International Workshop on Ubiquitous Computing最新文献

筛选
英文 中文
An Infrastructured-Architectural Model (IAM) for Pervasive & Ubiquitous Computing 普适与泛在计算的基础架构-体系结构模型(IAM)
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002563300490059
R. Gunasekaran, V. R. Uthariaraj
{"title":"An Infrastructured-Architectural Model (IAM) for Pervasive & Ubiquitous Computing","authors":"R. Gunasekaran, V. R. Uthariaraj","doi":"10.5220/0002563300490059","DOIUrl":"https://doi.org/10.5220/0002563300490059","url":null,"abstract":"An extensible and modular architecture called IAM that addresses this information-routing problem while leveraging significant existing work on composable Internet services and adaptation for heterogeneous devices is described here. IAM's central abstraction is the concept of a trigger, a selfdescribing chunk of information bundled with the spatial and/or temporal constraints that define the context in which the information should be delivered. The IAM architecture manages triggers at a centralized infrastructure server and arranges for the triggers to be distributed to pervasive computing devices that can detect when the trigger conditions have been satisfied and alert the user accordingly. The main contribution of the architecture is an infrastructurecentric approach to the trigger management problem. We argue that pervasive computing devices benefit from extensive support in the form of infrastructure computing services in at least two ways. First, infrastructure adaptation services can help manage communication among heterogeneous devices. Second, access to public infrastructure services such as MapQuest and Yahoo can augment the functionality of trigger management because they naturally support the time and location dependent tasks typical of pervasive-computing users. We describe our experience with a functional prototype implementation that exploits GPS to","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131726992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis on IP - based Soft Handover across ALL-IP Wireless Networks 基于IP的全IP无线网络软切换性能分析
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002686500830093
F. Belghoul, Y. Moret, C. Bonnet
{"title":"Performance Analysis on IP - based Soft Handover across ALL-IP Wireless Networks","authors":"F. Belghoul, Y. Moret, C. Bonnet","doi":"10.5220/0002686500830093","DOIUrl":"https://doi.org/10.5220/0002686500830093","url":null,"abstract":"Mobile users are facing the fact that many heterogenous radio access technologies coexist, ranging from wireless LANs to cellular systems. No technology has emerged as common and universal solution which makes the current trends today toward design of All-IP wireless networks, where radio cells are under the control of IP Access Routers for signalling and data transmission. In such as networks, an IP-device with multiple radio interfaces or software radio can roam between different radio networks regardless the heterogeneity of radio access technologies. The design of an All-IP wireless network requires an efficient and flexible IP-based handover management, and a major issue in handover control is how to reduce data loss and avoid additional end to end transmission delay. In this paper we propose and evaluate mechanisms to handle soft-handover management in IP layer over heterogenous networks. Those mechanisms coexist with Mobile IPv6 and allow efficient micro mobility management.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126174869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Discovering Relevant Services in Pervasive Environments Using Semantics and Context 使用语义和上下文发现普适环境中的相关服务
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002476200030012
Luke Steller, S. Krishnaswamy, J. Newmarch
{"title":"Discovering Relevant Services in Pervasive Environments Using Semantics and Context","authors":"Luke Steller, S. Krishnaswamy, J. Newmarch","doi":"10.5220/0002476200030012","DOIUrl":"https://doi.org/10.5220/0002476200030012","url":null,"abstract":"Recent advances have enabled provision and consumption of mobile services by small handheld devices. These devices have limited capability in terms of processing ability, storage space, battery life, network connectivity and bandwidth, which presents new challenges for service discovery architectures. As a result, there is an increased imperative to provide service requesters with services which are the most relevant to their needs, to mitigate wastage of precious device capacity and bandwidth. Service semantics must be captured to match services with requests, on meaning not syntax. Furthermore, requester and service context must be utilized during the discovery process. Thus, there is a need for a service discovery model that brings together ‘semantics’ and ‘context’. We present a case for bringing together semantics and context for pervasive service discovery by illustrating improved levels of precision and recall, or in other words increased relevance. We also present our model for integrating semantics and context for pervasive service discovery.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122341380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Integrated Authorization for Grid System Environments 网格系统环境的集成授权
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002571300940100
Jiageng Li
{"title":"Integrated Authorization for Grid System Environments","authors":"Jiageng Li","doi":"10.5220/0002571300940100","DOIUrl":"https://doi.org/10.5220/0002571300940100","url":null,"abstract":"Grid computing has received widespread attention in recent years as a significant new research field. Yet to date, there has been only a limited work on the grid system authorization problem. In this paper, we address the authorization problem and its requirements in a grid system environment. We propose a new integrated authorization service that tackles the authorization problem at two levels: grid system level and organization unit level. It is shown that the new approach not only meets the requirements of the authorization in grid system environment but also overcomes the disadvantages found in existing authorization designs.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114709232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On-demand Loading of Pervasive-oriented Applications Using Mass-market Camera Phones 使用大众市场的照相手机按需加载面向普及的应用程序
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002501600390048
M. Avvenuti, Alessio Vecchio
{"title":"On-demand Loading of Pervasive-oriented Applications Using Mass-market Camera Phones","authors":"M. Avvenuti, Alessio Vecchio","doi":"10.5220/0002501600390048","DOIUrl":"https://doi.org/10.5220/0002501600390048","url":null,"abstract":"Camera phones are the first realistic platform for the development of pervasive computing applications: they are personal, ubiquitous, and the builtin camera can be used as a context-sensing equipment. Unfortunately, currently available systems for pervasive computing, emerged from both academic and industrial research, can be adopted only on a small fraction of the devices already deployed or in production in the next future. In this paper we present an extensible programming infrastructure that turns mass-market phones into a platform for pervasive computing. 1 Mobile phone: a platform for pervasive computing Pervasive computing tries to make M. Weiser’s vision [1] a reality by saturating the environment with computing and communication devices: the most of the infrastructure is often invisible and supports user’s activities with an interaction model that is strongly human-centric. Today, almost fifteen years later, despite significant progresses in both hardware and software technologies, this vision is still not completely realizable or economically convenient. Supporting the interaction between users and the environment can be greatly simplified if we relax the interaction model and include a personal device as the access medium. Mobile phones are the most obvious candidates: they are in constant reach of their users, have wireless connectivity capabilities, and are provided with increasing computing power [2]. Even better results can be achieved with those phones that are equipped with a camera. Instead of manually getting information or editing configurations, users can point physical objects to express their will of using them: taking a picture of the objects would suffice to setup the link with the offered services. Relaying on an image acquisition device does not impose a strict limit to the share of possible users, since an always growing number of commercially available mobile phone is equipped with an integrated camera: according to recent studies [3], over 175 million camera phones were shipped in 2004 and, by the end of the decade, the global population of camera phones is expected to surpass 1 billion. ? This work is partially supported by the Italian Ministry for Education and Scientific Research (MIUR) in the framework of the FIRB-VICOM project. However, the acquisition of context-related information through images is not a trivial task, especially with resource-constrained devices. To ease the recognition process, objects can be labeled with visual tags readable by machines. Once decoded, visual tags either directly provide information about the resource they are attached to or, if the amount of information is too large, they act as resource identifiers that can be used to gather information from the network. In this paper, we describe the design and the implementation of POLPO 1 (Polpo is On-demand Loading of Pervasive-Oriented applications), a software system that turns mass-market phones into a platform for the development o","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121967789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An User and Location Management System for Wireless Networks 无线网络的用户和位置管理系统
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002666301600169
Andrei Oliveira da Silva, D. Waldman, Paulo Henrique de Souza Schneider, Fabricio D'Avila Cabral, Ana Cristina Benso da Silva, João Batista S. de Oliveira
{"title":"An User and Location Management System for Wireless Networks","authors":"Andrei Oliveira da Silva, D. Waldman, Paulo Henrique de Souza Schneider, Fabricio D'Avila Cabral, Ana Cristina Benso da Silva, João Batista S. de Oliveira","doi":"10.5220/0002666301600169","DOIUrl":"https://doi.org/10.5220/0002666301600169","url":null,"abstract":"This work presents a wireless user low-grain position management system (up to 5 meters) for Wi-Fi networks. The location system is based on access point identification, where the user’s device is associated, through the events generated by the access point. In this context, the access point is a station managed with SNMP. Hence, the system receives information from other SNMP agents that interact with the wireless user authentication system to provide information about users, at what time the client uses to get in the network, among others. These information will be to refine the management system for users and resources.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126939734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Service Composition Based Middleware Architecture for Mobile Grid 基于服务组合的移动网格中间件体系结构
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002571400390046
M. Mohamed, D. Ram
{"title":"Service Composition Based Middleware Architecture for Mobile Grid","authors":"M. Mohamed, D. Ram","doi":"10.5220/0002571400390046","DOIUrl":"https://doi.org/10.5220/0002571400390046","url":null,"abstract":"Service Composition refers to the construction of complex services with the help of more primitive and easily executable services or components. With the proliferation of wireless communication and the mobile Internet, the demand for mobile data services has increased. In addition the recent spurt of eservices and m-services has increased the importance of service composition. We envisage service composition to play a crucial role in providing mobile devices access to complex services. The basis for our proposed approach is to virtualize the individual system resources as services that can be described, discovered and dynamically configured at runtime to execute an application. The paper discuss a novel paradigm which integrates mobile devices into the traditional grid, with the capability for composition of services. To accomplish such a global service composition in the new model we propose to add functional layers over the already proposed Anonymous Remote Mobile Cluster Computing model. The idea behind such middleware is to use the available resources efficiently and to hide the complexity inherent in managing heterogeneous services. This paper describes the unique capabilities of the proposed middleware and gives the layered view of the proposed architecture.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131256488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ubiquitous Application Development using a Mobile Agent-based System 基于移动代理系统的泛在应用程序开发
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002681802040212
Kazutaka Matsuzaki, Nobukazu Yoshioka, S. Honiden
{"title":"Ubiquitous Application Development using a Mobile Agent-based System","authors":"Kazutaka Matsuzaki, Nobukazu Yoshioka, S. Honiden","doi":"10.5220/0002681802040212","DOIUrl":"https://doi.org/10.5220/0002681802040212","url":null,"abstract":"This study proposes a methodology that allows the flexible and maintainable development of application based on mobile agent to a ubiquitous environment. Ubiquitous environment is to support people’s movement in an inconspicuous and unobtrusive way while they are executing applications. This requires the various kinds of concerns to be written in application code, which makes the application code monolithic. A monolithic code reduces its flexibility and maintainance faculty. Coding techniques to improve the efficiency and testing makes the matter worse. This paper introduce a Worklfow-awareness model based on agent pairing which makes it possible to tune up a performance of the application without disorganizing the application logic. AspectJ is used to combine the non-application logics specific to a deployed environment.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128771878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Acceptable Public-Key Encryption in Sensor Networks 传感器网络中可接受的公钥加密
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002563200880093
Erik-Oliver Blass, M. Zitterbart
{"title":"Towards Acceptable Public-Key Encryption in Sensor Networks","authors":"Erik-Oliver Blass, M. Zitterbart","doi":"10.5220/0002563200880093","DOIUrl":"https://doi.org/10.5220/0002563200880093","url":null,"abstract":"One of the huge problems for security in sensor networks is the lack of resources. Based on microcontroller architectures with severe limited computing abilities, strong public-key cryptography is commonly seen as infeasible on sensor devices. In contrast to this prejudice this paper presents an efficient and lightweight implementation of public-key cryptography algorithms relying on elliptic curves. The code is running on Atmels popular 8Bit ATMEGA128 microcontroller, the heart of the MICA2 platform.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117101125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
PLOG: Easily Create Digital Picture Stories Through Cell Phone Cameras PLOG:通过手机相机轻松创建数字图片故事
International Workshop on Ubiquitous Computing Pub Date : 1900-01-01 DOI: 10.5220/0002669300940103
R. Gossweiler, Joshua Tyler
{"title":"PLOG: Easily Create Digital Picture Stories Through Cell Phone Cameras","authors":"R. Gossweiler, Joshua Tyler","doi":"10.5220/0002669300940103","DOIUrl":"https://doi.org/10.5220/0002669300940103","url":null,"abstract":"With a cell phone camera a person can take pictures and imme diately transmit them to larger repositories using telecommunication channels. This provides the potential for anywhere, anytime picture sharing and story telling. It can also increase awareness among peers within a social network. But while we enjoy telli ng stories around this informal content, the necessary act of downloading, organizing and then presenting the digital media is tedious and can discourage frequent use. We present PLOG, an application that stresses ease-of-use story telling through cell pho ne photography. The user simply takes pictures and performs simple click -and-send uploads using their phone. From a local machine, PLOG automatically downloads the images; time clusters the pictures together and then presents them as story vignettes. These vignettes can be viewed different ways and at home, shared with friends or posted in public places. We describe the implementation of PLOG and di scuss issues related to this light -weight method of story telling and awareness.","PeriodicalId":104268,"journal":{"name":"International Workshop on Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130457783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书