{"title":"Flockfs, a moderated group authoring system for wireless workgroups","authors":"Surendar Chandra, Nathan Regola","doi":"10.4108/ICST.MOBIQUITOUS2009.6814","DOIUrl":"https://doi.org/10.4108/ICST.MOBIQUITOUS2009.6814","url":null,"abstract":"This paper describes the design and implementation of a group authoring system for wireless users. Our analysis of the behavior of various groupware systems using wireless user availability traces showed that prior systems would have performed poorly, especially during peak availability durations when many group members were simultaneously available. These results motivate our design choices. flockfs maintains one updateable copy of the shared content on each group member's node. It also hoards read-only copies of each of these updateable copies in any interested group member's node. The various copies are reconciled using a moderation operation; each group member manually incorporates updates from all the other group members into their own copy. The various document versions will eventually converge into a single version through successive moderations. The system assists with this process by automatically logging the provenance of all causal reads of contents from other replicas into the author versions. A prototype userspace file system implementation of flockfs exhibits acceptable file system performance and update propagation latency.","PeriodicalId":163002,"journal":{"name":"2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114967592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DiaSim: A parameterized simulator for pervasive computing applications","authors":"Julien Bruneau, Wilfried Jouve, C. Consel","doi":"10.1109/PERCOM.2009.4912793","DOIUrl":"https://doi.org/10.1109/PERCOM.2009.4912793","url":null,"abstract":"Pervasive computing applications involve both software concerns, like any software system, and integration concerns, for the constituent networked devices of the pervasive computing environment. This situation is problematic for testing because it requires acquiring, testing and interfacing a variety of software and hardware entities. This process can rapidly become costly and time-consuming when the target environment involves many entities.","PeriodicalId":163002,"journal":{"name":"2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114446527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Óscar García-Morchón, T. Falck, T. Heer, Klaus Wehrle
{"title":"Security for pervasive healthcare","authors":"Óscar García-Morchón, T. Falck, T. Heer, Klaus Wehrle","doi":"10.4108/icst.mobiquitous2009.6962","DOIUrl":"https://doi.org/10.4108/icst.mobiquitous2009.6962","url":null,"abstract":"Wireless sensor networks are going to allow for ubiquitous health monitoring, improving users' well-being, making the healthcare system more efficient, and helping to quickly react on emergency situations. Meeting the strict security needs of ubiquitous medical applications is a big challenge: safety and privacy of patient data has to be guaranteed all the way from the sensor nodes to the back-end services, the system has to fulfill latency needs, and lots of mobility is expected. In this paper, we introduce a deployment model for wireless sensor networks for pervasive healthcare based on the concepts of patient area and medical sensor networks. We propose a complete and efficient security framework organized into three layers, addressing the operational requirements and security needs at the patient area network, medical sensor network, and back-end levels. We specify how these layers are interconnected with each other as well as the needed security and privacy mechanisms that allow for the efficient and practical deployment of secure pervasive healthcare systems based on wireless sensor networks.","PeriodicalId":163002,"journal":{"name":"2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130384434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}