Wearable computing facilitates a new form of human--computer interaction comprising a small body--worn computer (e.g. user--programmable device) that is always on and always ready and accessible. In this regard, the new computational framework differs from that of hand held devices, laptop computers and personal digital assistants (PDAs). The ``always ready'' capability leads to a new form of synergy between human and computer, characterized by long-term adaptation through constancy of user--interface.

What is a wearable computer

A wearable computer is a computer that is subsumed into the personal space of the user, controlled by the user, and has both operational and interactional constancy, i.e. is always on and always accessible. Most notably, it is a device that is always with the user, and into which the user can always enter commands and execute a set of such entered commands, and in which the user can do so while walking around or doing other activities. The most salient aspect of computers, in general, (whether wearable or not) is their {\em reconfigurability} and their {\em generality}, e.g. that their function can be made to vary widely, depending on the instructions provided for program execution. With the wearable computer (WearComp), this is no exception, e.g. the wearable computer is more than just a wristwatch or regular eyeglasses: it has the full functionality of a computer system but in addition to being a fully featured computer, it is also inextricably intertwined with the wearer. This is what sets the wearable computer apart from other wearable devices such as wristwatches, regular eyeglasses, wearable radios, etc.. Unlike these other wearable devices that are not programmable (reconfigurable), the wearable computer is as reconfigurable as the familiar desktop or mainframe computer. Wearable computing will now be formally defined in terms of its three basic modes of operation and its six fundamental attributes.

Operational modes of wearable computing

There are three operational modes in this new interaction between human and computer:

  • Constancy: The computer runs continuously, and is ``always ready'' to interact with the user. Unlike a hand-held device, laptop computer, or PDA, it does not need to be opened up and turned on prior to use. The signal flow from human to computer, and computer to human,  runs continuously to provide a constant user--interface.
  • Augmentation: Traditional computing paradigms are based on the notion that computing is the primary task. Wearable computing, however, is based on the notion that computing is NOT the primary task. The assumption of wearable computing is that the user will be doing something else at the same time as doing the computing. Thus the computer should serve to augment the intellect, or augment the senses.  
  • Mediation: Unlike hand held devices, laptop computers, and PDAs, the wearable computer can encapsulate us . It doesn't necessarily need to completely enclose us, but the concept allows for a greater degree of encapsulation than traditional portable computers. There are two aspects to this encapsulation:
  • Solitude: It can function as an information filter, and allow us to block out material we might not wish to experience, whether it be offensive advertising, or simply a desire to replace existing media with different media. In less severe manifestations, it may simply allow us to alter our perception of reality in a very mild sort of way.
  • Privacy: Mediation allows us to block or modify information leaving our encapsulated space. In the same way that ordinary clothing prevents others from seeing our naked bodies, the wearable computer may, for example, serve as an intermediary for interacting with untrusted systems, such as third party digital anonymous cash ``cyberwallets''. In the same way that martial artists, especially stick fighters, wear a long black robe that comes right down to the ground, in order to hide the placement of their feet from their oponent, wearable computing can also be used to clothe our otherwise transparent movements in cyberspace. Although other technologies, like desktop computers, can help us protect our privacy with programs like Pretty Good Privacy (PGP), the achilles tendon of these systems is the space between us and them. It is generally far easier for an attacker to compromise the link between us and the computer (perhaps through a so-called trojan horse or other planted virus) than it is to compromise the link between our computer and other computers. Thus wearable computing can be used to create a new level of personal privacy because it can be made much more personal, e.g. so that it is always worn, except perhaps during showering, and therefore less likely to fall prey to covert attacks upon the hardware itself. Moreover, the close synergy between the human and computers makes it harder to attack directly, e.g. as one might peek over a person's shoulder while they are typing, or hide a video camera in the ceiling above their keyboard. Furthermore, the wearable computer can take the form of undergarments that are encapsulated in an outer covering or outerwear of fine conductive fabric to protect from an attacker looking at radio frequency emissions. The actual communications between the wearer and other computers (and thus other people) can be done by way of outer garments, which contain conformal antennas, or the like, and convey an encrypted bitstream.
Join now!

Because of its ability to encapsulate us, e.g. in embodiments of wearable computing that are actually articles of clothing in direct contact with our flesh, it may also be able to make measurements of various physiological quantities. Thus the signal flow depicted in Fig 1a is also enhanced by the encapsulation as depicted in Fig 1c.  

Wearable computing is a framework for enabling various degrees of each of these three fundamental modes of operation. Collectively, the space of possible signal flows giving rise to this entire space of possibilities, is  

While individual embodiments of wearable computing may use ...

This is a preview of the whole essay