International Workshop on Ubiquitous Computing最新文献

筛选
英文 中文
Augmenting a Museum Visitor's Tour with a Context Aware Framework 使用上下文感知框架增强博物馆游客之旅
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002669401040112
A. Rakotonirainy, N. Lehman
{"title":"Augmenting a Museum Visitor's Tour with a Context Aware Framework","authors":"A. Rakotonirainy, N. Lehman","doi":"10.5220/0002669401040112","DOIUrl":"https://doi.org/10.5220/0002669401040112","url":null,"abstract":"We present a context awareness framework to assist a Museum visitor’s learning process by providing an enriched tour experience. We adapt the information a visitor receives about an artwork based on their interests and knowledge. We show how this is achievable by implementing a system that passively and unobtrusively gathers information using physical and virtual context. We also allow the visitor to visit virtually museums in different places while still benefiting from information adapted to their interests and knowledge.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121962221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Service Discovery Infrastructure for Heterogeneous Wired/Bluetooth Networks 异构有线/蓝牙网络的服务发现基础结构
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002671301700179
E. Pagani, Stefano Tebaldi, G. P. Rossi
{"title":"A Service Discovery Infrastructure for Heterogeneous Wired/Bluetooth Networks","authors":"E. Pagani, Stefano Tebaldi, G. P. Rossi","doi":"10.5220/0002671301700179","DOIUrl":"https://doi.org/10.5220/0002671301700179","url":null,"abstract":"Specifications of some applications based on the Bluetooth protocol stack have already been standardized by the Bluetooth Special Interest Group. Those applications can however be accessed inside a piconet, while Bluetooth devices belonging to different piconets are not able so far of cooperating in a distributed application. In this paper, a framework is proposed that allows a Bluetooth device to search for services provided by other devices, also in case they are connected to different piconets that communicate through a wired network. The proposed framework has been implemented on a testbed platform and its suitability has been tested by using it to distribute a file transfer service over a heterogeneous network.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127903130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementing a Pervasive Meeting Room: A Model Driven Approach 实现普适会议室:模型驱动的方法
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002477100130020
Javier Muñoz, V. Pelechano, Carlos Cetina
{"title":"Implementing a Pervasive Meeting Room: A Model Driven Approach","authors":"Javier Muñoz, V. Pelechano, Carlos Cetina","doi":"10.5220/0002477100130020","DOIUrl":"https://doi.org/10.5220/0002477100130020","url":null,"abstract":"Current pervasive systems are developed ad-hoc or using implementation frameworks. These approaches could be not enough when dealing with large and complex pervasive systems. This paper introduces an implementation of a pervasive system for managing a meeting room. This system has been developed using a model driven method proposed by the authors. The system is specified using PervML, a UML-like modeling language. Then, a set of templates are applied to the specification in order to automatically produce Java code that uses an OSGi-based framework. The final application integrates several technologies like EIB and Web Services. Three different user interfaces are provided for interacting with the system.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121001447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Protecting People on the Move through Virtual Personal Security 通过虚拟个人安全保护移动中的人们
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002658701390146
Dadong Wan, A. Gershman
{"title":"Protecting People on the Move through Virtual Personal Security","authors":"Dadong Wan, A. Gershman","doi":"10.5220/0002658701390146","DOIUrl":"https://doi.org/10.5220/0002658701390146","url":null,"abstract":"Ensuring personal safety for people on the move is becoming a heightened priority in today’s uncertain environment. Traditional approaches are no longer adequate in meeting rising demands in personal security. In this paper, we describe VIRTUAL PERSONAL SECURITY, a research prototype that demonstrates how technologies, such as ubiquitous surveillance cameras, location-aware PDAs and cell phones, wireless networks, and Web Services can be brought together to create a virtualized personal security service. By incorporating automatic service discovery, situated sensing and multimedia communication, the novel solution provides consumers with increasing availability, lower cost, and high flexibility. It also creates a new market for just-in-time micro security services, providing the owners of surveillance cameras a new revenue stream.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129289603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pervasive Secure Electronic Healthcare Records Management 普及的安全电子医疗记录管理
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002572801010110
P. Belsis, A. Malatras, S. Gritzalis, C. Skourlas, Ioannis Chalaris
{"title":"Pervasive Secure Electronic Healthcare Records Management","authors":"P. Belsis, A. Malatras, S. Gritzalis, C. Skourlas, Ioannis Chalaris","doi":"10.5220/0002572801010110","DOIUrl":"https://doi.org/10.5220/0002572801010110","url":null,"abstract":"Pervasive environments introduce a technological paradigm shift, giving a new impetus to the functionality of applications, overcoming applicability barriers of legacy applications. Electronic healthcare records management can clearly benefit from the new challenges brought by this emerging technology, due to its low cost and high percentage of user adoption. Still, the sensitivity of medical data, poses new requirements in the design of a secure infrastructure based on the ad-hoc networking schema, which underlies pervasive environments. User authorization and controlled access to information is of outmost importance. This paper proposes a management system for electronic healthcare records satisfying the aforementioned security requirements.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116052186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Context-Sensitive Conversation Patterns for Agents in Wireless Environments 无线环境中agent的上下文敏感会话模式
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002676800110017
Santtu Toivonen, Heikki Helin, M. Laukkanen, Tapio Pitkäranta
{"title":"Context-Sensitive Conversation Patterns for Agents in Wireless Environments","authors":"Santtu Toivonen, Heikki Helin, M. Laukkanen, Tapio Pitkäranta","doi":"10.5220/0002676800110017","DOIUrl":"https://doi.org/10.5220/0002676800110017","url":null,"abstract":"Abstract. We outline an approach for adapting software agent conversations between a mobile client and a service provider. The adaptation takes advantage of the context information characterizing the client’s current situation. The service provider takes this context information into account when selecting / creating a suitable interaction protocol for communicating with the client. Both the context information and the interaction protocol descriptions are based on ontologies, which are assumed to be known by the conversating agents.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134161183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Context-Aware Entity Recognition Scheme for Pervasive Computing 面向普适计算的上下文感知实体识别方案
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002662201470159
Rui He, J. Niu, Jianping Hu, Jian Ma
{"title":"A Context-Aware Entity Recognition Scheme for Pervasive Computing","authors":"Rui He, J. Niu, Jianping Hu, Jian Ma","doi":"10.5220/0002662201470159","DOIUrl":"https://doi.org/10.5220/0002662201470159","url":null,"abstract":"In the future world filled with pervasive computing, almost all entities can be mobile, which means not only service requesters but also service providers are always dynamic and unpredictable. This raises two security problems. For service providers, how can they keep their security capability when they move here and there? And for service requesters, how can they be trusted by various service providers that may have different security requirements? Unfortunately, available security mechanisms, including traditional authentication and authorization approaches and exotic trust management proposals, cannot solve the both two problems very well. In this paper, we propose a context-aware entity recognition scheme, which enables service providers to use their current trust infrastructures to determine whether requesters are trustworthy or not, and also enables service requesters to be recognized through exchanging different information with service providers according to different services they request and different security level service providers require. We argue for the notion of “Trust Infrastructure”, which is an abstract of all available trusted entities that can help an entity to recognize strangers in pervasive environments and can be dynamically built when entities move about. We also argue for an attribute-based recognition information exchange scheme, which makes it possible for service requesters to be checked in terms of trustworthiness in various scenarios. Finally, we give an algorithm to compute a service requester’s trust value based on the trust infrastructure of the service provider entity..","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133892609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interacting with our Environment through Sentient Mobile Phones 通过智能手机与环境互动
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002564000190027
D. López-de-Ipiña, Juan Ignacio Vázquez, D. Sainz
{"title":"Interacting with our Environment through Sentient Mobile Phones","authors":"D. López-de-Ipiña, Juan Ignacio Vázquez, D. Sainz","doi":"10.5220/0002564000190027","DOIUrl":"https://doi.org/10.5220/0002564000190027","url":null,"abstract":"The latest mobile phones are offering more multimedia features, better communication capabilities (Bluetooth, GPRS, 3G) and are far more easily programmable (extensible) than ever before. So far, the “killer apps” to exploit these new capabilities have been presented in the form of MMS (Multimedia Messaging), video conferencing and multimedia-on-demand services. We deem that a new promising application domain for the latest Smart Phones is their use as intermediaries between us and our surrounding environment. Thus, our mobiles will behave as personal butlers who assist us in our daily tasks, taking advantage of the computational services provided at our working or living environments. For this to happen, a key element is to add senses to our mobiles: capability to see (camera), hear (michrophone), notice (Bluetooth) the objects and devices offering computational services. In this paper, we present a solution to this issue, the MobileSense system. We illustrate its use in two scenarios: (1) making mobiles more accessible to people with disabilities and (2) enabling the mobiles as guiding devices within a museum.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125128281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
iCricket: A Programmable Brick for Kids' Pervasive Computing Applications iCricket:儿童普适计算应用的可编程砖
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002574100750081
F. Martin, K. Par, Kareem Abu-Zahra, Vasiliy Dulsky, A. Chanler
{"title":"iCricket: A Programmable Brick for Kids' Pervasive Computing Applications","authors":"F. Martin, K. Par, Kareem Abu-Zahra, Vasiliy Dulsky, A. Chanler","doi":"10.5220/0002574100750081","DOIUrl":"https://doi.org/10.5220/0002574100750081","url":null,"abstract":"The iCricket is a new internet-enabled embedded control board with built-in motor and sensor interface circuits. It is designed for use by pre-college students and other programming novices. It includes a Logo virtual machine with extensions that allow networked iCrickets communicate with one another, retrieving sensor values and remotely running each other’s Logo procedures. The underlying implementation uses standard HTTP protocols. The iCricket’s key contribution is that it will allow programming novices (children, artists, and other non-engineers) to implement pervasive computing applications with an easy-touse, interactive language (Logo). This paper focuses the iCricket hardware and software design. Later work will evaluate results of using the design with various users.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124044519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Service Composition in eHome Systems: A Rule-based Approach eHome系统中的服务组合:基于规则的方法
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002576700280038
M. Kirchhof, Philipp Stinauer
{"title":"Service Composition in eHome Systems: A Rule-based Approach","authors":"M. Kirchhof, Philipp Stinauer","doi":"10.5220/0002576700280038","DOIUrl":"https://doi.org/10.5220/0002576700280038","url":null,"abstract":"This paper deals with eHome systems. We focus on theservice composition in order to reduce complexity and to leverage maintainability and extensibility of eHome services. Talking about services, we mean any piece of software, which is executed in a network environment, making the usage and administration of ubiquitous appliances easier. Current situation is, that the complete functionality is hard-coded into services without the facilities to be extended or reused. Many logical correlations (e.g., how to react if an alarm condition is raised) are made explicit in an inappropriate way. To tackle this problem, we introduce a declarative approach to specify logical correlations and to combine functionalities and services to new services, offering the required flexibility and comprehen-","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115652445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书