offer a view of the larger picture of privacy: the social values behind it, the public policy strategies surrounding it, and the legal realities governing our privacy today.

Smart Energy 
(90 min, Friedemann Mattern)

Abstract: Information and communication technology (ICT) consumes energy, but is also an important means of conserving energy. In fact, it is expected that ICT will play a critical role in supporting the upcoming paradigm shifts within the energy sector towards more sustainable generation and use of electricity. However, beyond improving the ways energy is generated, distributed, and used, ICT can also play a vital role in supporting and motivating consumers to make better decisions when pursuing energy intense activities. Pivotal for that are "smart" technologies (such as wireless sensors or Web-ready devices) that can help to reduce the growing levels of energy consumption, for example in the domestic sector. The lecture will provide some background information on global energy supply and demand, elaborate on the role ICT plays as a consumer of electricity, describe how a smart grid and smart metering can change electricity supply and usage, and outline how smart ICT can help people to save energy.

Bullet-proof Software Development for Networked Embedded Systems: Dream or (Future) Reality? 
(90 min, Luca Mottola)

Abstract: The next computing revolution is about to happen. We are going to equip people and everyday objects with networked embedded devices capable of sensing from individuals and the surrounding context, and of acting on the environment to accomplish a complex high-level goal. However, current software development techniques for networked embedded systems are largely based on trail-and-error. As a result, deploying networked embedded applications is currently a time-consuming, painful task that unfolds in a huge design space. This practice cannot be sustained in the long term. In this talk, we will discuss how we can remedy the situation, identify the ideal complements to current programming and debugging techniques, e.g., in the area of automated software verification, and point out the challenges to make existing and prospective solutions work effectively.

Haptic Interaction in Human-human and Human-robot Dyads 
(90 min, Angelika Peer)

Abstract: In the past, working spaces of humans and robots were strictly separated, but recent developments have sought to bring robots into closer interaction with humans. Beside verbal and nonverbal communication, especially physical (haptic) interaction is challenging because of the bilateral signal and energy exchange and the mutual adaptation between partners. Typical application areas range from rehabilitation, robot walking helpers, motor skill learning, and service robots to social interaction. Starting from passive robots implementing variable admittances, moving over to active robots that implement human-like trajectories and finally robots that switch between different roles, this talk will emphasize typical challenges faced in designing robotic systems that stay in close interaction with humans.

Wireless Sensor Networks Deployments: From Research to the Real-World---and Back 
(90 min, Gian Pietro Picco)

Abstract: Wireless sensor networks (WSNs) have been around for more than a decade. Although the research community has become increasingly aware of the importance of real-world deployments, however, the latter represent a tiny fraction of the literature on WSNs. Moreover, of these few real-world experiences, those reporting about long-term, operational systems are themselves a small fraction of the total. In this talk, I will present past and ongoing research from my research group (, revolving around real-world WSN deployments targeting real needs. These include: the long-term structural health monitoring of a medieval tower; the closed-loop control of adaptive lighting in an operational road tunnel; the understanding of social behavior of wildlife. In these experiences, we started by applying pre-existing results and tools. However, the real world is often more creative than researchers, and it pushed our research agenda in unexpected directions. The talk gives a brief account of the research roller-coaster we experienced in the last few years.

Debugging Networked Embedded Systems 
(90 min, Kay Roemer)

Abstract: Networked embedded sensing systems are typically exposed to a hostile and unpredictable environment, often leading to failures despite extensive pre-deployment validation in testbeds. Once deployed, these systems are hard to debug due to limited acccess to the deployment site and due to constrained system resources. This talk will survey typical failures encountered, look at fundamental techniques to debug them, and discuss concrete debugging systems that have been developed.

Wireless Health: Opportunities and Challenges for Wireless Sensor Networks 
(90 min, Andreas Terzis)

Abstract: Driven by the confluence between the need to collect data about people's physical, physiological, psychological, cognitive, and behavioral processes in spaces ranging from personal to urban and the recent availability of the technologies that enable this data collection, wireless sensor networks for healthcare have emerged in the recent years. In this talk I will present some representative applications in the healthcare domain and describe the challenges they introduce to wireless sensor networks due to the required level of trustworthiness and the need to ensure the privacy and security of medical data. These challenges are exacerbated by the resource scarcity that is inherent with wireless sensor network platforms. I will also outline prototype systems spanning application domains from physiological and activity monitoring to large-scale physiological and behavioral studies and emphasize ongoing research challenges.

Contiki COOJA Hands-on Crash Course 
(one day, Thiemo Voigt)

Abstract: In this crash course, we will will present the Contiki operating system, Europe's leading operating system for tiny embedded sensor systems. The course starts with some background on Contiki. After that, the participants will through practical exercises learn and experiment with some of the cool Contiki features. We will also introduce the simulators MSPSim and COOJA.

Participant talk: Low Duty Cycle Inter-implant Communication of the Artificial Accommodation System
(Christoph Beck)

Accommodation is the ability of the human eye to maintain a clear image on objects at varying distances. To restore accommodation for persons suffering from cataract or presbyopia, a novel micro-mechatronic implant – the Artificial Accommodation System – is being developed. For determining the current object distance in the Artificial Accommodation System, sensor data have to be exchanged wirelessly between the left and right eye at a rate of 10 Hz. In this talk, guidelines for preserving the implant's battery life by minimizing the radio’s duty cycle will be presented. Special focus will be on the appropriate implementation of a two-way synchronization protocol.


Participant talk: Gestural Control Management Systems for Smart Objects and Environments
(Kevin O Mahony)

Access to digital information from sensor networks is traditionally confined to common computer interfaces and interaction paradigms. As everyday objects within our environments become embedded with new forms of sensing/actuation capability, the interfaces by which we interact to control and monitor interesting information will require more intuitive interaction paradigms than currently existing HCI paradigms. In this presentation I will introduce of some of my research and development projects, which have focused on integrating novel HCI systems and paradigms with smart objects. I will give an overview of a Sensor Information Interactive System (SIIS) that presents sensor information collected from a smart object (Table) with a multi-touch screen interface. This system aims to exploit the interaction capabilities of multi-touch technologies by supporting more efficient activities and presentation with digital sensor information, making it more accessible and meaningful. The system is validated with both 2-D and 3-D applications to demonstrate the effectiveness and flexibility of multi-touch interactions and usability of the multi-touch interface for engaging with real-time sensor information attained from our smart object. 

Participant talk: Gander: A Distributed Search Engine for Personalized Networked Spaces
(Jonas Michel)

Personalized Networked Spaces (PNets) are networked embedded systems comprising devices carried and used by humans, sensors, and actuators integrated with the environment. These spaces demand support for fluid connectivity to information, services, and other people. PNet applications exhibit spatiotemporal demands in which resource and information access is personalized and focused on the here and now. Our understanding of search in the Internet is well-grounded, and PNets demand similar capabilities to discover, learn, and access information from the immediate surroundings. However, PNets' tight integration of the user and application with the environment demands a reevaluation of the requirements of search and of the infrastructure that supports it. In this talk I will introduce Gander, a personalized search engine for the here and now that brings in-network processing to bear on expressive and efficient PNet search without reliance on the Internet. To explore these new requirements, with the goal of capturing how search expectations are affected by direct interaction with the environment, I will present myGander, a prototype iPhone application that enables simple searches in a live PNet.


Participant talk: The Impact of Trust on Man-Computer Interaction
(Linda Onnasch)

Trust is a concept commonly involved when dealing with man-computer interaction. Especially in complex systems like process control, users have no longer the ability to understand the underlying processes, hence their trust in the system becomes one of the behavior determining factors. An inappropriate level of trust can result in disuse of control systems when trust is too low. Distrusting behavior can therefore lead to an inefficient performance. On the contrary, when overtrusting automated systems users may get out of the loop and are no longer able to intervene when necessary. Therefore, I would like to talk about the development of trust and what should already be considered in the design process to support an appropriate user’s level of trust into automated complex systems.


Participant talk: Recognizing bodily expression of affect
(Marco Pasch)

In human-computer interaction scenarios where task completion is not central anymore, but replaced by maybe more difficult to define criteria such as providing users with a good experience, we find ourselves in need of tools to assess these experiences. I will discuss planned research in using affective feedback from body movement and posture to recognize affective states of video gamers.


Participant talk: Pervasive Social Connectedness
(Christoph Stahl)

Our globalized world expects a high degree of mobility from students and employees regarding international experience and assignments in company locations abroad. Whereas many people enjoy these opportunities, leaving home also implies interrupting social connections to friends, partners, and the family. Most people use their computers to stay in contact during the day via VOIP and social networks, which leads to a highly PC-centered lifestyle. Current research projects have designed prototypes of connected artifacts that provide awareness and the chance to enjoy everyday life activities over a distance. Awareness systems sense activity in remote locations and indicate it through ambient displays, aiming towards the sensation of virtual presence. Other systems synchronize the state of a pair of devices in order to support their joint use over a distance. Examples comprise desk lamps that indicate the partner’s presence, TV sets that show the same channel, games such as a split air-hockey table, and even pillows that indicate the partner’s presence for a better sleeping experience. Our own research project “Synchronized Realities” aims to extend the Universal Remote Console (URC) standard by a synchronization module to ease the coupling of devices. We also investigate application scenarios for synchronized objects for the elderly in our ambient assisted living lab BAALL. 


Participant talk: Connecting Things to the Web using Programmable Low-power WiFi Modules
(Benedikt Ostermaier)

In this talk, I present first experiences of using programmable low-power WiFi modules for connecting things directly to the Web. Instead of relying on dedicated low-power radio technology and specialized protocols, we leverage the ubiquity of IEEE 802.11 access points and the interoperability of the HTTP protocol. Our experimental results show that low-power WiFi modules can achieve long battery lifetime despite the fact that we are using HTTP over TCP/IP for communication.

Participant talk: Smart Applications for Energy Harvested WSNs
(Prabhakar Venkata)

A Wireless Sensor Network (WSN) powered using harvested energies is limited in its operation by instantaneous power. Since energy availability can be different across nodes in the network, network setup and collaboration is a non trivial task. At the same time, in the event of excess energy, exciting node collaboration possibilities exist; often not feasible with battery driven sensor networks. Operations such as sensing, computation, storage and communication are required to achieve the common goal for any sensor network. We design and implement a smart application that uses a Decision Engine, and morphs itself into an energy matched application. The results are based on measurements using IRIS motes running on solar energy. We have done away with batteries; instead used low leakage super capacitors to store harvested energy. The Decision Engine utilizes two pieces of data to provide its recommendations. Firstly, a history based energy prediction model assists the engine with information about in-coming energy. The second input is the energy cost database for operations. The energy driven Decision Engine calculates the energy budgets and recommends the best possible set of operations. We then extend this basic idea to a distributed smart application for energy harvested WSNs. In this network, nodes use realistic solar energy traces with a three year seasonality database. With this data, network nodes predict future energy inflow. The Mac and Routing protocol layers in each node are modified to suit energy harvesting capability available at each node. At the Mac layer, the Low Power Listen mechanism is modified to suit the available energy. High energy nodes provide the benefit of early replies to wake up packets from neighbors. Thus virtual energy transfer between nodes is facilitated. Similarly, AoDVJr protocol is modified to support energy as the specific metric of choice. We propose and implement “RSSI Faking” as a mechanism to support energy and channel state information to source nodes. The base station assumes the responsibility to decide the best route for a source node; not necessarily the shortest path. In contrast to popular energy based scheduling algorithms, we implement a smart application, capable of modifying itself to suit its own as well as its parent node's energy level. The modification of the smart application is governed by a set of policies which constitute the application. Experimental results are presented.

Participant talk: Wild Animal Monitoring using Sensor Networks
(Reinholds Zviedris)

Monitoring wild animals, especially those that are becoming endangered (for example, lynxes and wolves) is important for biology researchers. Solutions for the monitoring already exist; however, they all have drawbacks, such as limited range or lifetime, sensing modality, reporting delays, unreliability of operation. In my talk I will describe our experiences in designing an improved animal monitoring sensor system and low-level software for sensor node control and communication. The target animals for this particular research are wild lynxes or canines, however it can be extended to other animal species. The LynxNet system is based on tracking collars, built around custom designed sensor nodes, sensors, GPS, 150 MHz and 433MHz radio, and stationary base stations, placed at the locations that are frequented by the animals.

Participant talk: Sustainable and Persistent Wireless Sensor Network enabled Structural Health Monitoring
(David Boyle)

The GENESI (Green sEnsor Networks for Structural monItoring) project has the ambitious goal of delivering sustainable, long lasting, reliable, wireless sensor network (WSN) based solutions for structural health monitoring (SHM). Off-the-shelf sensors, known and trusted in the SHM community, are to be interfaced with wireless sensor “motes”, powered by smart hybrid power solutions (encompassing intelligence, energy harvesting, fuel cell and storage technologies), to provide real time information relating to the “health” of a range of potential SHM application scenarios. An overview of the emergent functional requirements (hardware, software, network, integration, QoS, in-network intelligence and functionality, etc.) of a successful target system will be presented, in addition to preliminary prototype implementation, results and work in progress.

Participant talk: Urban Computing Research in Oulu, Finland
(Teemu Leppänen)

In this talk we describe briefly the ubiquitous computing infrastructure in the city of Oulu, Finland. Also our research projects about smart and interactive spaces are presented. The ubiquitous infrastructure includes citywide free public WLAN access points, interactive public displays installed in the city streets, panOULU Bluetooth network and panOULU wireless sensor network (WSN). Then we describe in more detail the panOULU WSN architecture and our ideas contributing towards Web of Things. An example application utilizing the WSN, a home energy consumption monitoring system, is finally presented.

Participant talk: Interoperation, Composition and Simulation of Services at Home
(Ehsan Warriach)

Pervasive computing environments such as our future homes are the prototypical example of a dynamic, complex system where Service-Oriented Computing techniques will play an important role. A home equipped with heterogeneous devices, whose services and location constantly change, needs to behave as a coherent system supporting its inhabitants. In this talk, I would like to present a fully implemented architecture for domotic applications which uses the concept of a service as its fundamental abstraction. The architecture distinguishes between a pervasive layer where devices and their basic internetworking live, and a composition layer where services can be dynamically composed as a reaction to user desires or home events. Next to the architecture, we also illustrate a visualization and simulation environment to test home coordination scenarios. From the technical point of view, the implementation uses UPnP as the basic device connection protocol and techniques from Artificial Intelligence planning for composing services at runtime.