{"title":"Design and implementation of a software infrastructure for integrating sentient artefact","authors":"F. Kawsar, K. Fujinami, T. Nakajima","doi":"10.1109/MOBIQUITOUS.2005.67","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.67","url":null,"abstract":"This paper presents a framework prototype for sentient environments. The framework provides a generic interface to the applications for interacting with sentient artefacts in a unified way regardless of their type and properties. As a result, application development is fairly simple, rapid and independent from the context-aware environments.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"641 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133038789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cooperative learning framework for mobility-aware resource management in multi-inhabitant smart homes","authors":"Nirmalya Roy, A. Roy, Sajal K. Das, K. Basu","doi":"10.1109/MOBIQUITOUS.2005.1","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.1","url":null,"abstract":"The essence of pervasive (ubiquitous) computing lies in the creation of smart environments saturated with computing and communication capabilities, yet gracefully integrated with human users. 'Context Awareness' is perhaps the most important feature of such an intelligent computing paradigm. The mobility and activity of the inhabitants play significant roles in forming the context at any instance of time. In order to extract the best performance and efficacy of smart computing environments, one needs a technology-independent, context-aware platform spanning over multiple inhabitants. In this paper, we have developed a framework for mobility-aware resource (in particular, energy consumption) management in a multi-inhabitant smart home, based on a dynamic, cooperative reinforcement learning technique. The inhabitants' mobility creates uncertainty of his location and activity. Using the proposed cooperative game-theory based framework, all the inhabitants currently present in the house attempt to minimize this overall uncertainty in the form of utility functions associated with them. Joint optimization of the utility function corresponds to the convergence to Nash equilibrium and helps in accurate prediction of inhabitants' future locations and activities. This results in adaptive control of automated devices and temperature of the house, thus providing an amicable environment and sufficient comfort to the inhabitants. Simulation results point out that our framework can adaptively control the smart environment, while reducing the energy consumption and enhancing the comfort.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132804737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A location aware mobile tourist guide selecting and interpreting sights and services by context matching","authors":"Klaus ten Hagen, Marko Modsching, R. Kramer","doi":"10.1109/MOBIQUITOUS.2005.4","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.4","url":null,"abstract":"Most tourists exploring a destination either join a guided tour or walk on their own using maps. Neither are their individual preferences nor the actual situation considered. These tours are strongly inflexible. The ideal is an intelligent guide taking care of the whole tour organisation and execution in time. This is the main objective of the dynamic tour guide (DTG). The DTG is a mobile agent that selects attractions, plans an individual tour, provides navigational guidance and offers location based interpretation. This kind of ambient intelligence is based on the analysis of all available context information to support the tourist in any possible way with the help of a mobile device.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122224638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical broadcast authentication in sensor networks","authors":"Donggang Liu, P. Ning, Sencun Zhu, S. Jajodia","doi":"10.1109/MOBIQUITOUS.2005.49","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.49","url":null,"abstract":"Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. /spl mu/TESLA and multi-level /spl mu/TESLA have been proposed to provide such services for sensor networks. However, none of these techniques are scalable in terms of the number of senders. Though multi-level /spl mu/TESLA schemes can scale up to large sensor networks (in terms of receivers), they either use substantial bandwidth and storage at sensor nodes, or require significant resources at senders to deal with DOS attacks. This paper presents efficient techniques to support a potentially large number of broadcast senders using /spl mu/TESLA instances as building blocks. The proposed techniques are immune to the DOS attacks. This paper also provides two approaches, a revocation tree based scheme and a proactive distribution based scheme, to revoke the broadcast authentication capability from compromised senders. The proposed techniques are implemented, and evaluated through simulation on TinyOS. The analysis and experiment show that these techniques are efficient and practical, and can achieve better performance than the previous approaches.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122761400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SRDP: securing route discovery in DSR","authors":"Jihye Kim, G. Tsudik","doi":"10.1109/MOBIQUITOUS.2005.54","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.54","url":null,"abstract":"Routing is a critical function in multi-hop mobile ad hoc networks (MANETs). A number of MANET-oriented routing protocols have been proposed, of which DSR is widely considered both the simplest and the most effective. At the same time, security in MANETs-especially, routing security-presents a number of new and interesting challenges. Many security techniques geared for MANETs have been developed, among which Ariadne is the flagship protocol for securing DSR. The focus of this work is on securing the route discovery process in DSR. Our goal is to explore a range of suitable cryptographic techniques with varying flavors of security, efficiency and robustness. The Ariadne approach (with TESLA), while very efficient, assumes loose time synchronization among MANET nodes and does not offer non-repudiation. If the fanner is not possible or the latter is desired, an alternative approach is necessary. To this end, we construct a secure route discovery protocol (SRDP) which allows the source to securely discover an authenticated route to the destination using either aggregated message authentication codes (MACs) or multi-signatures. Several concrete techniques are presented and their efficiency and security are compared and evaluated.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125341264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Temporal transcoding for mobile video communication","authors":"M. Bonuccelli, F. Lonetti, F. Martelli","doi":"10.1109/MOBIQUITOUS.2005.58","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.58","url":null,"abstract":"Third generation mobile communication systems will provide more advanced types of interactive and distribution services, and video is one of the most prominent applications for multimedia communications. Adapting the media content to different networks characteristics (communication links and access terminals), in order to enable video delivery with acceptable service quality, is one of the most important problems in this setting. In this paper, we consider one of the video adaptation methods, namely video transcoding, and we present new buffer-based strategies for temporal video transcoding in a real-time context. Simulation results show that our strategies achieve a good performance in hard transcoding conditions also.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121905525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bluetooth base station minimal deployment for high definition positioning","authors":"A. Genco, S. Sorce, G. Scelfo","doi":"10.1109/MOBIQUITOUS.2005.15","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.15","url":null,"abstract":"This paper discusses our approach to the problem of arranging a Bluetooth based positioning system capable of providing people coordinates in a given area with an accuracy as high as possible. Our strategy focuses on optimizing the disposition of a minimal number of available Bluetooth base stations in a subset of locations which are the only ones permitted by site characteristics and constraints. We used a genetic algorithm to this purpose and a layout chromosome whose best evolution suggested us how to deploy a minimal set of Bluetooth base stations. As a case study, we discuss our experiments and results which deal with a late middle age castle in Sicily where we carried out many trials.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115475995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving connectivity of wireless ad hoc networks","authors":"Ning Li, J. Hou","doi":"10.1109/MOBIQUITOUS.2005.32","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.32","url":null,"abstract":"A fully connected network topology is critical to many fundamental operations in wireless ad hoc networks. We study the problem of deploying additional wireless nodes to improve the connectivity of an existing wireless network. Given a disconnected network, we consider the connectivity improvement (CI) problem, i.e., how to deploy as few additional nodes as possible so that the augmented network is connected. We first prove the NP-completeness of CI, and then present a Delaunay triangulation-based algorithm, connectivity improvement using Delaunay triangulation (CIDT). We discuss several variations of CIDT, and propose two additional optimization techniques to further improve the performance. Finally, we demonstrate the effectiveness of CIDT, and compare the performance of its variations via J-Sim simulation.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129001546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An ECA-P policy-based framework for managing ubiquitous computing environments","authors":"C. Shankar, A. Ranganathan, R. Campbell","doi":"10.1109/MOBIQUITOUS.2005.11","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.11","url":null,"abstract":"Ubiquitous computing environments feature massively distributed systems containing a large number of devices, services and applications that help end-users perform various kinds of tasks. One way by which administrators and end-users can manage these environments is through the use of policies. In particular, obligation policies are used to specify what actions must or must not be performed by the environment on the occurrence of certain events. Obligation policies are often specified as event-condition-action (ECA) rules. However an important problem in ubiquitous computing systems is that different users and administrators may have conflicting policies for managing the system. Hence, a key challenge in policy-based management is detecting and resolving conflicts between multiple policy rules that get activated by a single event. Existing approaches are limited in power and scope mainly because they do not have semantic information about the effects of policy actions; hence, they cannot infer that two actions may conflict unless they are explicitly stated to be conflicting. In this paper, we propose an extended model of ECA called event-condition-action-post-condition (ECA-P), where developers and administrators can annotate actions with their effects. The ECA-P model allows inferring that actions may conflict based on conflicting post-conditions. Detected conflicts are resolved using meta-rules that specify preferred system states. The ECA-P framework also detects failures in policy execution by using postconditions to verify successful completion of policy actions. We present the details of the framework.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127363927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Loosely coupling ontological reasoning with an efficient middleware for context-awareness","authors":"A. Agostini, C. Bettini, Daniele Riboni","doi":"10.1109/MOBIQUITOUS.2005.34","DOIUrl":"https://doi.org/10.1109/MOBIQUITOUS.2005.34","url":null,"abstract":"Context-awareness in mobile and ubiquitous computing requires the acquisition, representation and processing of information which goes beyond the device features, network status, and user location, to include semantically rich data, like user interests and user current activity. On the other hand, when services have to be provided on-the-fly to many mobile users, the efficiency of reasoning with these data becomes a relevant issue. Experimental evidence has lead us to consider currently impractical a tight integration of ontological reasoning with rule based reasoning at the time of request. This paper illustrates a hybrid approach where ontological reasoning is loosely coupled with the efficient rule-based reasoning of a middleware architecture for service adaptation. While rule-based reasoning is performed at the time of service request to evaluate adaptation policies and reconcile possibly conflicting context information, ontological reasoning is mostly performed asynchronously by local context providers to derive non-shallow context information. A limited form of ontological reasoning is activated at the time of request only when essential for service provisioning.","PeriodicalId":129488,"journal":{"name":"The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132475125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}