T. Romão, Luís Rato, Pedro Fernandes, Nuno Alexandre, Antão Almada, Nuno Capeta
{"title":"M-Traffic - A Traffic Information and Monitoring System for Mobile Devices","authors":"T. Romão, Luís Rato, Pedro Fernandes, Nuno Alexandre, Antão Almada, Nuno Capeta","doi":"10.5220/0002500000870092","DOIUrl":"https://doi.org/10.5220/0002500000870092","url":null,"abstract":"CITI/FCT/UNL - Quinta da Torre, 2829-516 Caparica, PortugalAbstract. This paper presents Mobile Traffic (M-Traffic), a multiplat-form online traffic information system, which provides real time trafficinformation based on image processing, sensor’s data and traveller be-haviour models. In order to estimate route delay and feed the optimalrouting algorithm a traffic microscopic simulation model is developed andsimulation results are presented. This mobile information service ubiqui-tously provides users with traffic information regarding their needs andpreferences, according to an alert system, which allows a personalisedpre-definition of warning messages.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128059108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ADS-Directory Services for Mobile Ad-Hoc Networks Based on an Information Market Model","authors":"Christian Hutter, Matthias R. Brust, S. Rothkugel","doi":"10.5220/0002672701950203","DOIUrl":"https://doi.org/10.5220/0002672701950203","url":null,"abstract":"Ubiquitous computing based on small mobile devices using wireless communication links is becoming very attractive. The computational power and storage capacities provided allow the execution of sophisticated applications. Due to the fact that sharing of information is a central problem for distributed applications, the development of self organizing middleware services providing high level interfaces for information managing is essential. ADS is a directory service for mobile ad-hoc networks dealing with local and nearby information as well as providing access to distant information. The approach discussed throughout this paper is based upon the concept of information markets.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133093269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architectural Patterns for Context-Aware Services Platforms","authors":"P. D. Costa, L. F. Pires, M. V. Sinderen","doi":"10.5220/0002573800030018","DOIUrl":"https://doi.org/10.5220/0002573800030018","url":null,"abstract":"Architectural patterns have been proposed in many domains as means of capturing recurring design problems that arise in specific design situations. In this paper, we present three architectural patterns that can be applied beneficially in the development of context-aware services platforms. These patterns present solutions for recurring problems associated with managing context information and proactively reacting upon context changes. We demonstrate the benefits of applying these patterns by discussing the AWARENESS architecture.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125886179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating local services and applications into external user home environments","authors":"Helder Pinto, R. Jose","doi":"10.5220/0002679601190128","DOIUrl":"https://doi.org/10.5220/0002679601190128","url":null,"abstract":"Users moving between different ubiquitous computing environments should be able to take a full profit of the resources existent there, if their home environment (e.g. a mobile portal) could seamlessly integrate with local infrastructure. Pursuing such goal, this paper focuses on the aspects of integrating local applications and services into an external user home environment, with particular emphasis on the interoperability and performance issues. Based on the concept of Value ADded Environment (VADE), as an administrative and physical domain, where the locally available facilities can be combined with external user home environments, the paper presents a middleware solution supporting the integration of local services and applications available in VADE environments into an external portal.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"69 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113961098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hold the Sources: A Gander At J2ME Optimisation Techniques","authors":"P. Mihailescu, Habin Lee, J. Shepherdson","doi":"10.5220/0002674600730082","DOIUrl":"https://doi.org/10.5220/0002674600730082","url":null,"abstract":"With the advent of the Java 2 Micro Edition platform, developers have the ability to develop Java based mobile applications that benefit from features such as device independence, and memory abstraction. However, applications also inherit many limitations such as slow execution, and excessive memory usage that impact on overall application performance and usability. The aim of this paper is to present and evaluate six known optimisation techniques for improving the performance and usability of Java based mobile applications. Some of these techniques are dependent on features provided within the IBM WebSphere Studio Device Developer IDE. A real life multi-agent based mobile application is presented to demonstrate the performance and usability improvements that have been gained through applying these optimisation techniques.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"11 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114111513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Position Estimation on a Grid, Based on Infrared Pattern Reception Features","authors":"N. Petrellis, Nikos Konofaos, G. Alexiou","doi":"10.5220/0002478000210028","DOIUrl":"https://doi.org/10.5220/0002478000210028","url":null,"abstract":"The location of the position of a moving target on a grid plane is studied in this paper. The estimation method is based on encountering the number of infrared patterns that arrive to the target as expected, unexpected or out of order. Since the position of the target is not determined by an analog signal intensity, no high precision sensors and measurements are required and the coordinate estimation can be carried out by a pair of transmitters and a pair of sensors on the moving target. The speed of the estimation is adjustable according to the desired accuracy. An error of less than 5% can be reached in most of the covered area. The presented system can be used in a number of automation, robotics, virtual reality and ubiquitous applications.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117206187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stability in Context-Aware Pervasive Systems: A State-Space Modeling Approach","authors":"A. Padovitz, A. Zaslavsky, S. Loke, B. Burg","doi":"10.5220/0002675901290138","DOIUrl":"https://doi.org/10.5220/0002675901290138","url":null,"abstract":"This paper proposes a conceptual framework for context-awaresystems, inspired by the state-space modeling approach and proposes the concept of Stability as a means to characterize pervasive systems. We provide a collection of concepts concerning context, including Stability of contextaware pervasive systems and show how these concepts can be used in modeling context and actively maintaining stability and adaptation in a pervasive system. We experimentally evaluate these concepts using a genetic algorithm in a Smart Presentation Theatre scenario.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128553666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Design Theory for Pervasive Information Systems","authors":"Panos E. Kourouthanassis, G. Giaglis","doi":"10.5220/0002503700620070","DOIUrl":"https://doi.org/10.5220/0002503700620070","url":null,"abstract":"Pervasive Information Systems (PIS) constitute an emerging class of Information Systems where Information Technology is gradually embedded in the physical environment, capable of accommodating user needs and wants when desired. PIS differ from Desktop Information Systems (DIS) in that they encompass a complex, dynamic environment composed of multiple artefacts instead of Personal Computers only, capable of perceiving contextual information instead of simple user input, and supporting mobility instead of stationary services. This paper aims at proposing a design theory for PIS. In particular, we have employed Walls et al. (1992) framework of Information Systems Design Theories (ISDT) to develop a set of prescriptions that guide the design of PIS instances. The design theory addresses both the design product and the design process by specifying four metarequirements, nine meta-design considerations, and five design method considerations. The design theory has been validated through the implementation of an Information System in the retail context following the theory’s prescriptions. A field experiment revealed that the design theory is capable of leading to valuable and acceptable PIS instances.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123288500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Uncertainty in Context-Aware Computing: Appealing to High-Level and Same-Level Context for Low-Level Context Verification","authors":"A. Padovitz, S. Loke, A. Zaslavsky","doi":"10.5220/0002664600620072","DOIUrl":"https://doi.org/10.5220/0002664600620072","url":null,"abstract":"There is an inherent chasm between the real-world and the world that can be perceived by computer systems, yielding uncertainty and ambiguity in system perceived context, with consequent effect on the performance of con- text-aware systems. While the problem is complex in depth and breadth, we explore an approach where context is characterized at different levels of ab- straction, and where contextual information at high-levels of abstraction and sensed context at low-levels of abstraction can be used to validate and correct low-level sensed context such as location. We describe a randomly generated simulation of locations that might be sensed by a positioning technology, and how our approach can be used to validate and correct the sensed locations.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134263968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elena Vildjiounaite, P. Alahuhta, P. Ahonen, David Wright, M. Friedewald
{"title":"Design Guidelines for Analysis and Safeguarding of Privacy Threats in Ubicomp Applications","authors":"Elena Vildjiounaite, P. Alahuhta, P. Ahonen, David Wright, M. Friedewald","doi":"10.5220/0002499800490061","DOIUrl":"https://doi.org/10.5220/0002499800490061","url":null,"abstract":"Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy due to constant information collection by numerous tiny sensors, active information exchange over short and long distances, long-term storage of large quantities of data, and reasoning on collected and stored data. An analysis of more than 100 Ubicomp scenarios, however, shows that applications nowadays are often developed without considering privacy issues. This paper suggests guidelines for estimation of threats to privacy, depending on real world application settings and on choice of technology; and guidelines for developing technological safeguards against privacy threats.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124369147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}