End User Development 5th International Symposium IS EUD 2015 Madrid Spain May 26 29 2015 Proceedings 1st Edition Paloma Díaz

Download as pdf or txt
Download as pdf or txt
You are on page 1of 54

End User Development 5th International

Symposium IS EUD 2015 Madrid Spain


May 26 29 2015 Proceedings 1st Edition
Paloma Díaz
Visit to download the full and correct content document:
https://textbookfull.com/product/end-user-development-5th-international-symposium-i
s-eud-2015-madrid-spain-may-26-29-2015-proceedings-1st-edition-paloma-diaz/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Artificial Intelligence in Education 17th International


Conference AIED 2015 Madrid Spain June 22 26 2015
Proceedings 1st Edition Cristina Conati

https://textbookfull.com/product/artificial-intelligence-in-
education-17th-international-conference-aied-2015-madrid-spain-
june-22-26-2015-proceedings-1st-edition-cristina-conati/

Analytical and Stochastic Modelling Techniques and


Applications 22nd International Conference ASMTA 2015
Albena Bulgaria May 26 29 2015 Proceedings 1st Edition
Marco Gribaudo
https://textbookfull.com/product/analytical-and-stochastic-
modelling-techniques-and-applications-22nd-international-
conference-asmta-2015-albena-bulgaria-
may-26-29-2015-proceedings-1st-edition-marco-gribaudo/

Trustworthy Global Computing 10th International


Symposium TGC 2015 Madrid Spain August 31 September 1
2015 Revised Selected Papers 1st Edition Pierre Ganty

https://textbookfull.com/product/trustworthy-global-
computing-10th-international-symposium-tgc-2015-madrid-spain-
august-31-september-1-2015-revised-selected-papers-1st-edition-
pierre-ganty/

Formal Concept Analysis 13th International Conference


ICFCA 2015 Nerja Spain June 23 26 2015 Proceedings 1st
Edition Jaume Baixeries

https://textbookfull.com/product/formal-concept-analysis-13th-
international-conference-icfca-2015-nerja-spain-
june-23-26-2015-proceedings-1st-edition-jaume-baixeries/
Reliable Software Technologies Ada Europe 2015 20th Ada
Europe International Conference on Reliable Software
Technologies Madrid Spain June 22 26 2015 Proceedings
1st Edition Juan Antonio De La Puente
https://textbookfull.com/product/reliable-software-technologies-
ada-europe-2015-20th-ada-europe-international-conference-on-
reliable-software-technologies-madrid-spain-
june-22-26-2015-proceedings-1st-edition-juan-antonio-de-la-
puente/
Experimental Algorithms 14th International Symposium
SEA 2015 Paris France June 29 July 1 2015 Proceedings
1st Edition Evripidis Bampis (Eds.)

https://textbookfull.com/product/experimental-algorithms-14th-
international-symposium-sea-2015-paris-france-
june-29-july-1-2015-proceedings-1st-edition-evripidis-bampis-eds/

Web and Wireless Geographical Information Systems 14th


International Symposium W2GIS 2015 Grenoble France May
21 22 2015 Proceedings 1st Edition Jérôme Gensel

https://textbookfull.com/product/web-and-wireless-geographical-
information-systems-14th-international-
symposium-w2gis-2015-grenoble-france-
may-21-22-2015-proceedings-1st-edition-jerome-gensel/

Agile Processes in Software Engineering and Extreme


Programming 16th International Conference XP 2015
Helsinki Finland May 25 29 2015 Proceedings 1st Edition
Casper Lassenius
https://textbookfull.com/product/agile-processes-in-software-
engineering-and-extreme-programming-16th-international-
conference-xp-2015-helsinki-finland-
may-25-29-2015-proceedings-1st-edition-casper-lassenius/

Trust Management IX 9th IFIP WG 11 11 International


Conference IFIPTM 2015 Hamburg Germany May 26 28 2015
Proceedings 1st Edition Christian Damsgaard Jensen

https://textbookfull.com/product/trust-management-ix-9th-ifip-
wg-11-11-international-conference-ifiptm-2015-hamburg-germany-
may-26-28-2015-proceedings-1st-edition-christian-damsgaard-
Paloma Díaz · Volkmar Pipek
Carmelo Ardito · Carlos Jensen
Ignacio Aedo · Alexander Boden (Eds.)
LNCS 9083

End-User
Development
5th International Symposium, IS-EUD 2015
Madrid, Spain, May 26–29, 2015
Proceedings

123
Lecture Notes in Computer Science 9083
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Editorial Board
David Hutchison
Lancaster University, Lancaster, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zürich, Zürich, Switzerland
John C. Mitchell
Stanford University, Stanford, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology, Madras, India
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbrücken, Germany
More information about this series at http://www.springer.com/series/7408
Paloma Díaz · Volkmar Pipek
Carmelo Ardito · Carlos Jensen
Ignacio Aedo · Alexander Boden (Eds.)

End-User
Development
5th International Symposium, IS-EUD 2015
Madrid, Spain, May 26–29, 2015
Proceedings

ABC
Editors
Paloma Díaz Carlos Jensen
Universidad Carlos III de Madrid Oregon State University
Leganés Corvallis, Oregon
Spain USA

Volkmar Pipek Ignacio Aedo


Universität Siegen Universidad Carlos III de Madrid
Siegen Leganés
Germany Spain

Carmelo Ardito Alexander Boden


Università degli Studi di Bari Aldo Moro Fraunhofer Institute for Applied Information
Bari Technology
Italy St. Augustin
Germany

ISSN 0302-9743 ISSN 1611-3349 (electronic)


Lecture Notes in Computer Science
ISBN 978-3-319-18424-1 ISBN 978-3-319-18425-8 (eBook)
DOI 10.1007/978-3-319-18425-8

Library of Congress Control Number: 2015937373

LNCS Sublibrary: SL2 – Programming and Software Engineering

Springer Cham Heidelberg New York Dordrecht London


c Springer International Publishing Switzerland 2015
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broad-
casting, reproduction on microfilms or in any other physical way, and transmission or information storage
and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known
or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the
editors give a warranty, express or implied, with respect to the material contained herein or for any errors or
omissions that may have been made.

Printed on acid-free paper


Springer International Publishing AG Switzerland is part of Springer Science+Business Media
(www.springer.com)
Preface

In its fifth edition the International Symposium of End-User Development came to


Madrid, hosted by the Interactive Systems Research group (DEI Lab) of Universidad
Carlos III de Madrid and MediaLab-Prado. The collaboration between these two public
entities brought this academic conference to a unique venue; a public citizen lab, always
open to new ways of doing research, production, and diffusion. Its location in a lively
cultural area surrounded by coworking spaces, and, specially, its reputation as an active
center in the promotion of new models of technology production and the reflection on
their impact in our lives and societies made MediaLab-Prado the perfect place to start
closing the gap between the academic community and end users. This is one of the main
goals pursued in this edition by IS-EUD, which will try to engage citizens by making
more accessible the innovations in end-user development.
My world, my device, my program.
In an increasingly connected world, we use information and communication technol-
ogies in more and more of our work practices and everyday routines. End users face the
challenge of adapting and combining these technologies through different kinds of arti-
facts for various and differing purposes, engaging in creative, often collaborative, activ-
ities to make technologies and infrastructures fit their practice. End-user development
has established itself as a research discipline that connects the ergonomics of program-
ming with the users’ needs and abilities to shape the technological infrastructures we
live in. The research does not aim to make everybody a “traditional” programmer, but
to allow everybody to be in control of the technologies they live and work with in a way
that is natural or intuitive to them, in their context and for their practices. This includes
improving the concepts and interfaces for programming and configuration as well as
supporting end users in their activities to share, delegate, and collaborate.
Following the path started in the 2013 edition in Copenhagen, the link with par-
ticipatory design was also a topic explored in Madrid. Ubiquitous computing and the
Internet of Things gained also relevance in the symposium, and we aimed at connect-
ing to relevant societal movements like the Makerspaces and FabLabs. These emerging
areas of research and development aim to change the way we interact with the world
around us, and how we empower ordinary people to create and change the future. There-
fore, at the core of their vision and challenge they require us to to empower end users to
adapt technologies to their own needs. Therefore, discussing the contribution of EUD
methods and tools becomes more timely than ever.
The full papers chairs Carmelo Ardito and Carlos Jensen, in close collaboration with
the short papers chairs, Ignacio Aedo and Alexander Boden, were in charge of designing
a varied and exciting program including different types of contributions and covering a
broad spectrum of research related to EUD and participatory design. Thanks to the hard
work of our Program Committee, the rigorous review process resulted on 10 full papers
and 12 short papers accepted. An industrial paper by Airbus Spain will illustrate how the
VI Preface

avionics industry is joining the EUD movement to provide personalization capabilities


to their end users.
Our two keynote speakers will also open their talks to the public to engage nonaca-
demics in the EUD community. David Cuartielles, cofounder of the Arduino platform
and director of the Prototyping Laboratory at K3 at Malmö University’s School of Arts
and Communication, is one of the leading researchers in open source platforms and
interaction design. Professor Dr. Albrecht Schmidt from the University of Stuttgart is
a well-known researcher in the area of Human–Computer Interaction who is now in-
volved in several projects related to the application of physical and augmented comput-
ing to different contexts. Both will enrich the symposium with their extensive expertise
and inspiring points of view.
Connecting researchers and end users.
Pursuing the goal of engaging end users in the symposium, the 5th IS-EUD intro-
duces a new category of participation again open to the public: the Playground. This
special track, organized by Andrea Bellucci, Lily Diaz, and Monica Maceli, is devoted
to establishing spaces for end users to interact with EUD technologies. We hope that this
interaction between researchers and end users will be a first step to look for innovative
ways to link the EUD research community with its stakeholders, the society.
The Workshops Chairs, Daniela Fogli and Yvonne Dittrich, managed to attract the
third edition of the workshop on Cultures of Participation in the Digital Age that this
year will deal with the theme “Coping with information, participation, and collabora-
tion overload.” Organized by a group of international researches with strong ties to the
EUD community, including Barbara Rita Barricelli, Gerhard Fischer, Anders Mørch,
and Antonio Piccinno, CoPDA 2015 offers an excellent chance to further explore the
socio-technical dimension of advances in social and participatory technologies. The
workshop along with the Doctoral Consortium, organized by Clarisse de Souza, Panos
Markopoulos, and Simone Stumpf, took place in the Leganés Campus of Universidad
Carlos III de Madrid where the Technical School was located.
The Conference General Chairs had the good fortune to count on the generous and
rigorous work of a group of varied and brilliant chairs, including those in charge of the
publicity (Teresa Onorati and Patrick Shih), the local arrangements (Telmo
Zarraonandía and Sergio Santiago), the organization in MediaLab-Prado (Marcos Gar-
cía, Clara Lapetra, and Patricia Domínguez), and the volunteers. They hope and expect
that you all enjoy IS-EUD 2015 as much as they enjoyed being part of its preparation.
Thanks to all for making this possible and please do not forget to enjoy also the
beautiful and unique city of Madrid!

March 2015 Paloma Díaz


Volkmar Pipek
Carmelo Ardito
Carlos Jensen
Ignacio Aedo
Alexander Boden
Organization

General Chairs
Paloma Díaz Universidad Carlos III de Madrid, Spain
Volkmar Pipek University of Siegen, Germany

Program Chairs
Full Papers
Carmelo Ardito University of Bari, Italy
Carlos Jensen Oregon State University, USA

Short Papers
Ignacio Aedo Universidad Carlos III de Madrid, Spain
Alexander Boden Fraunhofer Institute for Applied Information
Technology FIT, Germany

EUD-Playground Chairs
Andrea Bellucci Universidad Carlos III de Madrid, Spain
Lily Diaz Aalto University, Finland
Monica Maceli Pratt Institute, School of Information and
Library Science, USA

Industrial Liason Chairs


Marcos García MediaLab-Prado, Spain
Alex Jaimes Larrate Yahoo Labs, USA/Spain/India
Boris de Ruyter Philips Research Europe, The Netherlands

Workshops Chairs
Daniela Fogli University of Brescia, Italy
Yvonne Dittrich IT University of Copenhagen, Denmark
VIII Organization

Doctoral Consortium Chairs


Clarisse de Souza Pontifícia Universidade Católica do Rio de Janeiro,
Brazil
Panos Markopoulos Eindhoven University of Technology,
The Netherlands
Simone Stumpf City University London, UK

Publicity Chairs
Patrick Shih Pennsylvania State University, USA
Teresa Onorati Universidad Carlos III de Madrid, Spain

Local Arrangement Chair


Telmo Zarraonandia Universidad Carlos III de Madrid, Spain

Steering Committee
Margaret Burnett Oregon State University, USA
Maria Francesca Costabile University of Bari, Italy
Boris de Ruyter Philips Research Europe, The Netherlands
Yvonne Dittrich IT University of Copenhagen, Denmark
Gerhard Fischer University of Colorado Boulder, USA
Anders Mørch University of Oslo, Norway
Antonio Piccinno University of Bari, Italy
Volkmar Pipek University of Siegen, Germany
Mary Beth Rosson Pennsylvania State University, USA
David Redmiles University of California, Irvine, USA
Gunnar Stevens University of Siegen, Germany
Volker Wulf University of Siegen, Germany

Program Committee
Ignacio Aedo Universidad Carlos III de Madrid, Spain
Carmelo Ardito University of Bari, Italy
Barbara Rita Barricelli Università degli Studi di Milano, Italy
Andrea Bellucci Universidad Carlos III de Madrid, Spain
Alexander Boden Fraunhofer Institute for Applied Information
Technology FIT, Germany
Margaret Burnett Oregon State University, USA
Federico Cabitza University of Milano-Bicocca, Italy
Organization IX

Maria Francesca Costabile University of Bari, Italy


Boris de Ruyter Philips Research Europe, The Netherlands
Clarisse de Souza Pontifícia Universidade Católica do Rio de Janeiro,
Brazil
Lily Diaz Aalto University, Finland
Yvonne Dittrich IT University of Copenhagen, Denmark
Paloma Díaz Universidad Carlos III de Madrid, Spain
Gerhard Fischer University of Colorado Boulder, USA
Daniela Fogli University of Brescia, Italy
Thomas Herrmann Ruhr-University of Bochum, Germany
Carlos Jensen Oregon State University, USA
Benjamin Koehne University of California, Irvine, USA
Thomas D. LaToza University of California, Irvine, USA
Catherine Letondal ENAC/LII, France
Monica Maceli Pratt Institute, School of Information and Library
Science, USA
Alessio Malizia Brunel University London, UK
Panos Markopoulos Eindhoven University of Technology,
The Netherlands
Nikolay Mehandjiev University of Manchester, UK
Anders Mørch University of Oslo, Norway
Fabio Paternò CNR-ISTI, Italy
Antonio Piccinno University of Bari, Italy
Volkmar Pipek University of Siegen, Germany
David Redmiles University of California, Irvine, USA
Anita Sarma University of Nebraska–Lincoln, USA
Carla Simone University of Milano-Bicocca, Italy
Gunnar Stevens University of Siegen, Germany
Simone Stumpf City University London, UK
Tom Yeh University of Colorado Boulder, USA

Additional Reviewers
Buono, Paolo Nolte, Alexander
Daskalopoulou, Athanasia Oleson, Alannah
Desolda, Giuseppe Onorati, Teresa
Hill, Charles Reyero Aldama, Gonzalo
Horvath, Amber Romano, Marco
Kuttal, Sandeep Turchi, Tommaso
Loser, Kai-Uwe Valtolina, Stefano
Keynote Speeches
Programming Ubiquitous Computing
Environments
Albrecht Schmidt

University of Stuttgart
Pfaffenwaldring 5a, 70569 Stuttgart, Germany
[email protected]

Abstract. Computing becomes a part of our everyday environment. Interaction


in the “real world” is more and more determined by ubiquitous computing sys-
tems that are tailored to fit a specific environment. These systems can only be
created with strong domain knowledge. End users may be the right group to de-
velop or at least tailor such systems. We show two examples of how domain
expert can program systems: one looks at how to transfer programming by demon-
stration to ubicomp scenarios and the other on how to use examples as recipes
for a new development. In the outlook we extrapolate from current practices of
sharing videos to a future where multimodal and sensor-rich examples can be
continuously recorded and may become the basis for new approaches for a truly
user-centered development of cyber-physical systems.
Opensource Hardware and Education
David Cuartielles

Medea - Malmö University’s School of Arts and Communication,


Ö Varvsg. 11 A, Malmö University, 205 06 Malmö
[email protected]

Abstract. Arduino is a free, opensource hardware platform that can be repro-


grammed with a piece of opensource software. Software that reprograms hard-
ware allows people to transform the way they understand and interact with the
world because electronics are omnipresent in our everyday activities. Elevators
run with microcontrollers, in an average car there are seventy microcontrollers
and even a microwave oven has microcontrollers. The goal of Arduino is to em-
power people other than engineers to understand interaction paradigms such as
physical, tangible and ubiquitous computing and to create their own interactive
artifacts with digital electronics. Eventually, it democratizes learning by practi-
cal experimentation so that learners discover how to be independent, how to use
things by themselves, how to exploit those things to build interactive systems by
themselves and how to be critically demanding about technology.
In this talk, I will introduce the feature that makes a free hardware platform
such as Arduino a powerful learning tool that foster creativity and I will talk about
a vision for the computing education for the 21st century: accessible and pleasant
approaches to teach kids how to reprogram the surrounding environment. To this
end, I will share experiences and insights gathered from project-based learning
experiments with Arduino in secondary schools.
Contents

Keynote Speech

Programming Ubiquitous Computing Environments . . . . . . . . . . . . . . . . . . 3


Albrecht Schmidt

Long Papers

Designing for End-User Development in the Internet of Things . . . . . . . . . . 9


Barbara Rita Barricelli and Stefano Valtolina

Natural Notation for the Domestic Internet of Things . . . . . . . . . . . . . . . . . 25


Charith Perera, Saeed Aghaee, and Alan Blackwell

Engineering the Creative Co-design of Augmented Digital Experiences


with Cultural Heritage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Paloma Díaz, Ignacio Aedo, and Merel van der Vaart

A Review of Research Methods in End User Development . . . . . . . . . . . . . 58


Daniel Tetteroo and Panos Markopoulos

My Program, My World: Insights from 1st-Person Reflective Programming


in EUD Education. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Ingrid T. Monteiro, Clarisse S. de Souza, and Eduardo T. Tolmasquim

End-User Development in Second Life: Meta-design, Tailoring,


and Appropriation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Valentina Caruso, Melissa D. Hartley, and Anders I. Mørch

Extreme Co-Design: Prototyping With and By the User for Appropriation


of Web-Connected Tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Andrea Bellucci, Giulio Jacucci, Veera Kotkavuori, Barisß Serim,
Imtiaj Ahmed, and Salu Ylirisku

Building and Using Home Automation Systems: A Field Study . . . . . . . . . . 125


Alexandre Demeure, Sybille Caffiau, Elena Elias, and Camille Roux

FRAMES – A Framework for Adaptable Mobile Event-Contingent


Self-Report Studies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Julian Dax, Thomas Ludwig, Johanna Meurer, Volkmar Pipek,
Martin Stein, and Gunnar Stevens
XVI Contents

Social-QAS: Tailorable Quality Assessment Service for Social


Media Content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Christian Reuter, Thomas Ludwig, Michael Ritzkatis, and Volkmar Pipek

Short Papers

Instilling a Culture of Participation: Technology-Related Skills


and Attitudes of Aspiring Information Professionals . . . . . . . . . . . . . . . . . . 173
Monica Maceli

Lessons Learned in the Design of Configurable Assistive Technology


with Smart Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Bruno A. Chagas, Hugo Fuks, and Clarisse S. de Souza

Analysing How Users Prefer to Model Contextual Event-Action Behaviours


in their Smartphones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Gabriella Lucci and Fabio Paternò

Interaction Anticipation: Communicating Impacts of Groupware


Configuration Settings to Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Raquel O. Prates, Mary Beth Rosson, and Clarisse S. de Souza

Involving Children in Design Activities Using the ChiCo Exploratory


Co-design Technique. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Diego Alvarado and Paloma Díaz

FaceMashup: Enabling End User Development on Social Networks Data . . . 204


Daniele Massa and Lucio Davide Spano

SketchCode – An Extensible Code Editor for Crafting Software. . . . . . . . . . 211


Siemen Baader and Susanne Bødker

Physical Prototyping of Social Products Through End-User Development . . . 217


Daniela Fogli, Elisa Giaccardi, Alessandro Acerbis, and Fabio Filisetti

Pervasive Displays in the Wild: Employing End User Programming


in Adaption and Re-Purposing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Tommaso Turchi and Alessio Malizia

Towards a Toolkit for the Rapid Creation of Smart Environments . . . . . . . . 230


Thomas Kubitza and Albrecht Schmidt

Making Mashups Actionable Through Elastic Design Principles. . . . . . . . . . 236


Carmelo Ardito, Maria Francesca Costabile, Giuseppe Desolda,
Markus Latzina, and Maristella Matera
Contents XVII

Assisted Composition of Services on Mobile Devices . . . . . . . . . . . . . . . . . 242


Nikolay Mehandjiev, Lu Ning, and Abdallah Namoun

Everyday Tools Used for Avionics User Modifiable Software Automatic


Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Miguel Sánchez-Puebla, Roberto Sobrino, and José Martín

Doctoral Consortium

Investigating the Barriers Experienced by Adult End-user Developers


when Physical Prototyping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Tracey Booth

EMA IDEs: A Challenge for End User Development . . . . . . . . . . . . . . . . . 259


Nikolaos Batalas

End User Development System for Adaptive Augmented Environments . . . . 264


Álvaro Montero

Workshops

Cultures of Participation in the Digital Age: Coping with Information,


Participation, and Collaboration Overload . . . . . . . . . . . . . . . . . . . . . . . . . 271
Barbara Rita Barricelli, Gerhard Fischer, Anders Mørch,
Antonio Piccinno, and Stefano Valtolina

EUD-Playground

Searching in a Playful Manner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279


Markus Latzina

IS-EUD 2015 Studio: Exploring End User Programming


of Interactive Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Thomas Kubitza

Creating Interactive Content in Android Devices: The Mokap Hackaton . . . . 287


Ángel Serrano-Laguna, Dan-Cristian Rotaru, Antonio Calvo-Morata,
Javier Torrente, and Baltasar Fernández-Manjón

Spatial Awareness in Mobile Devices to Compose Data Source:


A Utilization Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Giuseppe Desolda and Hans-Christian Jetter
XVIII Contents

Hands-on Actionable Mashups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295


Carmelo Ardito, Maria Francesca Costabile, Giuseppe Desolda,
Markus Latzina, and Maristella Matera

A Platform for Creating Digital Educational Games as Combinations


of Archetypical Games . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Telmo Zarraonandia, Paloma Díaz, Ignacio Aedo, and Alvaro Montero

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303


Keynote Speech
Programming Ubiquitous Computing Environments

Albrecht Schmidt()

University of Stuttgart, Pfaffenwaldring 5a, 70569 Stuttgart, Germany


[email protected]

Abstract. Computing becomes a part of our everyday environment. Interaction


in the “real world” is more and more determined by ubiquitous computing sys-
tems that are tailored to fit a specific environment. These systems can only be
created with strong domain knowledge. End users may be the right group to de-
velop or at least tailor such systems. We show two examples of how domain
expert can program systems: one looks at how to transfer programming by
demonstration to ubicomp scenarios and the other on how to use examples as
recipes for a new development. In the outlook we extrapolate from current prac-
tices of sharing videos to a future where multimodal and sensor-rich examples
can be continuously recorded and may become the basis for new approaches for
a truly user-centered development of cyber-physical systems.

1 Introduction

Over the last 20 years ubiquitous computing has become reality. Phones, household
appliances, TVs, cars, and even buildings have essentially become computers.
Interacting with computing technologies has become an integral part of our life [1].
Embedded computers and the software and services running on them more and more
shape how we perceive the world and how we interact with each other. In many cases
computers even determine what we can do or what we can’t do. The opportunities to
create interactive experiences are manifold [2]. As many traditional electro-
mechanical systems include now processing, communication, sensing, and actuation,
designing such cyber-physical systems in a user-centered development process offers
new opportunities and creates new challenges [3].

2 Challenges in Programming Ubiquitous Computing Systems

By creating ubiquitous computing technologies – software and hardware - we inevita-


bly change the way people live. There are great opportunities to build new interactive
tools and integrate them into our environment, but developing these systems, raises
again many design and engineering challenges solved in graphical systems. How to
ensure that systems are consistent and the users can guess the outcome of their ac-
tions? How can we build systems that allow easy reversal of action and that prevent
users from making errors? How can we provide appropriate feedback, where on one
side we expect that computing becomes invisible but on the other side we want users
© Springer International Publishing Switzerland 2015
P. Díaz et al. (Eds.): IS-EUD 2015, LNCS 9083, pp. 3–6, 2015.
DOI: 10.1007/978-3-319-18425-8_1
4 A. Schmidt

to be in control? These are just some of the questions we have to ask when moving to
interactive systems that are part of our everyday environments.
Looking at successful ubiquitous computing environments and more specifically at
smart spaces it becomes apparent, that they are developed to fit a certain context, they
are targeted at specific users, and they are designed to support specific activities and
tasks. Developing such systems includes the selection and deployment of hardware
and the development of software. Most of the systems are unique and domain know-
ledge is essential to create useful systems.

3 End User Development as a Solution

Analyzing this it becomes clear (1) end users and domain experts are required in the
development process, and (2) as systems are unique, programming by professionals
will for most cases not be a viable option (at least not economically).
We expect that by lowering the effort required to develop and program ubiquitous
computing environments, the proliferation of such technologies into homes and busi-
nesses can be facilitated. In our view, systems should be designed in a way that they
have a generic functionality that can be customized and programmed by end-users
and domain experts to suit their needs and to provide useful functionality.

3.1 I Can Show You - Programming by Demonstration in the Real World


When transferring skills between people “showing how to do it” and observing the
person who has just learned how to do it is the most common way. In vocational train-
ing this is essential to acquire practical skills. For many people it is much easier to
show how it is done than to verbalize it (or even to describe it in a formal language).
Hence programming by demonstration is very common in robotics [4] as well as in
the desktop world (e.g. creating Excel Macros).
In ubiquitous computing programming by demonstration is not as straightforward
as it appears. What part of the action is relevant? Assuming an environment with
many sensors, it is not clear which parts of the input are incidental and which parts
belong to the demonstration. Just imagine the following scenario: you want to show
the smart home, when to switch of the heating. You walk out of the house, lock the
front door, open the garage, drive the car out, and close the garage again. This gives a
clear set of events that can lead to a rule to switch the heating off when you leave.
However there are pitfalls. Does this only apply to the time of day and the weekday
when you demonstrated it? Is it relevant that it is dark outside (which is also sensed
by the environment)? What happens if another person is at home?
In the project MotionEAP1 we have explored this approach of programming by
demonstration in an industrial context, where it is feasible to attach clear semantics to
actions. Using a system that tracks the movement of users, their grapping of tools and
objects, and the assembly steps performed, we only record actions that are relevant to

1
http://www.motioneap.de/
Programming Ubiquitous Computing Environments 5

the process. Using a projector and monitoring the actions by a new person we can
replay the actions and adaapt them to a new user’s performance. See figure 1 foor a
photo of the system.

Fig. 1. The figure shows the MotionEAP system that allows semantically rich programm ming
by demonstration. The system observes actions and can replay recorded sequences adapted to a
new environment and users with w varying performance. Left: test scenario in the lab; riight:
application in an industrial pro
oduction process (photos curtesy to Markus Funk).

3.2 I Want it Like this,, but Different – Programming Using Examples


It is often hard to describe what one wants. In many areas in real life we use thiings
that are similar to what wee want as reference, and only described the differencees. I
would like such a burger bu ut with salad instead fries, or my car looks like this one, but
it is blue not red. By using an example as a reference the number of things that nneed
to be specified are typically y smaller and it appears much easier for the person listten-
ing to imagine what is deescribed. In professional programming we see a sim milar
approach. Very rarely we sttart to write software from scratch. Often we take exampples
of pieces of code, of functtions, or even whole projects that do something similarr to
what we want to implemeent. By modification and extension of examples it seeems
much quicker to create som mething that is close to what we want. It also helps to folllow
an agile process as based on n the example one may already have a working version.
We have explored this ap pproach for designing and implementing interactive culltur-
al heritage applications in n the context of the European project meSch 2 [5]. By
creating recipes for system ms, which describe instances of interactive elements and
installations, information iss collected for easy reuse. A recipe contains all informattion
about hardware and softwaare required, as well as the configuration details and the
specifically developed prog gram. Similar to cooking, a novice with some skill can jjust
replicate the recipe in their context, whereas an expert can take the recipe as an inspi-
ration and starting point to create
c their own interpretation of the system described.

2
http://mesch-projec
ct.eu/
6 A. Schmidt

4 Towards Enviro
onments that Learn from Us

Already now it is amazing how many examples of how to do things are availablee on
YouTube. Changing a tire,, playing the guitar, cooing paella, and repairing a broken
phones screen are well desccribed with hundreds of videos. Here people make a deliibe-
rated effort to record and sh
hare. To us this is just a starting point. Extrapolating thiis to
future interactive cyber-ph hysical environments where capturing is continuous and
multimodal one foresees that examples for everything humans do will become avaaila-
ble [6]. If such recordings are
a not just videos, but include sensor information, we can
imagine to have semanticallly rich recipes for everything mankind does.

Fig. 2. These examples from YouTube


Y give a glimpse of the many examples individuals w
will-
ing to share. Once recording becomes continuous and semantically rich through sensors, one
can imagine creating editable and
a executable examples of people’s actions.

References
1. Schmidt, A.: Ubiquitous co omputing: Are we there yet? Computer 43(2), 95–97 (2010)
2. Schmidt, A., Pfleging, B., B Alt, F., Shirazi, A.S., Fitzpatrick, G.: Interacting w with
21st-century computers. IE EEE Pervasive Computing 1, 22–31 (2011)
3. Broy, M., Schmidt, A.: Challenges
C in Engineering Cyber-Physical Systems. Compputer
47(2), 70–72 (2014)
4. Billard, A., Calinon, S., Diillmann, R., Schaal, S.: Robot programming by demonstrationn. In:
Springer handbook of robo otics, pp. 1371–1394. Springer Berlin Heidelberg (2008)
5. Petrelli, D., Ciolfi, L., vaan Dijk, D., Hornecker, E., Not, E., Schmidt, A.: Integraating
material and digital: a new way for cultural heritage. Interactions 20(4), 58–63 (2013)
6. Billinghurst, M., Davies, N.,
N Langheinrich, M., Schmidt, A.: Augmenting Human Memoory-
Capture and Recall in the t Era of Lifelogging (Dagstuhl Seminar 14362). Dagsstuhl
Reports 4, 151–173
Long Papers
Designing for End-User Development
in the Internet of Things

Barbara Rita Barricelli and Stefano Valtolina()

Department of Computer Science, Università degli Studi di Milano, Milano, Italy


{barricelli,valtolin}@di.unimi.it

Abstract. With the widespread of Internet of Things’ devices, sensors, and


applications the quantity of collected data grows enormously and the need of
extracting, merging, analyzing, visualizing, and sharing it paves the way for
new research challenges. This ongoing revolution of how personal devices are
used and how they are becoming more and more wearable has important influ-
ences on the most well established definitions of end user and end-user devel-
opment. The paper presents an analysis of the most diffused applications that
allow end users to aggregate quantified-self data, originated by several sensors
and devices, and to use it in personalized ways. From the outcomes of the anal-
ysis, we present a classification model for Internet of Things and new EUD
paradigm and language that extends the ones existing in the current state of the
art Internet of Things.

Keywords: Internet of Things · End-User Development · Quantified self · Life-


logging · Pervasive computing · Mobile devices · Unwitting developers · End
users

1 Introduction
The Internet of Things (IoT) concept was coined in 1999/2000 by Kevin Ashton and
his team at MIT’s Auto-ID Center [1] and rapidly spread around the world thanks to
the evolution of sensor technology and its use that is becoming more and more mobile
and pervasive [2]. To connect uniquely identified everyday objects in a network al-
lows to send and receive data and at the same time to influence the behavior of the
objects in two ways: automatic, on the basis of the collected data, and semi-
automatic/manual, according to users’ needs and/or preferences. Today, IoT is suc-
cessfully adopted in several application domains and it is estimated that in 2015 the
number of objects connected will be around 12 billion, while in 2020 it will be 50
billion [3][4].
Recent studies [5][6] show that the coming of IoT changed the way people use the
Internet, and mobile and sensor-based devices. This tendency is more relevant in do-
mains that present pervasive characteristics where the integration of data could help in
improving quality of life and in offering an even richer and satisfying experience of
use of everyday objects. This type of integration is what characterizes the so-called
lifelogging: keeping track of the collected data through all the everyday or occasional
© Springer International Publishing Switzerland 2015
P. Díaz et al. (Eds.): IS-EUD 2015, LNCS 9083, pp. 9–24, 2015.
DOI: 10.1007/978-3-319-18425-8_2
10 B.R. Barricelli and S. Valtolina

activities that may influence people’s quality of life. Lifelogging, initially conceived
in the 70s as a 24/7 broadcasting of self-videos, has become today a wide spreading
phenomenon, called quantified-self movement, that allows people to keep track of
their habits, health conditions, physiological data, and behavior, and to monitor condi-
tions and quality of the environments in which they work and live. Today, a conti-
nuously increasing number of lifelogging devices are on the market and become more
and more affordable to the masses.
In our research, we mainly study applications of lifelogging in three domains:
health, wellness, and domotics. In the health domain, people can collect data gathered
through several devices for monitoring, among all, blood pressure, heart beat rate,
glucose level, and coagulation factor. Lifelogging in the wellness domain allows to
keep track for example of weight, sport/fitness activity, calories intake, and sleep
quality. As to domotics, IoT helps in having better awareness about energy consump-
tion, use of entertainment or work appliances, and even care of gardens/plants. Some
of the most advanced IoT devices offer solutions based on artificial intelligence and
expert systems for avoiding to prompt users too often and risking to bother them with
too many questions. The idea to make objects and environments able to take decisions
on behalf of the users aims at not disturbing and overwhelming people in their every-
day lives. Although these automatic suggestions avoid to bother users by helping
them in managing objects more easily, we believe that the user control over connected
objects is a crucial element for IoT success. In fact, newly created Web, mobile,
wearable, and pervasive applications are today designed in a more user-centered
manner and particular attention is made in taking care of the user experience.
More than 20 years ago, Cypher [7] defined the end user as a “user of an applica-
tion program”, someone who is not a computer programmer and who “uses a comput-
er as part of daily life or daily work, but is not interested in computers per se”. In the
IoT era, this concept evolves because now machines are becoming part of the social
tissue and their use is common in almost every cultural context: with the growing
diffusion of mobile devices, like smartphones and tablets, pervasive computing is
spreading [8]. IoT allows the end users to manage physical devices, interactive sys-
tems, and quantified-self data by deciding how to create new usage scenarios and this
empowers them more than ever, making them evolve, as explained later in the paper,
to become end-user developers [9].
In Section 2, we describe how digital devices have become not only tools to satisfy
the need of getting jobs done but also the key for taking care of social relationships
(real or virtual) and to manage several aspects of personal life (e.g. financial, well-
ness, entertainment). Under this perspective, we describe IoT as an ecosystem of
objects and services that aim at supporting the end users in extracting, merging, ana-
lyzing, visualizing, and sharing data enabling them to unwittingly transforming the
data into information, information into knowledge, and knowledge into wisdom. This
scenario leads towards an innovative point of view on technology and mobility, focus-
ing diversity and agency as central aspects of a socially responsible approach to
mobile computing [10]. According to this consideration, we then discuss the most
consolidated definitions of end user and End-User Development (EUD) with respect
to the IoT domain. Even though the EUD definitions given in scientific literature
remain valid, we claim how the perspective has deeply changed. EUD in IoT is now
focused on how users interact with an ecosystem of elements and how they are able to
Designing for End-User Development in the Internet of Things 11

affect the way data is collected and aggregated. According to this new perspective, in
Section 3 we present the current state of the art of EUD in IoT and in particular we
present applications that enable the users to arrange data coming from IoT devic-
es/sensors and to aggregate it via Social Media, Mobile and Web apps. Finally, in
Section 4 we present the definition of a new EUD paradigm and language in IoT do-
main. Specifically, we propose a sensor-based rule language able to support the end
user in aggregating and combining data originated by several sensors/devices and in
creating personalized use of the quantified self-data. This language aims at enabling
end user for unwittingly developing personalized IoT environments according to spe-
cific temporal, spatial, and fuzzy conditions that may affect the elements in the IoT
environment.

2 End-User Development in the Internet of Things Era

The “old computing” as claimed by Shneiderman [11] is focused on what computers


can do for the user, while the “new computing” regards people activity and what
people can do by using computers. Users of digital devices and interactive systems are
increasingly evolving from passive consumers of data and computer tools into active
producers of information and software [12][13]. The potentials offered by network and
connectibility of the objects does not only enrich the person’s personal sphere but also
offers the possibility of sharing data with other people who can be family members,
friends, colleagues, or others. Data sharing contributes to the creation of a large quanti-
ty of data especially in the long term, calling for the integration of recommendation,
intelligent, and distributed systems in order to help in their aggregation and exploita-
tion. In this scenario, the end users finds themselves at the center of a complex ecosys-
tem that they need to manage in efficient, effective, satisfactory, and aware manner.
EUD represents the ideal approach for empowering the end users and make them be-
coming unwitting developers in their own IoT environment [14][15][16].

2.1 The IoT Ecosystem


In designing for the IoT, the attention is not focused on the development of a unique
interactive system but of an ecosystem of elements (hardware and software) that ex-
change data through the Internet and act and react in a semi-automatic or automatic
way according to events, and/or users’ preferences, rules, or decisions. At the center
of this ecosystem stands the end user, the one who generates (or contributes to) the
data, manages the IoT elements in the ecosystem, and unwittingly develops in the IoT
environment defining the interactions among the elements and the elements’ behavior.
The elements of the ecosystem (depicted in Figure 1) can be categorized into five
groups:

Sensors. The IoT sensors are typically built-in components in electronic devices
aimed at collecting data of various nature. Examples of sensors are those present in
devices for weather stations, activity tracking armbands, or Wi-Fi body scales. IoT
devices can be portable – meant to follow the end user everywhere (e.g. activity
12 B.R. Barricelli and S.
S Valtolina

trackers) – or unmovable – designed for being placed in a specific place and not
moved around (e.g. weatheer stations). Sensors and their devices can autonomouusly
send the data they collect or
o wait for the end user to collect the data when they nneed
to. They typically come witth applications for enable the end user to access them (bboth
settings and data) but can allso present an embedded stand-alone interface.

Fig. 1. The IoT ecosystems. The


T end user plays the central role deciding what elements to ccon-
nect, how to interact with them
m, and how they should interact with each other. (Icons madee by
Freepik from www.flaticon.com are licensed by CC BY 3.0).

Applications. Through theem, the end user is able to access the IoT devices. T They
typically are of two types: bundled with specific devices or compatible with seveeral
devices. Applications are ussually designed to be mobile-compliant giving the end uuser
the chance of interacting wiith the devices on remote setting.

Social Media. Those applications built on Web 2.0 principles and technology tthat
allow the end user to sharee content on the Internet. The relationship with IoT is tthat
most of its devices and app plications are equipped with social features that allow the
end user to share the colleccted data with virtual communities (friends, family, or ccol-
leagues in real life or people they just know on the Web).

Recommendation System ms (RS). In the context of IoT, recommendation serviices


aim at suggesting proper aggregation,
a integration and distribution strategies of ddata
coming from sensors or oth her informative resources and at tailoring them accordingg to
the context of use, the userss profile, and goals. However, the use of automatic suggges-
tions might be not appreciaated by the end user that may feel frustrated in using the RS
features, whenever the recoommendations appear to be inappropriate. To deal with this
problem, some RSs offer solutions
s able at exploiting end user’s social relationshhips
for improving the service qu uality.
Designing for End-User Development in the Internet of Things 13

Other IoT users. Those people who belong to the virtual communities mentioned
before. They typically share with the end user some particular interests, life choices,
or other aspects. Is the end user who chooses the people to be connected with on the
basis of personal searches or suggestions made by the applications (thanks to RSs).
The quantity of different types of IoT devices that are today on the market is conti-
nuously growing and their variety leads to a higher and higher level of complexity in
the IoT ecosystem. To support the integration of new IoT devices and related applica-
tions into the ecosystem and understand how to better empower the end user in becom-
ing unwitting developer of their own IoT environment, we propose a 3-dimensional
model of classification (Figure 2) that is based on three peculiar aspects in IoT: space,
time, and social dimension.

Space. This dimension goes from “settled” to “mobile”. Elements in the “settled” area
of the 3D model are typically constrained to a fixed position (e.g., home, office) and
are not supposed to be used on the move. Examples of such category are devices for
ambient surveillance, weather stations, energy consumption monitoring, water leak
sensors. On the other hand, “mobile” elements are designed to be used in different
places while accompanying the user during their movements. An example of this
category of elements are wearable devices that are used to track activity, calories
burning, and physiological data (e.g., fitness armbands, smartwatches).

Time. Along this axis, an element can be categorized as asynchronous or synchron-


ous. Asynchronous elements are typically those that collect data only when the user
decides to, while synchronous elements collect and analyze data on the fly when they
are generated without the need of having users directly involved. Especially earlier
IoT devices were not equipped with Bluetooth/Wi-Fi connectivity and a mechanical
action by the users was required to connect the device with a smartphone, a tablet or a
desktop PC in order to collect the data generated by the device’s use. Today, most of
the IoT devices are designed to be standalone and directly connected to the Internet so
that the users’ intervention can be very limited.

Social Dimension. An element may be designed for individual use, if it is supposed


to be used by a user only, or for collective use, if the element’s data are meant to be
accessed by many users and not only by the element’s owner. Choosing between shar-
ing and keeping private the data collected via IoT devices can be driven by personal
motivations or by default characteristics of the devices themselves; sometimes in fact,
IoT devices are meant to be used individually only and the sharing of data can be
achieved only using third-party applications.
14 B.R. Barricelli and S.
S Valtolina

Fig. 2. The 3D model for classifying IoT devices according to space, time and soocial
dimension

Table 1. The octaants resulting from the 3D space depicted in Figure 2

Octant Social dimension Space Time Sign


ns
I Collectivee Mobile Synchronous +++
II Individuall Mobile Synchronous -++
III Individuall Settled Synchronous --+
IV Collectivee Settled Synchronous +-+
V Collectivee Mobile Asynchronous ++-
VI Individuall Mobile Asynchronous -+-
VII Individuall Settled Asynchronous ---
VIII Collectivee Settled Asynchronous +--

Such representation allows to identify the position of the elements in terms of oc-
tants of the 3D space. Tablle 1 presents all the octants in the model. The most soccial,
connected, flexible, and mo obile elements are those located in octant 1 (+ + +), whhile
the elements that present less
l degree of flexibility and personalization and do not
follow the users in their soccial and real life are those octant VII (- - -). Given the fllex-
ibility of some IoT devices,, it is important to keep into account that the position off the
elements in the 3D space model
m of classification may change in time because thheir
state can dynamically chan nge according to users’ behavior and preferences. It cann be
used both as a tool for anaalyze an existing IoT ecosystem and to explore and beetter
understand its potentials, or
o as a classification to inform IoT ecosystems design tthat
Another random document with
no related content on Scribd:
It is delightful to witness the care which the swallow manifests
towards her brood. When able to leave the nest, she leads them to
the ridge of the barn, where, settled in a row, and as yet unable to fly,
she feeds them with great assiduity. In a day or two they become
capable of flight, and then they follow their parents in all their
evolutions, and are fed by them while on the wing. In a short time
they commence an independent career, and set up for themselves.
The notes of the swallow, though hurried and twittering, are very
pleasing; and the more so as they are associated in our minds with
ideas of spring, and calm serenity, and rural pleasures. The time in
which the bird pours forth its melody is chiefly at sunrise, when, in
“token of a goodly day,” his rays are bright and warm.
“The breezy call of incense-breathing morn,
The swallow, twittering from the straw-built shed,”
unite alike to call man from his couch of rest, and to praise “the God
of seasons as they roll.”
After the work of rearing the young, ere autumn sears the leaf, the
swallow prepares to depart. Multitudes, from various quarters, now
congregate together, and perch at night in clusters on barns or the
branches of trees, but especially among the reeds of marshes and
fens, round which they may be observed wheeling and sinking and
rising again, all the time twittering vociferously, before they finally
settle. It was from this circumstance that some of the older
naturalists supposed the swallow to become torpid and remain
submerged beneath the water during winter, and to issue forth from
its liquid tenement on the return of spring; a theory utterly
incompatible with reason and facts, and now universally discarded.
The great body of these birds depart about the end of September.
The Holy Scriptures make frequent allusions to this interesting
bird. Jeremiah, reproaching the Jews for their turning away from
God, alludes to the swallow as obeying His laws, while they who
have seen his glory rebelled: “Yea, the stork in the heaven knoweth
her appointed times; and the turtle and the crane and the swallow
observe the time of their coming; but my people know not the
judgment of the Lord.” viii. 7.
The Psalmist notices the partiality of this bird for the temple of
worship, the sanctuary of God: “Yea, the sparrow hath found an
house, and the swallow a nest for herself, where she may lay her
young, even thine altars, O Lord of hosts, my King and my God.”
Psalm lxxxiv. 3. Hezekiah, king of Judah, wrote of himself, “Like a
crane or a swallow, so did I chatter.” Is. xxxviii. 14. In these casual
notices we at least trace out that the habits, migration, and song of
the swallow, were known to the inspired writers; a circumstance of
no little value, since a false assertion that the facts of natural history
are not correctly stated in the Bible, has long been among the weak
engines used by the infidel against the validity of that book, “which
maketh wise unto salvation.”
The Sand Martin, or Bank Swallow, is a most curious bird of this
family. It is the least of the tribe, and the first to arrive, appearing a
week or two before the swallow, and often while the weather is
severe. Its flight is vacillating, but it is equally fond of skimming over
the surface of the water. This bird, unlike its race, mines deep holes
in sand or chalk cliffs, to the depth of two feet, or even more, at the
extremity of which it constructs a loose nest of fine grass and
feathers, artificially put together, in which it rears its brood.
The sand martin is of a social disposition; hence flocks of them
unite to colonize a favorite locality, such as a precipitous bank or
rock, which they crowd with their burrows. Professor Pallas says,
that on the high banks of the Irtish, their nests are in some places so
numerous, that, when disturbed, the inmates come out in vast flocks
and fill the air like flies; and, according to Wilson, they swarm in
immense multitudes along the banks of the Ohio and Kentucky.
What, it may be asked, are the instruments by which this little
creature is able to bore into the solid rock, and excavate such a
chamber? Its beak is its only instrument. This is a sharp little awl,
peculiarly hard, and tapering suddenly to a point from a broad base;
with this tool the bird proceeds to work, picking away from the centre
to the circumference of the aperture, which is nearly circular; thus it
works round and round as it proceeds, the gallery being more or less
curved in its course, and having a narrow funnel-shaped termination.
The author of “The Architecture of Birds” informs us that he has
watched one of these swallows “cling with its sharp claws to the face
of a sandbank, and peg in its bill, as a miner would do his pickaxe, till
it had loosened a considerable portion of the sand, and then tumbled
it down amongst the rubbish below.”
The Human Frame likened to a House.
Man’s body’s like a house: his greater bones
Are the main timbers; and the lesser ones
Are smaller joists; his limbs are laths daubed o’er,
Plastered with flesh and blood; his mouth’s the door;
His throat’s the narrow entry; and his heart
Is the great chamber, full of curious art.
His stomach is the kitchen, where the meat
Is often put, half sod, for want of heat.
His spleen’s a vessel nature does allot
To take the scum that rises from the pot;
His lungs are like the bellows, that respire
In every office, quickening every fire;
His nose the chimney is, whereby are vented
Such fumes as with the bellows are augmented;
His eyes are crystal windows, clear and bright,
Let in the object, and let out the sight;
And as the timber is, or great or small,
Or strong or weak, ’tis apt to stand or fall.
Chinese Spectacles.

Mr. Davis, in his account of China, tells us that the people there
do not make glass that is fine enough for spectacles, and therefore
they use pieces of rock crystal for the purpose. The rims of the
spectacles are of immense size and width, and give a very wise
appearance to the wearer. The spectacles are attached to the head
by silken strings slung over the ears, as represented in the picture.
View of the Bastile.
Story of Philip Brusque;

s h o w i n g t h e n at u r e a n d n e c e s s i t y o f
government and laws.

CHAPTER I.
Early Life of Philip Brusque.—​He engages in the French Revolution.
—​Is at length suspected by Robespierre, and obliged to fly.—​
Enters on board a Ship, and is cast away upon an uninhabited
Island in the Indian Ocean.—​Description of the place.—​Philip
fancies that he is now happy, having found perfect Liberty.

Philip Brusque was a young Frenchman, who engaged very


heartily in the revolution that began to agitate France about the year
1789. He was young, ardent and discontented. Though he had little
education, he had still read many of the papers and pamphlets of the
day. These had filled his mind with a horror of kings, and the most
intoxicating dreams of liberty. Knowing little of political government,
except that of France, and which he saw to be corrupt and despotic,
he adopted the idea that all government was bad, and to this he
attributed nearly all the evils of society. With the ardor of a young but
heated fancy, he looked forward to the destruction of the monarchy
as certain to bring a political millennium, when every man should
walk forth in freedom and happiness, restrained by no law except the
moral sense of man, and the innate perception and love of human
rights.
With these views, which were then common among the French
people, and which artful disorganizers had disseminated, in order
thereby to acquire power, Philip arrived at Paris. He was soon
engaged in several of the debating clubs of that great metropolis,
and being possessed of natural eloquence, he speedily became a
leader. He was present at the destruction of the Bastile, and his own
vigorous hand battered down more than one of the iron doors of that
horrid prison. Looking upon these gloomy walls, with their dark
chambers, and the chains and instruments of torture which were
found there, as at once emblems and instruments of that tyranny
which had cursed his country for ages, Philip felt a high inspiration in
witnessing its demolition. As one portion after another of the massy
wall was hurled to the earth, he seemed to fancy that a whole nation
must breathe more freely; and in seeing the pallid wretches delivered
from the dungeon, where some of them had been imprisoned for
years, he seemed to think that he saw the spirit of his country set at
liberty.
The Bastile was soon but a heap of ruins. The whole fabric of the
French monarchy, which had existed for twelve centuries, in a few
brief years had shared the same fate. Louis XVI. had been
beheaded, and his beautiful queen had been brought to the block. In
all these scenes Brusque had taken a part. He was present at the
execution of Marie Antoinette. He had no respect for majesty, but he
was not yet lost to a sense of decency in respect to woman. The
shocking and brutal insults offered to the queen, worse than anything
ever witnessed among savages, disgusted Philip. He was indeed
sick of blood, and he ventured to speak his sentiments aloud. His
words were repeated to Robespierre and the rest of the bloody men
who then held the sway. Philip became suspected, and he was
obliged to fly to save his life. He reached the coast of France with
difficulty, and entering on board a merchant ship as a sailor, set out
upon a voyage to China.
Nothing remarkable happened for some time; but when the ship
had doubled the Cape of Good Hope, and entered the Indian Ocean,
a violent storm arose. The vessel contended bravely with the waves
for a time, but at length her masts were swept away, the helm was
broken, and the hull of the ship rolled like a log amidst the tumbling
waters. She then drifted for a time at the mercy of the winds, and at
length came near a small island. She then struck on a rock, and
went to pieces. All the crew were drowned except the hero of our
story, who seized upon a plank, and, after two days of toil and
suffering, reached the shore of the island.
He landed upon a pebbly beach, but he was so exhausted as only
to be able to draw himself up from the waves. There he lay for a long
time, almost unconscious of existence. At length, his strength
returned, and he began to think over what had happened. When his
reason was, at last, fully returned, he fell upon his knees, and
thanked Heaven for his preservation. It was the first prayer he had
uttered for years, for Philip Brusque had been told by the French
revolutionists that there was no God, and that prayer was a mere
mockery. But now he prayed, and felt in his heart that there was
indeed a God, that claimed gratitude and thanksgiving from the lips
of one who had been saved from death, while his companions had
all been drowned.
Philip was soon able to look about the island and make
observations. It was a lovely spot, about four miles in circuit, and
pleasantly varied with hills and valleys. It was almost covered with
beautiful trees, on some of which there were delicious fruits. Birds of
bright feathers and joyous notes glanced through the forests, and
sweet perfumes were wafted on the warm, soft breezes. Philip
walked about the island, his delight and wonder increasing at every
step. And what seemed to please him most of all was, that the island
was without a single human inhabitant except himself.
“Now,” said Philip, in the fulness of his heart, “I shall be happy.
Here I can enjoy perfect liberty. Here is no prison like the Bastile;
here is no king to make slaves of his fellow-men; here is no
Robespierre to plot the murder of his fellow-citizens. Oh liberty! how
have I worshipped thee, and here, in this lone island, I have now
found thee. Here, I can labor or rest, eat or drink, wake or sleep, as I
please. Here is no one to control my actions or my thoughts. In my
native country, all the land belongs to a few persons, but here I can
take as much land as I please. I can freely pick the fruit from the
trees according to my choice or my wants. How different is my
situation from what it was in France! There, everything belonged to
somebody, and I was restrained from taking anything, unless I paid
for it. Here, all is free; all is mine. Here I can enjoy perfect liberty. In
France, I was under the check and control of a thousand laws; here,
there is no law but my own will. Here, I have indeed found perfect
liberty.”
(To be continued.)
The Sailor’s Family.

There once lived in Ireland a sailor, who had a wife and one
child. He was poor, but still he provided a small house for his family,
had it decently furnished, and, as he always brought them money
when he came home from his voyages, they were quite comfortable.
He was very fond of his little boy, and he, too, was very fond of his
father. The sailor used to go in a ship to the West Indies, and, when
he returned, he always brought back some nice oranges and other
good things for his little son.
Well, the Irishman, whose name was Kelly, had once been gone
on a voyage to the West Indies for several months, and his family
were expecting every day that he would return. Whenever the door
was opened, the boy looked up to see if it was not his father who
had come.
Four months passed away, and no news came. And now Mrs.
Kelly had become very much afraid that something had happened to
her husband. She feared that the vessel had been cast away upon
some rocky shore, or that it had sunk in the deep sea, or that some
other misfortune had occurred, by which her husband had perished.
The boy, too, became very uneasy, and was every day expressing
his wonder that his father did not come back. At length, a man, who
lived near by, came into the house, and told Mrs. Kelly that he had
brought sad news. He then went on to tell her that the vessel in
which her husband sailed, had been driven ashore in a gale of wind,
and dashed to pieces upon a rocky island, and it was supposed that
all on board had perished.
Some persons from another vessel had landed upon the island,
and found papers and pieces of the wreck upon the shore, by which
they knew it was the vessel in which Kelly had sailed. The island was
small, and there was no person upon it.
This was sad intelligence to the poor sailor’s wife, and it was long
before she could find it in her heart to break the news to her child.
When he heard it, he shed many tears, and peace returned no more
to the sailor’s home.
Being deprived of the assistance of her husband, Mrs. Kelly was
obliged to make great exertions to support herself and child with
comfort. She was, however, very industrious, and, for a time, she got
along pretty well.
At length she was taken sick, and a little girl was added to her
family. When she was partially recovered, she found herself poor,
and a good deal in debt to her landlord. He was a cruel man; he took
away her furniture for what she owed him, and then turned the
widow and her family into the street.
The poor woman was still unwell; and it was with great difficulty
that she walked about a mile to the house of a farmer, whom she
knew, hoping that he would render her assistance. But he would give
her nothing.
She was now in great distress, and did not know where to find
even shelter. Sad, sick, and almost broken-hearted, she crept toward
a stable, and sat down upon some straw. Here she remained for
some time, with her infant in her arms, and her boy’s head resting on
her lap.
Where could she now look for aid? She had no friends, from
whom she could expect assistance. At length her thoughts turned to
that good Being, who is ever the friend of the poor and the
distressed. To him she prayed fervently, and so deeply was her mind
absorbed in this act of devotion, that she did not notice a man who at
the moment was passing by, on the public road.
He was on foot, and seeing the woman and her children, stepped
toward them, to observe them more carefully. When Mrs. Kelly had
finished her petition and opened her eyes, the man was standing
before her.
She instantly perceived that he was a sailor, and that his
countenance bespoke amazement; and then it struck her that he
seemed to bear a wonderful likeness to her lost husband. At length
he spoke her name, and the poor woman, betwixt fear and joy, would
have fallen through faintness to the ground. Kelly supported her, for
it was he!
When she recovered, mutual explanations took place. She told
her story, and he related his, which was this. The ship in which he
sailed was wrecked upon the island, and all perished save himself
and two others. These were taken off the island, by a vessel going to
the East Indies. As soon as he could, he left this ship, and got into a
vessel that was going to England; and thus, after an absence of
eight months, returned to his country. I need not attempt to describe
the happiness that now filled again the hearts of the sailor’s family.
The Groom and the Horse;
a fa b l e , t o s h o w t h e d i s a d va n ta g e s o f
deception.
A groom, whose business it was to take care of a certain horse,
let the animal go loose into the field. After a while, he wanted to
catch him, but the brute chose to run about at liberty, rather than be
shut up in the stable; so he pranced round the field and kept out of
the groom’s way. The groom now went to the granary, and got the
measure with which he was wont to bring the horse his oats. When
the horse saw the measure, he thought to be sure that the groom
had some oats for him; and so he went up to him, and was instantly
caught and taken to the stable.
Another day, the horse was in the field, and refused to be caught.
So the groom again got the measure, and held it out, inviting the
horse, as before, to come up to him. But the animal shook his head,
saying, “Nay, master groom; you told me a lie the other day, and I am
not so silly as to be cheated a second time by you.”
“But,” said the groom, “I did not tell you a lie; I only held out the
measure, and you fancied that it was full of oats. I did not tell you
there were oats in it.”
“Your excuse is worse than the cheat itself,” said the horse. “You
held out the measure, and thereby did as much as to say, ‘I have got
some oats for you.’”
Actions speak as well as words. Every deceiver, whether by
words or deeds, is a liar; and nobody, that has been once deceived
by him, will fail to shun and despise him ever after.
The Druids.

The Druids were a remarkable race of priests, who first came


into Europe with the Celts, the first settlers of that quarter of the
globe, and who seem to have exercised almost unlimited sway in
civil and religious matters. Of their origin and history very little is
known; but the early writers have given such accounts of them as to
make it evident that their influence among the Gauls and Britons was
very great. At the time they flourished, Christianity had not
penetrated into those countries, and the religion of the Druids was
exercised there without check or control. The best account of them is
given by Julius Cæsar, who conquered Gaul and a part of Britain
about fifty years before Christ; but these countries were so wild and
uncultivated, and the manners of the people so barbarous, that all
the intelligence he could collect respecting this singular race of men,
is far from satisfying our curiosity.
The Druids appear to have exercised the office of civil
magistrates, as well as that of ministers of religion. Neither their laws
nor precepts of religion were committed to writing, but were
preserved in poems, which were learned by heart, and recited on
special occasions. They had the power of life and death over the
multitude; and such was the superstitious terror with which they
inspired the people, that their orders were always implicitly obeyed.
The most characteristic part of their religious worship was their
veneration for the oak tree, and the mistletoe, which is a plant that
grows on the trunks of the oak. No ceremony was performed by the
Druids without some part of this tree being used to consecrate it.
They wore garlands of oak leaves upon their heads, for they
believed that everything which grew upon this tree came from
heaven.
The ceremony of gathering the mistletoe was always performed
with much solemnity, and in such a manner as to strike the multitude
with awe. This plant is very rare, and when any of it was discovered,
the Druids set out with great pomp to procure it. This was always
done on the sixth day of the moon, a day which they deemed of
particular sanctity. When they arrived at the oak on which the
mistletoe grew, a great banquet and sacrifice was prepared under
the tree. Two white bulls were tied by the horns to the trunk of the
tree. One of the priests, clad in a white garment, then mounted the
tree, and with a golden knife cut off the mistletoe, which was
received by another priest in a white cloak. They then offered up
their prayers and sacrifices. The mistletoe, besides being an object
of religious veneration, was considered an antidote to poison, and to
possess many other virtues.
The Druids performed their worship in the deepest recesses of
the woods, far from human dwellings; a circumstance which added
to the superstitious awe with which the common people regarded
them. One of these spots is described by the poet Lucan. This wood,
according to his account, had never been touched by the axe since
the creation. The trees of it grew so thick and were so interwoven,
that the rays of the sun could not penetrate through the branches,
and a damp and chilling darkness reigned throughout. Nothing was
to be seen in the neighborhood except a multitude of altars, on which
human victims had been sacrificed, and the blood of which had
stained the trees of a horrid crimson. Ancient traditions affirmed that
no bird ever perched upon their branches, no beast ever walked
under them, no wind ever blew through them, and no lightning ever
struck them.
The idols which these gloomy recesses contained, were a species
of rude and shapeless trunks, having some resemblance to the
human figure, and covered with a tawny yellow moss. If the
superstitious belief of the multitude might be credited, these mystic
groves were frequently shaken by some unearthly movement, and
dreadful sounds issued from the caverns and hollows which
abounded in them. Sometimes, we are told, the woods would be
wrapt in a flame of fire without being consumed; and sometimes the
oaks would be twined round with monstrous dragons. At the hours of
noon and midnight the priests entered these gloomy abodes, to

You might also like