throbber
ON
`l'x
`<1-
`
`Proceedings
`
`First international Workshop, LoCA 2005
`Oberpfaffenhofen, Germany, May 2005
`
`m m U 2_
`
`I
`
`Q Springer
`
`APPLE EXHIBIT 1013
`Page 1 of 63
`
`

`

`Lecture Notes in Computer Science
`Commenced Publication in 1973
`Founding and Former Series Editors:
`Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
`
`3479
`
`Editorial Board
`
`David Hutchison
`Lancaster University, UK
`Takeo Kanade
`Carnegie Mellon University, Pittsburgh, PA, USA
`Josef Kittler
`University of Surrey, Guildford, UK
`Jon M. Kleinberg
`Cornell University, Ithaca, NY, USA
`Friedemann Mattern
`ETH Zurich, Switzerland
`John C. Mitchell
`Stanford University, CA, USA
`Moni Naor
`Weizmann Institute of Science, Rehovot, Israel
`Oscar Nierstrasz
`University of Bern, Switzerland
`C. Pandu Rangan
`Indian Institute of Technology, Madras, India
`Bernhard Steffen
`University of Dortmund, Germany
`Madhu Sudan
`Massachusetts Institute of Technology, MA, USA
`Demetri Terzopoulos
`New York University, NY, USA
`Doug Tygar
`University of California, Berkeley, CA, USA
`Moshe Y. Vardi
`Rice University, Houston, TX, USA
`Gerhard Weikum
`Max-Planck Institute of Computer Science, Saarbruecken, Germany
`
`APPLE EXHIBIT 1013
`Page 2 of 63
`
`

`

`Thomas Strang Claudia Linnhoff-Popien (Eds.)
`
`Location- and
`Context-Awareness
`
`First International Workshop, LoCA 2005
`Oberpfaffenhofen, Germany, May 12-13, 2005
`Proceedings
`
`1 3
`
`APPLE EXHIBIT 1013
`Page 3 of 63
`
`

`

`Volume Editors
`
`Thomas Strang
`German Aerospace Center (DLR), Institute of Communications and Navigation
`82234 Wessling/Oberpfaffenhofen, Germany
`E-mail: thomas.strang@dlr.de
`
`Claudia Linnhoff-Popien
`University of Munich (LMU), Mobile and Distributed Systems Group
`Oettingenstr. 67, 80538 Munich, Germany
`E-mail: linnhoff@ifi.lmu.de
`
`Library of Congress Control Number: 2005925756
`
`CR Subject Classification (1998): H.3, H.4, C.2, H.5, K.8
`
`ISSN
`ISBN-10
`ISBN-13
`
`0302-9743
`3-540-25896-5 Springer Berlin Heidelberg New York
`978-3-540-25896-4 Springer Berlin Heidelberg New York
`
`This work is subject to copyright. All rights are reserved, whether the whole or part of the material is
`concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,
`reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication
`or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,
`in its current version, and permission for use must always be obtained from Springer. Violations are liable
`to prosecution under the German Copyright Law.
`
`Springer is a part of Springer Science+Business Media
`
`springeronline.com
`
`© Springer-Verlag Berlin Heidelberg 2005
`Printed in Germany
`
`Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India
`Printed on acid-free paper
`SPIN: 11426646
`06/3142
`5 4 3 2 1 0
`
`APPLE EXHIBIT 1013
`Page 4 of 63
`
`

`

`Preface
`
`Context-awareness is one of the drivers of the ubiquitous computing paradigm.
`Well-designed context modeling and context retrieval approaches are key pre-
`requisites in any context-aware system. Location is one of the primary aspects
`of all major context models — together with time, identity and activity. From
`the technical side, sensing, fusing and distributing location and other context
`information is as important as providing context-awareness to applications and
`services in pervasive systems.
`The material summarized in this volume was selected for the 1st International
`Workshop on Location- and Context-Awareness (LoCA 2005) held in coopera-
`tion with the 3rd International Conference on Pervasive Computing 2005. The
`workshop was organized by the Institute of Communications and Navigation of
`the German Aerospace Center (DLR) in Oberpfaffenhofen, and the Mobile and
`Distributed Systems Group of the University of Munich.
`During the workshop, novel positioning algorithms and location sensing tech-
`niques were discussed, comprising not only enhancements of singular systems,
`like positioning in GSM or WLAN, but also hybrid technologies, such as the
`integration of global satellite systems with inertial positioning. Furthermore, im-
`provements in sensor technology, as well as the integration and fusion of sensors,
`were addressed both on a theoretical and on an implementation level.
`Personal and confidential data, such as location data of users, have pro-
`found implications for personal information privacy. Thus privacy protection,
`privacy-oriented location-aware systems, and how privacy affects the feasibility
`and usefulness of systems were also addressed in the workshop.
`A total of 84 papers from 26 countries were submitted to LoCA 2005, from
`which 26 full and 7 short papers were selected for publication in the proceed-
`ings. The overall quality of the submissions was impressive, demonstrating the
`importance of this field. The Program Committee did an excellent job — all
`papers were reviewed by at least 3 referees, which left each member with up to
`18 papers to be reviewed within a very tight schedule.
`
`May 2005
`
`Thomas Strang
`Claudia Linnhoff-Popien
`
`APPLE EXHIBIT 1013
`Page 5 of 63
`
`

`

`Organization
`
`Program Committee
`
`Alessandro Acquisti
`Victor Bahl
`Christian Becker
`Anind K. Dey
`Thomas Engel
`Dieter Fensel
`Jens Grossklags
`Mike Hazas
`Jeffrey Hightower
`Jadwiga Indulska
`John Krumm
`Axel K¨upper
`Gerard Lachapelle
`Marc Langheinrich
`Claudia Linnhoff-Popien
`Jussi Myllymaki
`Harlan Onsrud
`Aaron Quigley
`Kay R¨omer
`Albrecht Schmidt
`Stefan Schulz
`Frank Stajano
`Thomas Strang
`
`Carnegie Mellon University (USA)
`Microsoft Research (USA)
`University of Stuttgart (Germany)
`Carnegie Mellon University (USA)
`University of Luxemburg (Luxemburg)
`DERI (Austria/Ireland)
`University of California, Berkeley (USA)
`Lancaster University (UK)
`Intel Research Seattle (USA)
`University of Queensland (Australia)
`Microsoft Research (USA)
`University of Munich (Germany)
`University of Calgary (Canada)
`ETH Zurich (Switzerland)
`University of Munich (Germany)
`IBM Almaden Research Center (USA)
`University of Maine (USA)
`University College Dublin (Ireland)
`ETH Zurich (Switzerland)
`University of Munich (Germany)
`Carleton University (Canada)
`University of Cambridge (UK)
`German Aerospace Center (Germany)
`
`Additional Reviewers
`
`Henoc Agbota
`Michael Angermann
`Stavros Antifakos
`Trent Apted
`Martin Bauer
`Alastair Beresford
`Jan Beutel
`J¨urgen Bohn
`Thomas Buchholz
`Jim Campbell
`Nicolas Christin
`
`Lancaster University (UK)
`German Aerospace Center (Germany)
`ETH Zurich (Switzerland)
`National ICT Australia (Australia)
`University of Stuttgart (Germany)
`University of Cambridge (UK)
`ETH Zurich (Switzerland)
`ETH Zurich (Switzerland)
`University of Munich (Germany)
`University of Maine (USA)
`University of California, Berkeley (USA)
`
`APPLE EXHIBIT 1013
`Page 6 of 63
`
`

`

`VIII
`
`Organization
`
`Tobias Drosdol
`Dominique Dudkowski
`Frank D¨urr
`Stefan Dulman
`Babak Esfandiari
`Thomas Fritz
`Caroline Funk
`Eeva Hedefine
`Karen Henricksen
`Paul Holleis
`Jens Kammann
`Nicky Kern
`Mohamed Khedr
`Jacek Kopecky
`Matthias Kranz
`Michael Krause
`Reto Krummenacher
`Jonathan Lester
`Ning Luo
`Ted McFadden
`Oleg Mezentsev
`Daniela Nicklas
`Silvia Nittel
`Mark Petovello
`Carsten Pils
`Julian Randall
`Andrew Rice
`Patrick Robertson
`Ricky Robinson
`Enrico Rukzio
`Francois Scharffe
`Michael Schiffers
`John Schleppe
`Surendran Shanmugam
`Michael Stollberg
`Markus Strassberger
`Georg Treu
`Kristof Van Laerhoven
`Pablo Vidales
`Kerstin Zimmermann
`
`University of Stuttgart (Germany)
`University of Stuttgart (Germany)
`University of Stuttgart (Germany)
`University of Twente (The Netherlands)
`Carleton University (Canada)
`University of Munich (Germany)
`University of Munich (Germany)
`University of Maine (USA)
`DSTC Brisbane (Australia)
`University of Munich (Germany)
`German Aerospace Center (Germany)
`TU Darmstadt (Germany)
`Arab Academy for Science and Technology (Egypt)
`DERI Innsbruck (Austria)
`University of Munich (Germany)
`University of Munich (Germany)
`DERI Innsbruck (Austria)
`University of Washington (USA)
`University of Calgary (Canada)
`DSTC Brisbane (Australia)
`University of Calgary (Canada)
`University of Stuttgart (Germany)
`University of Maine (USA)
`University of Calgary (Canada)
`RWTH Aachen (Germany)
`ETH Zurich (Switzerland)
`University of Cambridge (UK)
`German Aerospace Center (Germany)
`University of Queensland (Australia)
`University of Munich (Germany)
`DERI Innsbruck (Austria)
`University of Munich (Germany)
`University of Calgary (Canada)
`University of Calgary (Canada)
`DERI Innsbruck (Austria)
`BMW Group (Germany)
`University of Munich (Germany)
`Lancaster University (UK)
`University of Cambridge (UK)
`DERI Innsbruck (Austria)
`
`APPLE EXHIBIT 1013
`Page 7 of 63
`
`

`

`Table of Contents
`
`Keynote
`
`Location Awareness: Potential Benefits and Risks
`Vidal Ashkenazi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`
`1
`
`Context Information Management and Distribution
`
`Context Modelling and Management in Ambient-Aware Pervasive
`Environments
`Maria Strimpakou, Ioanna Roussaki, Carsten Pils,
`Michael Angermann, Patrick Robertson, Miltiades Anagnostou . . . . . .
`
`A Context Architecture for Service-Centric Systems
`Johanneke Siljee, Sven Vintges, Jos Nijhuis . . . . . . . . . . . . . . . . . . . . . . .
`
`Towards Realizing Global Scalability in Context-Aware Systems
`Thomas Buchholz, Claudia Linnhoff-Popien . . . . . . . . . . . . . . . . . . . . . . .
`
`Positioning Sensor Systems I
`
`Towards LuxTrace: Using Solar Cells to Measure Distance Indoors
`Julian Randall, Oliver Amft, Gerhard Tr¨oster . . . . . . . . . . . . . . . . . . . . .
`
`Three Step Bluetooth Positioning
`Alessandro Genco . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`
`MoteTrack: A Robust, Decentralized Approach to RF-Based Location
`Tracking
`Konrad Lorincz, Matt Welsh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`
`Positioning Sensor Systems II
`
`Correcting GPS Readings from a Tracked Mobile Sensor
`Richard Milton, Anthony Steed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`
`Web-Enhanced GPS
`Ramaswamy Hariharan, John Krumm, Eric Horvitz . . . . . . . . . . . . . . . .
`
`2
`
`16
`
`26
`
`40
`
`52
`
`63
`
`83
`
`95
`
`APPLE EXHIBIT 1013
`Page 8 of 63
`
`

`

`X
`
`Table of Contents
`
`The COMPASS Location System
`Frank Kargl, Alexander Bernauer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
`
`The xPOI Concept
`Jens Kr¨osche, Susanne Boll . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
`
`Positioning Sensor Systems III
`
`The GETA Sandals: A Footprint Location Tracking System
`Kenji Okuda, Shun-yuan Yeh, Chon-in Wu, Keng-hao Chang,
`Hao-hua Chu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
`
`Improving the Accuracy of Ultrasound–Based Localisation Systems
`Hubert Piontek, Matthias Seyffer, J¨org Kaiser . . . . . . . . . . . . . . . . . . . . . 132
`
`Position Estimation of Wireless Access Point Using Directional
`Antennas
`Hirokazu Satoh, Seigo Ito, Nobuo Kawaguchi . . . . . . . . . . . . . . . . . . . . . . 144
`
`From Location to Context
`
`Exploiting Multiple Radii to Learn Significant Locations
`Norio Toyama, Takashi Ota, Fumihiro Kato, Youichi Toyota,
`Takashi Hattori, Tatsuya Hagino . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
`
`Modeling Cardinal Directional Relations Between Fuzzy Regions Based
`on Alpha-Morphology
`Haibin Sun, Wenhui Li . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
`
`Commonsense Spatial Reasoning for Context–Aware Pervasive Systems
`Stefania Bandini, Alessandro Mosca, Matteo Palmonari
`. . . . . . . . . . . . 180
`
`Contextually Aware Information Delivery in Pervasive Computing
`Environments
`Ian Millard, David De Roure, Nigel Shadbolt . . . . . . . . . . . . . . . . . . . . . . 189
`
`Bayesian Networks
`
`Classifying the Mobility of Users and the Popularity of Access Points
`Minkyong Kim, David Kotz . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
`
`Prediction of Indoor Movements Using Bayesian Networks
`Jan Petzold, Andreas Pietzowski, Faruk Bagci, Wolfgang Trumler,
`Theo Ungerer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
`
`APPLE EXHIBIT 1013
`Page 9 of 63
`
`

`

`Table of Contents
`
`XI
`
`Geo Referenced Dynamic Bayesian Networks for User Positioning on
`Mobile Systems
`Boris Brandherm, Tim Schwartz . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
`
`Issues and Requirements for Bayesian Approaches in Context Aware
`Systems
`Michael Angermann, Patrick Robertson, Thomas Strang . . . . . . . . . . . . 235
`
`Context Inference
`
`Context-Aware Collaborative Filtering System: Predicting the User’s
`Preference in the Ubiquitous Computing Environment
`Annie Chen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
`
`Mobile Context Inference Using Low-Cost Sensors
`Evan Welbourne, Jonathan Lester, Anthony LaMarca,
`Gaetano Borriello . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
`
`Where am I: Recognizing On-body Positions of Wearable Sensors
`Kai Kunze, Paul Lukowicz, Holger Junker, Gerhard Tr¨oster . . . . . . . . . 264
`
`Privacy
`
`Context Obfuscation for Privacy via Ontological Descriptions
`Ryan Wishart, Karen Henricksen, Jadwiga Indulska . . . . . . . . . . . . . . . . 276
`
`Share the Secret: Enabling Location Privacy in Ubiquitous
`Environments
`C. Delakouridis, L. Kazatzopoulos, G.F. Marias, P. Georgiadis . . . . . . 289
`
`Filtering Location-Based Information Using Visibility
`Ashweeni Beeharee, Anthony Steed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
`
`Location- and Context-Aware Applications
`
`Introducing Context-Aware Features into Everyday Mobile Applications
`Mikko Perttunen, Jukka Riekki . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
`
`Predicting Location-Dependent QoS for Wireless Networks
`Robert A. Malaney, Ernesto Exposito, Xun Wei, Dao Trong Nghia . . . 328
`
`Location-Based Services for Scientists in NRENs
`Stefan Winter, Thomas Engel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
`
`APPLE EXHIBIT 1013
`Page 10 of 63
`
`

`

`XII
`
`Table of Contents
`
`Hybrid Positioning and User Studies
`
`Towards Smart Surroundings: Enabling Techniques and Technologies
`for Localization
`Kavitha Muthukrishnan, Maria Lijding, Paul Havinga . . . . . . . . . . . . . . 350
`
`Proximation: Location-Awareness Through Sensed Proximity and GSM
`Estimation
`Aaron Quigley, David West . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
`
`Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
`
`APPLE EXHIBIT 1013
`Page 11 of 63
`
`

`

`
`
`Three Step Bluetooth Positioning
`
`Alessandro Genco
`
`University of Palermo, Department of Computer Engineering,
`Viale delle Scienze, edificio 6, 90128 Palermo, Italy
`genco@unipa.it
`
`Abstract. This paper discusses a three step procedure to perform high
`definition positioning by the use of low cost Bluetooth devices. The three steps
`are: Sampling, Deployment, and Real Time Positioning. A genetic algorithm is
`discussed for deployment optimization and a neural network for real time
`positioning. A case study, along with experiments and results, are finally
`discussed dealing with a castle in Sicily where many trials were carried out to
`the end of arranging a positioning system for context aware service provision to
`visitors.
`
`1 Introduction
`
`Many pervasive computing applications rely on real time location to start and manage
`interaction with people in a detected area. Time and space information are therefore
`basic elements in arranging mobile context aware services which take into account
`context factors such as who, why, where, when. Dealing with wide areas, multiple
`interaction devices, such as remote multi-displays, could be available in one service
`hall. In such cases a pervasive system can start interaction with who explicitly
`addresses a selected device by means of some manual action on a touch screen or a
`mouse, or by means of some voice sound. Nevertheless, there are some kinds of
`application, as for instance advertising messages, which require interaction to start
`autonomously. People who are around should be attracted by some customized
`message exactly arranged on his personal profile and current position in a display
`neighborhood.
`We may feel some worry in looking at a pervasive system as a big brother;
`however there is some convenience for us in customized services and furthermore,
`such an interaction modality could be the one preferred by people, because it does not
`require any manual action to be performed. Once preserved the not invasive
`requirement of pervasive applications, it is undoubted that system proactive behavior
`could be a general suitable approach to mobile human computer interaction.
`Besides the problem of selecting the nearest interaction device, position aware
`services may need to rely on position data which must be more accurate than simple
`location. There are several pervasive applications indeed, which require a maximum
`error in position coordinates to be kept very low, less than one meter for instance.
`This is the case of a security system, which is arranged to protect an area around a
`
`T. Strang and C. Linnhoff-Popien (Eds.): LoCA 2005, LNCS 3479, pp. 52 – 62, 2005.
`© Springer-Verlag Berlin Heidelberg 2005
`
`APPLE EXHIBIT 1013
`Page 12 of 63
`
`

`

`
`
`Three Step Bluetooth Positioning
`
`53
`
`precious artifact. There are also some cases which require additional position data,
`like the human body compass angle. People who are looking at an object, as for
`instance visitors who are looking at an artifact, or factory operators who are checking
`some manufacturing process could be provided with context aware information which
`take into account who is looking at what.
`The above two basic positioning elements are to be used in conjunction with a
`higher level point of view to allow a system to arrange those services someone may
`expect in a given reality [1], [2], [3].
`
`2 Why Bluetooth
`
`We used Bluetooth (IEEE802.15.1) in our positioning experiments because of two
`main reasons. One is that Bluetooth technology is widely implemented in
`cellular/smart phones, thus being something quite chip and wearable, and therefore
`very easy to own. The other reason is that the Bluetooth (BT) technology embedded
`in cellular phones, allows distances to be estimated by link quality values within a BT
`covered area which we can suppose to be a 30~40 m. circle approximately. We have
`also to mention some problems encountered in using cellular embedded Bluetooth
`devices which mostly deal with BT service implementation by different brand
`factories. In many cases we had to deal with compatibility problems or service
`restrictions.
`However, given the Bluetooth amazing commercial success, we can hope in near
`future to deal with standardized Bluetooth services.
`Actually, WiFi (IEEE802.11x) can also be used for positioning, as well as any
`other RF communication
`technology which provides
`link quality values.
`Nevertheless, most of positioning problems which come from link quality measure
`unreliability, can be discussed with similar considerations for a class of technologies.
`Therefore, apart some different featuring specifications, discussions on Bluetooth can
`be considered as representative of a group of communication technologies which are
`capable of providing positioning information.
`
`
`Fig. 1. An Iso-LQ curve
`
`
`
`
`
`
`
`APPLE EXHIBIT 1013
`Page 13 of 63
`
`

`

`54
`
`A. Genco
`
`An actual problem of positioning by RF communication technologies comes from
`estimating distances on link quality measurements, which are affected by a high
`degree of uncertainty. Measured RF link quality equal values actually draw a region
`which is very unlikely to be a circle because of obstacles and noises. Therefore,
`position estimation by triangulation, even performed on more than three reference
`nodes, cannot be accurate. An irregular-shaped region around a RF terminal (Fig. 1) is
`a more realistic case to be tackled by means of methods which are capable of dealing
`with uncertainty and site depending solutions.
`Distance estimation between a mobile device and a number of reference devices
`whose location is known is a research topic of several approaches [4]. Some
`contributions can be found in literature with the end of arranging solutions to be free
`from site noises.
`Among these, ActiveBats [5] and Cricket [6] are based on ultrasound time-of-flight
`lateration, with an accuracy of few cm or less. The time-of-flight method estimates
`distance between a moving object and a fixed point by measuring the time a signal
`takes to travel from the object and the fixed point at a known speed. This method
`could be a good one because time of flight and distance have a reliable relationship.
`The actual problem is in clock accuracy requirement. A 1 μs error in timing leads to a
`300 m error in distance estimation.
`The Ascension Technology MotionStar system [7] is based on magnetic sensors
`moving in a magnetic field around their source. This system provides a very high
`accuracy but needs very expensive hardware.
`RX power level positioning method is quite similar to TOA positioning. Both
`methods locate mobile devices on the intersection of three (or more) circles. The
`circles radius is evaluated on the measured strength of received signals, thus assuming
`a direct relationship between signal strength and distance which unfortunately, as said
`above, can be affected by obstacles and noises.
`The Angle Of Arrival (AOA) method processes the direction of a received signal.
`Position is estimated by triangulation when two reference devices at least measure the
`signal angle of arrival from a mobile device [8]. This method obviously requires some
`expensive hardware to evaluate angles of arrival.
`The Cell Identity (CI) method looks at the network as divided into cells, each cell
`being the radio coverage area of a single reference device. A mobile device connected
`to a given reference device is assumed to be inside its cell. Cells overlapping and
`connectivity-induced geometric constraints can improve accuracy [8]. One more time,
`as mentioned above, radio coverage cannot be assumed to be a circle and therefore
`accuracy cannot be high.
`
`3 Bluetooth Positioning
`
`Hallberg et al. [9] developed two different methods based on BT Received Signal
`Strength Indicator (RSSI) values: the direct method, which requires a BT device to be
`programmed, and the indirect method, without any programming being needed. The
`
`
`
`APPLE EXHIBIT 1013
`Page 14 of 63
`
`

`

`
`
`Three Step Bluetooth Positioning
`
`55
`
`first one gives a good accuracy by programmable hardware. The second one is
`cheaper, but its accuracy is very poor, with a worst-case error of 10 meters.
`SpotOn [10] and MSR RADAR [11] are based on RF signal power level
`measurement. They process the RSSI (Received Signal Strength Information) value to
`give an accuracy of 3-4 meters or more.
`The BT Local Positioning Application (BLPA) [12] uses RSSI values to feed an
`extended Kalman filter for distance estimation. A good accuracy is achieved only by
`theoretical RSSI values, while unreliability of actual values gives unreliable distance
`estimation. The BT Indoor Positioning System (BIPS) [13] is designed for tracking
`mobile devices in motion inside a building. The BIPS main task is real-time tracking
`of visitors in a building. This led researchers to deal mainly with timing and device
`discovering, thus achieving an accuracy of 10 meters.
`Finally, Michael Spratt [14] proposed the Positioning by Diffusion method based
`on information transferred across short-range wireless links. Distance estimation is
`achieved by geometric or numeric calculations.
`
`4 Three Step BT Positioning
`
`BT devices measure RX power level by using both RSSI and Link Quality (LQ)
`parameters. These are implemented in the BT module and can be read through HCI
`(Host Controller Interface) commands [15]. LQ is a quite reliable parameter for
`distance estimation, differently RSSI only allows to know whether a device is in a
`given base station power range or not [16]. The use of LQ is recommended by the BT
`standard specifications, so it is available on most commercial devices. LQ represents
`the quality of a link in a range from 0 to 255, and a correlation can be assumed
`between distances and LQ values. We know LQ values are not reliable in measuring
`distances. Therefore, we need to avoid geometrical concerns and let a BT positioning
`system to take advantage from LQ values to be processed according to their site
`depending specificity. Here we discuss a three step procedure which turned out to be
`capable of providing high definition positioning by the use of low cost BT devices.
`The three steps are: site LQ sampling, BT base station deployment, and finally, real
`time positioning.
`
`4.1 Positioning Step 1: Site Sampling
`
`The end of this step is to collected a first sample of LQ measures to allow us to attach
`a set of LQ ranges to each cell. A range is a set of three values: the lowest, the highest
`and the mean value of all LQ values measured in a cell from a given BT base station
`in one point.
`The site we investigated is the Manfredi’s Castle in Mussomeli - Italy (Fig. 2a),
`whose map is sketched in Fig. 2b. We split the tourist area in a number of cells, which
`are rooms, roads, and areas around artifacts. There are two cell types: cells that
`represent rooms, parts of large rooms, or parts of roads; and cells which represent
`sub-areas around columns, portals, or other artifacts. We assumed an irregular
`
`
`
`
`APPLE EXHIBIT 1013
`Page 15 of 63
`
`

`

`56
`
`A. Genco
`
`Fig. 2a. Manfredi’s Castle in Mussomeli (Italy)
`
`
`
`1. External wall door
`2. Stable
`3. Castle entrance
`4. Courtyard
`5. Big arc
`6. Vestibule
`7. Gothic portal
`8. Barons Hall
`9. Destroyed bodies
`10. Three women room
`11. Chimney hall1
`12. Cross vault halls
`13. Semicircular Turret
`14. Maid lodging
`15. Male
`16. Chapel
`17. Polygonal external wall
`18. External wall stable
`19. Hayloft
`20. Defense fencing
`21. Double lancet windows
`
`
`Fig. 2b. Castle map
`
`
`
`
`
`
`
`
`
`APPLE EXHIBIT 1013
`Page 16 of 63
`
`

`

`
`
`Three Step Bluetooth Positioning
`
`57
`
`
`
`Fig. 3. Cells layout
`
`
`
`quadrilateral shape for the first kind of cell, a width (typically a diagonal), and a
`maximum error of 1 meter. Differently, we assumed a circular shape for the second
`type, a diameter of 2 meters, and a maximum error of 0.5 meters.
`Fig. 3 sketches the cells layout. Blue points are centers of circular cells; red points
`are places where Bluetooth base stations (BT-BS) are allowed to be put.
`The analysis of this first set of measures suggested us some considerations. One is
`that is very hard to find any correlation between obstacles and link quality. Some
`walls turned out to stop BT coverage; other walls seemed to be glass or air. Only very
`deep walls or floors turned out to completely stop BT coverage. For instance, BT-
`BS’s which were placed in lower floor areas, did not read any LQ value from mobile
`terminals (BT-MT) moving on higher floor areas, and vice-versa.
`Mainly due to the end of dealing with indoor and outdoor areas separately, we
`decided to split the site area in two sub-areas (green dotted line in Fig. 3). The results
`of these measurements are in a matrix whose generic (i,j) element contains a LQ
`values range measured from the BT-BS at the ith position to the BT-MT moving
`within the jth cell. A range can also be read as an estimation of the maximum
`theoretical accuracy in a cell (8 LQ units in a 2 m. cell cannot give an accuracy
`greater than 2/8 m.). A generic (i,j) range set to [0,0] tells us that the BT-BS placed at
`the ith position cannot detect any BT-MT in the jth cell. Table 1 shows part of the
`output file, where rows are for NS possible stations, and columns are for NA areas.
`
`
`
`
`
`APPLE EXHIBIT 1013
`Page 17 of 63
`
`

`

`58
`
`A. Genco
`
`(cid:3)
`(cid:20)(cid:3)
`(cid:21)(cid:3)
`(cid:29)(cid:3)
`(cid:49)(cid:54)(cid:16)(cid:20)(cid:3)
`(cid:49)(cid:54)(cid:3)
`
`(cid:20)(cid:3)
`(cid:19)(cid:15)(cid:19)(cid:3)
`(cid:19)(cid:15)(cid:19)(cid:3)
`(cid:171)(cid:3)
`(cid:21)(cid:20)(cid:19)(cid:15)(cid:21)(cid:20)(cid:21)(cid:3)
`(cid:21)(cid:23)(cid:19)(cid:15)(cid:21)(cid:24)(cid:19)(cid:3)
`
`Table 1. LQ Ranges
`
`(cid:21)(cid:3)
`(cid:20)(cid:25)(cid:19)(cid:15)(cid:20)(cid:25)(cid:24)(cid:3)
`(cid:20)(cid:27)(cid:19)(cid:15)(cid:20)(cid:27)(cid:27)(cid:3)
`(cid:171)(cid:3)
`(cid:20)(cid:28)(cid:19)(cid:15)(cid:21)(cid:19)(cid:24)(cid:3)
`(cid:20)(cid:27)(cid:20)(cid:15)(cid:20)(cid:27)(cid:24)(cid:3)
`
`(cid:171)(cid:3)
`(cid:171)(cid:3)
`(cid:171)(cid:3)
`(cid:171)(cid:3)
`(cid:171)(cid:3)
`(cid:171)(cid:3)
`
`(cid:49)(cid:36)(cid:16)(cid:20)(cid:3)
`(cid:20)(cid:25)(cid:20)(cid:15)(cid:20)(cid:27)(cid:24)(cid:3)
`(cid:20)(cid:28)(cid:24)(cid:15)(cid:21)(cid:22)(cid:19)(cid:3)
`(cid:171)(cid:3)
`(cid:19)(cid:15)(cid:19)(cid:3)
`(cid:19)(cid:15)(cid:19)(cid:3)
`
`(cid:49)(cid:36)(cid:3)
`(cid:20)(cid:25)(cid:22)(cid:15)(cid:20)(cid:26)(cid:24)(cid:3)
`(cid:21)(cid:19)(cid:20)(cid:15)(cid:21)(cid:24)(cid:24)(cid:3)
`(cid:171)(cid:3)
`(cid:20)(cid:23)(cid:24)(cid:15)(cid:20)(cid:24)(cid:25)(cid:3)
`(cid:19)(cid:15)(cid:19)(cid:3)
`
`4.2 Positioning Step 2: BT Base Station Deployment
`
`Several BT positioning experiments were carried out according to different
`positioning methods, namely triangulation [16], fuzzy logic [17] and neural network.
`A common result of these experiments is that positioning accuracy can be heavily
`affected by erroneous arrangements of the available base stations. Actually, we are
`unlikely to be allowed to put a base station in the middle of a room, for instance, and
`further constraints may come when dealing with a heritage site; base stations should
`be invisible and only selected places are available. Therefore, a relevant step in
`arranging a BT positioning system should be to optimize BT-BS deployment in a
`subset of places which are the only ones permitted by site specific constraints. The
`problem can be enounced in the following terms: given the total number of places
`where a base station can be put, select a minimal subset which allows the system to
`evaluate the position of a BT mobile terminal in any part of the site, with the highest
`accuracy degree.
`Many optimization methods can be used to this end; we used a genetic algorithm
`because of its easy scalability. Each possible deployment is represented by an
`individual chromosome of a population. A chromosome has as many genes as places
`where BT-BS can be put. Each gene represents a possible BT-BS position, which can
`be set either to true if a BT-BS is placed in that position, or to false.
`
`f
`
`t
`
`f
`
`f
`
`f
`
`t
`
`f
`t
`-
`-
`-
`-
`t
`f
`t
`Fig. 4. Deployment Chromosome
`
`f
`
`t
`
`t
`
`f
`
`t
`
`f
`
`An acceptable solution has to return a deployment layout whose coverage is unique
`for all areas, also achieving a required accuracy.
`An optimal solution maximizes coverage quality, and minimizes the number of
`BT-BS required. The quality index of each station-area couple (s,a) is defined by the
`ratio (1) with na being the number of sub-areas to be singled out by positioning.
`−
`+
`
`a
`
`nL
`
`Q
`inf
`
`]
`
`,
`as
`
`1
`
`
`
`
`
`
`
`(1)
`
`[
`
`LQ
`sup
`
`=
`
`q
`
`,
`as
`
`
`
`
`
`APPLE EXHIBIT 1013
`Page 18 of 63
`
`

`

`
`
`Three Step Bluetooth Positioning
`
`59
`
`Each deployment chromosome includes a number of BT-BS, along with their qs,a
`value. The chromosome quality takes into account all qs,a values, which represent the
`contribution of each BT-BS s to the whole chromosome quality.
`
`4.2.1 Some Genetic Algorithm Details
`We start generating a population of 50 chromosomes and assigning each gene a
`probability p to be included in a chromosome. Each chromosome is checked for
`acceptability and fitness value.
`Once the initial population is generated, evolution starts. A maximum of 10
`chromosomes are killed each step (20% of population) depending on age. Each
`chromosome has a percentage probability to die which is equal to its age. So, if a
`chromosome is 20, it has a 20% probability to die. A constant number of surviving
`chromosomes are then coupled to generate new chromosomes thus replacing the
`killed ones. Coupling is performed according to a one-point-crossover and alternating
`gene exchange (one time the initial part and one time the final part). The evolution
`steps are repeated 1000 times.
`A best solution is detected at each evolution step,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket