2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)最新文献

筛选
英文 中文
Quality of information-aware real-time traffic flow analysis and reporting 高质量的信息感知实时交通流量分析和报告
Manisha Mukherjee, J. Edwards, H. Kwon, T. L. Porta
{"title":"Quality of information-aware real-time traffic flow analysis and reporting","authors":"Manisha Mukherjee, J. Edwards, H. Kwon, T. L. Porta","doi":"10.1109/PERCOMW.2015.7133996","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7133996","url":null,"abstract":"In this paper we present a framework for Quality of Information (QoI)-aware networking. QoI quantifies how useful a piece of information is for a given query or application. Herein, we present a general QoI model, as well as a specific example instantiation that carries throughout the rest of the paper. In this model, we focus on the tradeoffs between precision and accuracy. As a motivating example, we look at traffic video analysis. We present simple algorithms for deriving various traffic metrics from video, such as vehicle count and average speed. We implement these algorithms both on a desktop workstation and less-capable mobile device. We then show how QoI-awareness enables end devices to make intelligent decisions about how to process queries and form responses, such that huge bandwidth savings are realized.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"225 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124241449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic resource provisioning through Fog micro datacenter 通过Fog微数据中心进行动态资源发放
Mohammad Aazam, E. Huh
{"title":"Dynamic resource provisioning through Fog micro datacenter","authors":"Mohammad Aazam, E. Huh","doi":"10.1109/PERCOMW.2015.7134002","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134002","url":null,"abstract":"Lately, pervasive and ubiquitous computing services have been under focus of not only the research community, but developers as well. Different devices generate different types of data with different frequencies. Emergency, healthcare, and latency sensitive services require real-time response. Also, it is necessary to decide what type of data is to be uploaded in the cloud, without burdening the core network and the cloud. For this purpose, Fog computing plays an important role. Fog resides between underlying IoTs and the cloud. Its purpose is to manage resources, perform data filtration, preprocessing, and security measures. For this purpose, Fog requires an effective and efficient resource management framework, which we provide in this paper. Moreover, since Fog has to deal with mobile nodes and IoTs, which involves objects and devices of different types, having a fluctuating connectivity behavior. All such types of service customers have an unpredictable relinquish probability, since any object or device can quit resource utilization at any moment. In our proposed methodology for resource estimation and management, we have taken into account these factors and formulate resource management on the basis of fluctuating relinquish probability of the customer, service type, service price, and variance of the relinquish probability. Implementation of our system was done using Java, while evaluation was done on CloudSim toolkit. The discussion and results show that these factors can help service provider estimate the right amount of resources, according to each type of service customers.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126268536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 173
Communication coverage awareness for self-aligning wireless communication in disaster operations 灾害作战中自对准无线通信的通信覆盖意识
T. Pfeiffenberger, P. Dorfinger, Ferdinand von Tüllenburg
{"title":"Communication coverage awareness for self-aligning wireless communication in disaster operations","authors":"T. Pfeiffenberger, P. Dorfinger, Ferdinand von Tüllenburg","doi":"10.1109/PERCOMW.2015.7134085","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134085","url":null,"abstract":"Broad band communication in international disaster response actions is becoming more and more important. The information exchange between field commanders and tactical commanders lead to a better situational awareness on all layers of disaster management. After large scale disasters the communication infrastructure is often destroyed. Setting up a communication infrastructure is essential in todays disaster response actions. As organizations in disaster response actions are not consisting of IT experts, the setup and installation has to be easy. For example [1] presents such a system. Furthermore the knowledge where to deploy wireless communication gateways and wireless relay nodes is essential. Consequently the positions of field commanders can not only be based on tactical needs but also on communication needs. In this paper we present a simulation based visualization tool which helps to evaluate deployment locations for communication equipment to achieve adequate communication coverage with respect to specific disaster related information. This allows an optimal positioning of relay nodes and field commanders in the field to ensure broad band communication in disaster response actions and thus faster help for the people.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131694215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power optimization for wearable devices 可穿戴设备的电源优化
H. Kalantarian, N. Alshurafa, M. Pourhomayoun, M. Sarrafzadeh
{"title":"Power optimization for wearable devices","authors":"H. Kalantarian, N. Alshurafa, M. Pourhomayoun, M. Sarrafzadeh","doi":"10.1109/PERCOMW.2015.7134100","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134100","url":null,"abstract":"In recent years, several wearable devices have been proposed for monitoring nutrition intake, tracking energy expenditure, and performing activity recognition. Long device lifetimes are critical because frequent battery replacements increase user burden and yield poor long-term compliance rates. Though countless wearable devices have been proposed in recent years with varying sensors and applications, most system flows are generalizable in terms of their major components: sampling, buffering, processing, and transmission. In this paper, we discuss and evaluate energy-efficiency optimizations for wearable devices, using the NIMON nutrition-monitoring necklace as a case study.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134343096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Towards detection of bad habits by fusing smartphone and smartwatch sensors 通过融合智能手机和智能手表的传感器来检测坏习惯
M. Shoaib, S. Bosch, H. Scholten, P. Havinga, Özlem Durmaz Incel
{"title":"Towards detection of bad habits by fusing smartphone and smartwatch sensors","authors":"M. Shoaib, S. Bosch, H. Scholten, P. Havinga, Özlem Durmaz Incel","doi":"10.1109/PERCOMW.2015.7134104","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134104","url":null,"abstract":"Recently, there has been a growing interest in the research community about using wrist-worn devices, such as smartwatches for human activity recognition, since these devices are equipped with various sensors such as an accelerometer and a gyroscope. Similarly, smartphones are already being used for activity recognition. In this paper, we study the fusion of a wrist-worn device (smartwatch) and a smartphone for human activity recognition. We evaluate these two devices for their strengths and weaknesses in recognizing various daily physical activities. We use three classifiers to recognize 13 different activities, such as smoking, eating, typing, writing, drinking coffee, giving a talk, walking, jogging, biking, walking upstairs, walking downstairs, sitting, and standing. Some complex activities, such as smoking, eating, drinking coffee, giving a talk, writing, and typing cannot be recognized with a smartphone in the pocket position alone. We show that the combination of a smartwatch and a smartphone recognizes such activities with a reasonable accuracy. The recognition of such complex activities can enable well-being applications for detecting bad habits, such as smoking, missing a meal, and drinking too much coffee. We also show how to fuse information from these devices in an energy-efficient way by using low sampling rates. We make our dataset publicly available in order to make our work reproducible.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133302423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
Demo abstract disseminate: A demonstration of device-to-device media dissemination 演示摘要传播:设备到设备的媒体传播的演示
Venkat Srinivasan, T. Kalbarczyk, Christine Julien
{"title":"Demo abstract disseminate: A demonstration of device-to-device media dissemination","authors":"Venkat Srinivasan, T. Kalbarczyk, Christine Julien","doi":"10.1109/PERCOMW.2015.7134020","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134020","url":null,"abstract":"In this demonstration, we showcase Disseminate, a protocol and accompanying Android application for supporting device-to-device dissemination of data that fulfills shared interests of devices in pervasive computing environments. Disseminate is a novel publish-subscribe based protocol that breaks large (likely media heavy) data items into smaller chunks and opportunistically shares the chunks among co-located mobile devices. Interested devices issue subscriptions for the chunks they need and advertisements for the chunks they can share. Our publish mechanism uses a computation of a chunk's uniqueness to determine whether or not to broadcast it to the locally connected devices. The Disseminate app provides an implementation of the protocol in an Android application for sharing photographs via WiFi-Direct broadcast communication.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demo abstract: A microphone sensor based system for green building applications 演示摘要:一种基于麦克风传感器的绿色建筑应用系统
Md Abdullah Al Hafiz Khan, Sheung Lu, Nirmalya Roy, Nilavra Pathak
{"title":"Demo abstract: A microphone sensor based system for green building applications","authors":"Md Abdullah Al Hafiz Khan, Sheung Lu, Nirmalya Roy, Nilavra Pathak","doi":"10.1109/PERCOMW.2015.7134024","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134024","url":null,"abstract":"Acoustic sensing has influenced many applications in green building energy management, such as designing multi-modal energy disaggregation algorithms through fine-grained appliance state identifications or efficiently controlling the HVAC system based on the occupancy of the environment. In this demo paper we build a low-cost system prototype using off-the-shelf commercially available hardware (Raspberry Pi and super high gain microphone) to handle both acoustic sensing and its processing that is portable and easily deployable in any indoor environment. Our system is useful in detecting appliance noise for fine-grained energy metering and human voice for managing building energy footprint. We use the decibel strength of the sound to determine if it should be filtered out as a silence or stored in as an audio of interest. A fast fourier transform that quickly converts the sinusoidal input of the audio signals into its associated frequencies is implemented along with the Mel-Frequency Cepstral Coefficients (MFCCs) feature to distinguish between a human voice and an appliance noise. We also implement all the computations on-chip to quantify the energy-delay benefits.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133429902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Next place prediction by understanding mobility patterns 通过了解移动模式来预测下一个地点
M. Dash, Kee Kiat Koo, J. Gomes, S. Krishnaswamy, Daniel Rugeles, A. Nash
{"title":"Next place prediction by understanding mobility patterns","authors":"M. Dash, Kee Kiat Koo, J. Gomes, S. Krishnaswamy, Daniel Rugeles, A. Nash","doi":"10.1109/PERCOMW.2015.7134083","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134083","url":null,"abstract":"As technology to connect people across the world is advancing, there should be corresponding advancement in taking advantage of data that is generated out of such connection. To that end, next place prediction is an important problem for mobility data. In this paper we propose several models using dynamic Bayesian network (DBN). Idea behind development of these models come from typical daily mobility patterns a user have. Three features (location, day of the week (DoW), and time of the day (ToD)) and their combinations are used to develop these models. Knowing that not all models work well for all situations, we developed three combined models using least entropy, highest probability and ensemble. Extensive performance study is conducted to compare these models over two different mobility data sets: a CDR data and Nokia mobile data which is based on GPS. Results show that least entropy and highest probability DBNs perform the best.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114252063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Tool chain for application development with name-centric services 使用以名称为中心的服务进行应用程序开发的工具链
Torsten Teubler, H. Hellbrück
{"title":"Tool chain for application development with name-centric services","authors":"Torsten Teubler, H. Hellbrück","doi":"10.1109/PERCOMW.2015.7134007","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134007","url":null,"abstract":"Regarding service oriented architectures various tool chains evolved in the last decades. However, in terms of content-centric approaches tools and middleware are in an early stage. Especially tool support for name-centric services in future heterogeneous networks is not available. Future networks will cover future Internet, wireless sensor networks, mobile and ubiquitous applications. Existing content-centric networking provides powerful, flexible, but heavyweight APIs to the developers but does not cover middleware and tool chains for services. Therefore, we implement a solution for application development with name-centric services based on an existing content-centric networking protocol. We design a lightweight service description based on JSON which is short and can be easily understood. We implement a complete tool chain for automatic code generation for server and client applications. We demonstrate the workflow, the convenience for the application developer and the effectiveness of our approach in a convincing application example. A first evaluation of the code generation reveals a prediction of logical lines of code and illustrates the complexity of the problem that is now solved automatically. Our approach is proven to simplify and advance the application development process for name-centric services.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131864462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Emergency support system with directional extensions 具有定向扩展的应急支援系统
András Kokuti
{"title":"Emergency support system with directional extensions","authors":"András Kokuti","doi":"10.1109/PERCOMW.2015.7134088","DOIUrl":"https://doi.org/10.1109/PERCOMW.2015.7134088","url":null,"abstract":"This paper proposes an emergency support system (ESS) with two novel algorithms, a path finding algorithm to guide evacuees during an emergency, and a communication protocol to make the opportunistic communications (oppcoms) more effective (when observing the unnecessarily sent messages). The oppcoms uses low-cost wearable mobile nodes (i.e. smart phones) that can exchange packets at close range without help of an infrastructure. Both algorithms are based on the same idea: always to maintain the direction from hazardous areas to fire exits. The main goal of the ESS is to guide evacuees in a built environment such as in a shopping centre where fire is spreading. Our support system is evaluated with the DBES (Distributed Building Evacuation Simulator) and multiple simulations have been performed with this tool using different parameters. The results show that the enhanced emergency evacuation system can offer significant improvements for the evacuees and can achieve better results when the number of duplications is taken into account.","PeriodicalId":180959,"journal":{"name":"2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133933844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信