{"title":"An Infrastructured-Architectural Model (IAM) for Pervasive & Ubiquitous Computing","authors":"R. Gunasekaran, V. R. Uthariaraj","doi":"10.5220/0002563300490059","DOIUrl":"https://doi.org/10.5220/0002563300490059","url":null,"abstract":"An extensible and modular architecture called IAM that addresses this information-routing problem while leveraging significant existing work on composable Internet services and adaptation for heterogeneous devices is described here. IAM's central abstraction is the concept of a trigger, a selfdescribing chunk of information bundled with the spatial and/or temporal constraints that define the context in which the information should be delivered. The IAM architecture manages triggers at a centralized infrastructure server and arranges for the triggers to be distributed to pervasive computing devices that can detect when the trigger conditions have been satisfied and alert the user accordingly. The main contribution of the architecture is an infrastructurecentric approach to the trigger management problem. We argue that pervasive computing devices benefit from extensive support in the form of infrastructure computing services in at least two ways. First, infrastructure adaptation services can help manage communication among heterogeneous devices. Second, access to public infrastructure services such as MapQuest and Yahoo can augment the functionality of trigger management because they naturally support the time and location dependent tasks typical of pervasive-computing users. We describe our experience with a functional prototype implementation that exploits GPS to","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131726992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis on IP - based Soft Handover across ALL-IP Wireless Networks","authors":"F. Belghoul, Y. Moret, C. Bonnet","doi":"10.5220/0002686500830093","DOIUrl":"https://doi.org/10.5220/0002686500830093","url":null,"abstract":"Mobile users are facing the fact that many heterogenous radio access technologies coexist, ranging from wireless LANs to cellular systems. No technology has emerged as common and universal solution which makes the current trends today toward design of All-IP wireless networks, where radio cells are under the control of IP Access Routers for signalling and data transmission. In such as networks, an IP-device with multiple radio interfaces or software radio can roam between different radio networks regardless the heterogeneity of radio access technologies. The design of an All-IP wireless network requires an efficient and flexible IP-based handover management, and a major issue in handover control is how to reduce data loss and avoid additional end to end transmission delay. In this paper we propose and evaluate mechanisms to handle soft-handover management in IP layer over heterogenous networks. Those mechanisms coexist with Mobile IPv6 and allow efficient micro mobility management.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126174869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovering Relevant Services in Pervasive Environments Using Semantics and Context","authors":"Luke Steller, S. Krishnaswamy, J. Newmarch","doi":"10.5220/0002476200030012","DOIUrl":"https://doi.org/10.5220/0002476200030012","url":null,"abstract":"Recent advances have enabled provision and consumption of mobile services by small handheld devices. These devices have limited capability in terms of processing ability, storage space, battery life, network connectivity and bandwidth, which presents new challenges for service discovery architectures. As a result, there is an increased imperative to provide service requesters with services which are the most relevant to their needs, to mitigate wastage of precious device capacity and bandwidth. Service semantics must be captured to match services with requests, on meaning not syntax. Furthermore, requester and service context must be utilized during the discovery process. Thus, there is a need for a service discovery model that brings together ‘semantics’ and ‘context’. We present a case for bringing together semantics and context for pervasive service discovery by illustrating improved levels of precision and recall, or in other words increased relevance. We also present our model for integrating semantics and context for pervasive service discovery.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122341380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated Authorization for Grid System Environments","authors":"Jiageng Li","doi":"10.5220/0002571300940100","DOIUrl":"https://doi.org/10.5220/0002571300940100","url":null,"abstract":"Grid computing has received widespread attention in recent years as a significant new research field. Yet to date, there has been only a limited work on the grid system authorization problem. In this paper, we address the authorization problem and its requirements in a grid system environment. We propose a new integrated authorization service that tackles the authorization problem at two levels: grid system level and organization unit level. It is shown that the new approach not only meets the requirements of the authorization in grid system environment but also overcomes the disadvantages found in existing authorization designs.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114709232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-demand Loading of Pervasive-oriented Applications Using Mass-market Camera Phones","authors":"M. Avvenuti, Alessio Vecchio","doi":"10.5220/0002501600390048","DOIUrl":"https://doi.org/10.5220/0002501600390048","url":null,"abstract":"Camera phones are the first realistic platform for the development of pervasive computing applications: they are personal, ubiquitous, and the builtin camera can be used as a context-sensing equipment. Unfortunately, currently available systems for pervasive computing, emerged from both academic and industrial research, can be adopted only on a small fraction of the devices already deployed or in production in the next future. In this paper we present an extensible programming infrastructure that turns mass-market phones into a platform for pervasive computing. 1 Mobile phone: a platform for pervasive computing Pervasive computing tries to make M. Weiser’s vision [1] a reality by saturating the environment with computing and communication devices: the most of the infrastructure is often invisible and supports user’s activities with an interaction model that is strongly human-centric. Today, almost fifteen years later, despite significant progresses in both hardware and software technologies, this vision is still not completely realizable or economically convenient. Supporting the interaction between users and the environment can be greatly simplified if we relax the interaction model and include a personal device as the access medium. Mobile phones are the most obvious candidates: they are in constant reach of their users, have wireless connectivity capabilities, and are provided with increasing computing power [2]. Even better results can be achieved with those phones that are equipped with a camera. Instead of manually getting information or editing configurations, users can point physical objects to express their will of using them: taking a picture of the objects would suffice to setup the link with the offered services. Relaying on an image acquisition device does not impose a strict limit to the share of possible users, since an always growing number of commercially available mobile phone is equipped with an integrated camera: according to recent studies [3], over 175 million camera phones were shipped in 2004 and, by the end of the decade, the global population of camera phones is expected to surpass 1 billion. ? This work is partially supported by the Italian Ministry for Education and Scientific Research (MIUR) in the framework of the FIRB-VICOM project. However, the acquisition of context-related information through images is not a trivial task, especially with resource-constrained devices. To ease the recognition process, objects can be labeled with visual tags readable by machines. Once decoded, visual tags either directly provide information about the resource they are attached to or, if the amount of information is too large, they act as resource identifiers that can be used to gather information from the network. In this paper, we describe the design and the implementation of POLPO 1 (Polpo is On-demand Loading of Pervasive-Oriented applications), a software system that turns mass-market phones into a platform for the development o","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121967789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrei Oliveira da Silva, D. Waldman, Paulo Henrique de Souza Schneider, Fabricio D'Avila Cabral, Ana Cristina Benso da Silva, João Batista S. de Oliveira
{"title":"An User and Location Management System for Wireless Networks","authors":"Andrei Oliveira da Silva, D. Waldman, Paulo Henrique de Souza Schneider, Fabricio D'Avila Cabral, Ana Cristina Benso da Silva, João Batista S. de Oliveira","doi":"10.5220/0002666301600169","DOIUrl":"https://doi.org/10.5220/0002666301600169","url":null,"abstract":"This work presents a wireless user low-grain position management system (up to 5 meters) for Wi-Fi networks. The location system is based on access point identification, where the user’s device is associated, through the events generated by the access point. In this context, the access point is a station managed with SNMP. Hence, the system receives information from other SNMP agents that interact with the wireless user authentication system to provide information about users, at what time the client uses to get in the network, among others. These information will be to refine the management system for users and resources.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126939734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service Composition Based Middleware Architecture for Mobile Grid","authors":"M. Mohamed, D. Ram","doi":"10.5220/0002571400390046","DOIUrl":"https://doi.org/10.5220/0002571400390046","url":null,"abstract":"Service Composition refers to the construction of complex services with the help of more primitive and easily executable services or components. With the proliferation of wireless communication and the mobile Internet, the demand for mobile data services has increased. In addition the recent spurt of eservices and m-services has increased the importance of service composition. We envisage service composition to play a crucial role in providing mobile devices access to complex services. The basis for our proposed approach is to virtualize the individual system resources as services that can be described, discovered and dynamically configured at runtime to execute an application. The paper discuss a novel paradigm which integrates mobile devices into the traditional grid, with the capability for composition of services. To accomplish such a global service composition in the new model we propose to add functional layers over the already proposed Anonymous Remote Mobile Cluster Computing model. The idea behind such middleware is to use the available resources efficiently and to hide the complexity inherent in managing heterogeneous services. This paper describes the unique capabilities of the proposed middleware and gives the layered view of the proposed architecture.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131256488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ubiquitous Application Development using a Mobile Agent-based System","authors":"Kazutaka Matsuzaki, Nobukazu Yoshioka, S. Honiden","doi":"10.5220/0002681802040212","DOIUrl":"https://doi.org/10.5220/0002681802040212","url":null,"abstract":"This study proposes a methodology that allows the flexible and maintainable development of application based on mobile agent to a ubiquitous environment. Ubiquitous environment is to support people’s movement in an inconspicuous and unobtrusive way while they are executing applications. This requires the various kinds of concerns to be written in application code, which makes the application code monolithic. A monolithic code reduces its flexibility and maintainance faculty. Coding techniques to improve the efficiency and testing makes the matter worse. This paper introduce a Worklfow-awareness model based on agent pairing which makes it possible to tune up a performance of the application without disorganizing the application logic. AspectJ is used to combine the non-application logics specific to a deployed environment.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128771878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Acceptable Public-Key Encryption in Sensor Networks","authors":"Erik-Oliver Blass, M. Zitterbart","doi":"10.5220/0002563200880093","DOIUrl":"https://doi.org/10.5220/0002563200880093","url":null,"abstract":"One of the huge problems for security in sensor networks is the lack of resources. Based on microcontroller architectures with severe limited computing abilities, strong public-key cryptography is commonly seen as infeasible on sensor devices. In contrast to this prejudice this paper presents an efficient and lightweight implementation of public-key cryptography algorithms relying on elliptic curves. The code is running on Atmels popular 8Bit ATMEGA128 microcontroller, the heart of the MICA2 platform.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117101125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PLOG: Easily Create Digital Picture Stories Through Cell Phone Cameras","authors":"R. Gossweiler, Joshua Tyler","doi":"10.5220/0002669300940103","DOIUrl":"https://doi.org/10.5220/0002669300940103","url":null,"abstract":"With a cell phone camera a person can take pictures and imme diately transmit them to larger repositories using telecommunication channels. This provides the potential for anywhere, anytime picture sharing and story telling. It can also increase awareness among peers within a social network. But while we enjoy telli ng stories around this informal content, the necessary act of downloading, organizing and then presenting the digital media is tedious and can discourage frequent use. We present PLOG, an application that stresses ease-of-use story telling through cell pho ne photography. The user simply takes pictures and performs simple click -and-send uploads using their phone. From a local machine, PLOG automatically downloads the images; time clusters the pictures together and then presents them as story vignettes. These vignettes can be viewed different ways and at home, shared with friends or posted in public places. We describe the implementation of PLOG and di scuss issues related to this light -weight method of story telling and awareness.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130457783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}