Walter Dan Stiehl, C. Breazeal, Kuk-Hyun Han, J. Lieberman, Levi Lalla, Allan Z. Maymin, Jonathan Salinas, Daniel Fuentes, R. Toscano, C. Tong, A. Kishore, Matt Berlin, Jesse Gray
{"title":"The huggable: a therapeutic robotic companion for relational, affective touch","authors":"Walter Dan Stiehl, C. Breazeal, Kuk-Hyun Han, J. Lieberman, Levi Lalla, Allan Z. Maymin, Jonathan Salinas, Daniel Fuentes, R. Toscano, C. Tong, A. Kishore, Matt Berlin, Jesse Gray","doi":"10.1145/1179133.1179149","DOIUrl":"https://doi.org/10.1145/1179133.1179149","url":null,"abstract":"Numerous studies have shown the positive benefits of companion animal therapy. Unfortunately, companion animals are not always available. The Huggable is a new type of robotic companion being designed specifically for such cases. It features a full body “sensitive skin” for relational affective touch, silent, muscle-like, voice coil actuators, an embedded PC with data collection and networking capabilities. In this paper we briefly describe the Huggable and propose a live demonstration of the robot.","PeriodicalId":194551,"journal":{"name":"CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129981519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An energy-efficient data gathering technique using multiple paths in wireless sensor networks","authors":"Dongkyun Kim, Joungsik Kim, Ki-Hyung Kim","doi":"10.1109/CCNC.2006.1593044","DOIUrl":"https://doi.org/10.1109/CCNC.2006.1593044","url":null,"abstract":"Multiple paths have been used to provide load- balancing of traffic and resilience to node failures in mobile ad-hoc networks or sensor networks. In addition, the energy expenditure can be distributed among nodes over the multiple paths. However, most existing multi-path routing protocols re- quire their complex procedures such as local repair or periodic reconstruction of the multiple paths, during which much loss of packet is even experienced. In this paper, we therefore propose an energy-efficient data gathering technique using multiple paths, which is more suitable for highly populated wireless sensor net- works in terms of having more simple and resilient features than other existing techniques. By simulation using ns-2 simulator, we prove that it achieves two goals satisfactorily: energy-saving and resilience to node failure.","PeriodicalId":194551,"journal":{"name":"CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115170784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Weinsberg, E. Pavlov, Y. Amir, G. Gát, S. Wulff
{"title":"Putting it on the NIC: A case study on application offloading to a network interface card (NIC)","authors":"Y. Weinsberg, E. Pavlov, Y. Amir, G. Gát, S. Wulff","doi":"10.1109/CCNC.2006.1593191","DOIUrl":"https://doi.org/10.1109/CCNC.2006.1593191","url":null,"abstract":"We have implemented a firewall application on a Network Interface Card (NIC). We have tested the CPU utilization and the bandwidth in a variety of scenarios. The benefits of offloading code are most pronounced when rejecting packets. Our results suggest significant benefits of offloading applications and in particular firewall logic to a NIC. I. INTRODUCTION There are many communication applications that act on every incoming packet. Offloading such applications to the network interface card (NIC) has many potential advantages. Utilizing the onboard computational power of the NIC can reduce the demands put on the CPU. If the NIC can process incoming information it can avoid costly interrupts to the CPU. In addition, the NIC can serve as a gatekeeper thus avoiding potential threats to the CPU. Furthermore, applications on a NIC can be built such that they are system and OS indepen- dent. An application of particular promise for offloading is a firewall application. Since a firewall is an application that filters packets by a user defined security policy, earlier filtering (especially discarding packets) has a potential for significant improvements in performance. A firewall application on a NIC also has the additional advantage that it is harder for an adversary to modify than a software application running at the host. We have designed and implemented a firewall application which we call SCIRON (Secure-Communication IntegRated Over NIC) on a NIC. The system consists of three elements: The firewall logic, a management console and a policy builder. This paper presents SCIRON, and shows that offloading full applications has significant advantages and market potential more so than TCP offload engines (9) (TOEs) or protocol specific offloaded extensions.","PeriodicalId":194551,"journal":{"name":"CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116755424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Filmtrust: movie recommendations from semantic web-based social networks","authors":"J. Golbeck","doi":"10.1109/CCNC.2006.1593265","DOIUrl":"https://doi.org/10.1109/CCNC.2006.1593265","url":null,"abstract":"FilmTrust is a website that integrates social networks with movie ratings and reviews. Using FOAF-based social networks augmented with trust ratings, the site computes predictive movie ratings based on the ratings of trusted people in the network. Preliminary results show these results to be significantly more accurate than other predictive ratings in certain situations. This demo will show the FilmTrust website, demonstrate cases where the predictive movie ratings are successful, and illustrate its RDF and OWL output for those interested in the backend.","PeriodicalId":194551,"journal":{"name":"CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.","volume":"17 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124686238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Loeb, B. Falchuk, M. Garrett, A. Hafid, K. Kim, K. Krishnan, D. Shallcross
{"title":"Impact of services on network capacity: tool for seamless integration of service and network modeling","authors":"S. Loeb, B. Falchuk, M. Garrett, A. Hafid, K. Kim, K. Krishnan, D. Shallcross","doi":"10.1109/CCNC.2006.1593272","DOIUrl":"https://doi.org/10.1109/CCNC.2006.1593272","url":null,"abstract":"This demo will present both real and mocked-up usecases of a software application that enables accurate probabilistic modeling of new IP based services and their impact on network resources. The demonstration should be of general interest to Network Service Providers (NSP), device manufacturers, and application developers. Network planning and service analysis is a very important issue for today’s NSP’s; new communications devices and services emerge quickly (e.g., VoIP, Peer-to-peer filesharing, etc.) and end-users demand network resources that are up to the task. For the analyst, our tool leverages familiar UML style views, used to capture prototypical service “sessions”. It then allows annotation of the service model with a rich grammar, model conversion into semi-Markov form, and algorithm execution for network resource usage estimation. Ultimately, analysts gain insight into the impact of new consumer devices and services on their networks.","PeriodicalId":194551,"journal":{"name":"CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125151248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive IQ imbalance compensation scheme with frequency offset for communication channel","authors":"S. Su, Yi-jen Chiu","doi":"10.1109/CCNC.2006.1593196","DOIUrl":"https://doi.org/10.1109/CCNC.2006.1593196","url":null,"abstract":"IQ signal processing is widely utilized in today's communication receivers. However, it usually faces a common problem of mismatch of the amplitudes and phases on I and Q branches because of the gain and phase imbalance between quadrature mixers. In this paper, we propose a novel method to estimate and compensate for the IQ imbalances for communication channels with frequency offset by using a preamble of repeated training sequence. The proposed method, as it jointly adapts schemes in the system of estimation, is more robust and gives better performance than the earlier results. The performance of such a scheme has been validated by computer simulation on IEEE 802.11a signals.","PeriodicalId":194551,"journal":{"name":"CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116022653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Duan, G. Pekhteryev, J. Fang, Y. Nakache, J. Zhang, K. Tajima, Y. Nishioka, H. Hirai
{"title":"Transmitting multiple HD video streams over UWB links","authors":"C. Duan, G. Pekhteryev, J. Fang, Y. Nakache, J. Zhang, K. Tajima, Y. Nishioka, H. Hirai","doi":"10.1109/CCNC.2006.1593126","DOIUrl":"https://doi.org/10.1109/CCNC.2006.1593126","url":null,"abstract":"Ultra Wide Band technology has attracted a lot of attention recently as a viable solution for high data rate, low power, short-range wireless link. The growing multi-media home networking is demanding more bandwidth and wireless throughput has become a bottleneck for high quality multi-media services. With the maximum data rate above 100 Mbps, UWB is a perfect solution for such applications. This paper describes such a system that takes advantage of the high data rate offered by UWB. We first implemented the complete MB-OFDM PHY layer using multi-FPGA hardware and discrete RF design. Our implementation is fully compliant to the WiMedia/MBOA PHY specifications and the FCC power regulations. The system achieved 110Mbps maximum data rate with a BER better than 10 -6 over a range of 4 meters. Subsequently, we developed a testbed that demonstrates simultaneous transmission of multiple High Definition video streams over the MB-OFDM link. The use-case scenario is a Multimedia ClientServer application where we have one Media Server (transmitter) and several Media Players (receivers).","PeriodicalId":194551,"journal":{"name":"CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122524282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EAREC: energy aware routing with efficient clustering for sensor networks","authors":"A. Eimon, C. Hong, T. Suda","doi":"10.1109/CCNC.2006.1593041","DOIUrl":"https://doi.org/10.1109/CCNC.2006.1593041","url":null,"abstract":"Energy efficiency is one of the most challenging issues in wireless sensor network as the sensors have to serve unattended. Cluster based communication can reduce the traffic on the network and gives the opportunity to other sensors for periodic sleep and awake and thus saves energy. Passive clustering is less computational and light weight. In cluster based approach, cluster heads and gateways have to have maximum energy to be awaken for all the times. Existing passive clustering algorithm uses first declaration method without any priority generates severe collisions in the network and form the clusters very dense with large amount of overlapping regions. This results increased number of gateways. We have proposed several modifications for the existing passive clustering algorithm to prolong the life time of the network with better cluster formation. More -over, our proposed solution finds the optimum path between sources and sinks using the tiny cache memory of the intermediate nodes. Simulation result shows that EAREC saves significant amount of energy and at the same time keeps the delay and success rate satisfactory.","PeriodicalId":194551,"journal":{"name":"CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114490014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative statistical analysis of indoor positioning using empirical data and indoor radio channel models","authors":"A. Hatami, K. Pahlavan","doi":"10.1109/CCNC.2006.1593192","DOIUrl":"https://doi.org/10.1109/CCNC.2006.1593192","url":null,"abstract":"Indoor geolocation using maximum likelihood algorithms applied to the measured reference radio map of the received signal strength (RSS) in indoor areas has attracted tremendous attention in the recent published literature. In this paper we examine generation of reference radio maps using two different radio propagation models to replace on site measurements for calibration of these indoor geolocation systems. The first model used for radio propagation is a statistical model recommended by the IEEE 802.11 standardization committee and the second model is a simple building-specific two dimensional ray tracing algorithm. The empirical reference radio map of the RSS from seven access points in 257 locations is collected in the first floor of the Atwater Kent Laboratory, Worcester Polytechnic Institute which represents a typical indoor office area. Using the empirical radio map and the radio map generated from the results of radio propagation modeling, the performance of the nearest neighbor and maximum likelihood location estimation techniques are compared.","PeriodicalId":194551,"journal":{"name":"CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128413398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Papapanagiotou, G. Marias, P. Georgiadis, S. Gritzalis
{"title":"Performance evaluation of a distributed OCSP protocol over MANETs","authors":"K. Papapanagiotou, G. Marias, P. Georgiadis, S. Gritzalis","doi":"10.1109/CCNC.2006.1592976","DOIUrl":"https://doi.org/10.1109/CCNC.2006.1592976","url":null,"abstract":"Several methods that rely on public or private cryptographic systems have been proposed for trust establishment in mobile ad hoc networks (MANETs). Such methods aim to provide end-entity authentication, communications integrity and privacy. When public key certificates schemes are deployed in MANETs, they must be accompanied by efficient mechanisms for certificate revocation and validation. In this paper we address this issue, and a distributed, on-demand, OCSP-based scheme is adapted to be applicable over MANETs. This scheme, called ADOPT, uses caches of OCSP responses that are distributed and stored on intermediate nodes. ADOPT takes into account the status of intermediate nodes, such as network topology, energy thresholds, and connectivity, to materialize the caching of OCSP responses. This paper uses different MANET con-figurations to evaluate the efficiency of ADOPT. The simulation results show that ADOPT manages to rapidly identify and locate the status of a certificate without introducing significant communication or storage costs. Keywords-OCSP; MANETs; certificate status information; caching","PeriodicalId":194551,"journal":{"name":"CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130547359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}