The IEEE/ACS International Conference on Pervasive Services最新文献

筛选
英文 中文
Context Aware Service Provisioning 感知上下文的业务发放
The IEEE/ACS International Conference on Pervasive Services Pub Date : 2004-07-19 DOI: 10.1109/ICPS.2004.13
S. Mostéfaoui, B. Hirsbrunner
{"title":"Context Aware Service Provisioning","authors":"S. Mostéfaoui, B. Hirsbrunner","doi":"10.1109/ICPS.2004.13","DOIUrl":"https://doi.org/10.1109/ICPS.2004.13","url":null,"abstract":"In this paper, we present our initiative on a new direction of research for bringing into the common fold context-aware computing and Web services-oriented computing. Our long term research objective is to allow users to satisfy their needs regardless of their location and the resources that are considered in the performance of the services. Our contribution is the enhancement of the service discovery and composition by taking into account the available contextual information. As a first step towards this goal we are in the process of designing a new service description based on context.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114849535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Towards a Unified Graph-Based Framework for Dynamic Component-Based Architectures Description in Z 面向动态构件体系结构描述的统一图框架
The IEEE/ACS International Conference on Pervasive Services Pub Date : 2004-07-19 DOI: 10.1109/ICPS.2004.33
I. Loulou, A. Kacem, M. Jmaiel, K. Drira
{"title":"Towards a Unified Graph-Based Framework for Dynamic Component-Based Architectures Description in Z","authors":"I. Loulou, A. Kacem, M. Jmaiel, K. Drira","doi":"10.1109/ICPS.2004.33","DOIUrl":"https://doi.org/10.1109/ICPS.2004.33","url":null,"abstract":"This paper proposes a model oriented formal approach for the specification and the verification of dynamic component-based architectures. This approach associates the expressive power of functional and structural approaches. On the one hand, we make use of the specification language Z to formulate the constraints made on the architectural style. These constraints have to be maintained during the system evolution. On the other hand, we describe the dynamic of architecture in terms of graph-rewriting rules. The obtained rules take into account structural and functional constraints of the system under their application conditions ensuring in this way its consistency during its evolution. We express the rules entirely with the Z notation also obtaining, in this way, a unified approach which treats the static as well as the dynamic aspect. To validate our specifications, we use Z-EVES which is an advanced analysis tool supporting the Z-specification language.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Reconfigurable Computing for RC6 Cryptography RC6密码的可重构计算
The IEEE/ACS International Conference on Pervasive Services Pub Date : 2004-07-19 DOI: 10.1109/ICPS.2004.25
M. Itani, H. Diab
{"title":"Reconfigurable Computing for RC6 Cryptography","authors":"M. Itani, H. Diab","doi":"10.1109/ICPS.2004.25","DOIUrl":"https://doi.org/10.1109/ICPS.2004.25","url":null,"abstract":"This paper presents an emerging reconfigurable hardware that potentially delivers flexible high performance for cryptographic algorithms. MorphoSys, a dynamic reconfigurable architecture that sustains implementations that can yield into equally or even better performance results than custom-hardware and yet preserves all the flexibility of general-purpose processors. With today's great demand for secure communications systems, networks and the Internet, there is a growing demand for real-time implementation of cryptographic algorithms. As a case study, this paper presents the mapping and performance analysis for one of the five AES finalists cryptographic algorithms, namely RC6. Being an important and secure cryptographic algorithm, RC6 is considered well chosen to be mapped in order to test and evaluate the suitability of dynamic reconfigurable computer (RC) systems such as MorphoSys.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130221811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Modeling Jini-UPnP Bridge using Rapide ADL 使用Rapide ADL建模Jini-UPnP桥
The IEEE/ACS International Conference on Pervasive Services Pub Date : 2004-07-19 DOI: 10.1109/ICPS.2004.19
A. Sameh, R. El-Kharboutly
{"title":"Modeling Jini-UPnP Bridge using Rapide ADL","authors":"A. Sameh, R. El-Kharboutly","doi":"10.1109/ICPS.2004.19","DOIUrl":"https://doi.org/10.1109/ICPS.2004.19","url":null,"abstract":"The exploding deployment of network enabled mobile devices, along with the expansion of networked services have created the need for users to easily manage these devices and services and also to coordinate with one another. Service Discovery Protocol (SDP) enables networked devices, applications, and services to seek out and find other complementary networked devices, applications, and services needed to properly complete specified tasks. A number of bridging techniques have been proposed and implemented. In this paper we propose a one directional bridging system (Jini-UPnP Bridge). To validate the proposed system, we model and simulate the bridge using Rapide ADL simulation and analysis toolset. We perform a number of simulation tests and use the Rapide Poset viewer to analyze the simulators output Poset tree of events.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124661284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Autonomic Computing: Research Challenges and Opportunities 自主计算:研究挑战与机遇
The IEEE/ACS International Conference on Pervasive Services Pub Date : 2004-07-19 DOI: 10.1109/PERSER.2004.12
S. Hariri
{"title":"Autonomic Computing: Research Challenges and Opportunities","authors":"S. Hariri","doi":"10.1109/PERSER.2004.12","DOIUrl":"https://doi.org/10.1109/PERSER.2004.12","url":null,"abstract":"The wide deployment of Internet technology has resulted in exponential growth in Internet application services (e.g., content hosting for data with web-based access, shared payroll applications, firewall-based security services, email and shared file services). The management and control of these application services is a challenging research problem due to the huge amount of data that needs to be collected and coordinated, the heterogeneity and the independence of resources and components required by these services and the fact that they run under different organizations and administration policies. This complexity has led to a situation where the cost to manage such systems is actually a lot more than the actual systems themselves. Consequently, the growing complexity of the IT infrastructure threatens to undermine the very benefits information technology aims to provide.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114437080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RUGGED: RoUting on finGerprint Gradients in sEnsor Networks 坚固:传感器网络中指纹梯度的路由
The IEEE/ACS International Conference on Pervasive Services Pub Date : 2004-07-19 DOI: 10.1109/ICPS.2004.27
Jabed Faruque, A. Helmy
{"title":"RUGGED: RoUting on finGerprint Gradients in sEnsor Networks","authors":"Jabed Faruque, A. Helmy","doi":"10.1109/ICPS.2004.27","DOIUrl":"https://doi.org/10.1109/ICPS.2004.27","url":null,"abstract":"Every physical event produces a fingerprint in the environment which results a natural information gradient in the proximity of the phenomenon. Moreover, many physical phenomena follow diffusion laws. In this paper, we propose a novel scheme to effectively exploit the natural information gradient to route a query in a sensor network. Our scheme uses multiple path exploration, and controls the instantiation of paths by simulated annealing. Unlike other information-driven protocols, our scheme eliminates the overhead of preparing and maintaining the gradient information repository. We apply our scheme to study three different problems: (1) single-value query, (2) global maxima search, and (3) multiple events detection. Simulation results have demonstrated that the routing protocol, based on our proposed scheme, is highly energy efficient and achieves over 98% success rate to route around sensor holes, even in the presence of environmental noise and malfunctioning sensor nodes. We also illustrate that our scheme is well suited for a broad-range of applications; e.g., time gradient based target tracking.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131473678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Analysis of Wired Short Cuts in Wireless Sensor Networks 无线传感器网络中的有线捷径分析
The IEEE/ACS International Conference on Pervasive Services Pub Date : 1900-01-01 DOI: 10.1109/perser.2004.1356794
R. Chitradurga, A. Helmy
{"title":"Analysis of Wired Short Cuts in Wireless Sensor Networks","authors":"R. Chitradurga, A. Helmy","doi":"10.1109/perser.2004.1356794","DOIUrl":"https://doi.org/10.1109/perser.2004.1356794","url":null,"abstract":"In this paper we investigate the use of wired short cuts in sensor networks. This new paradigm augments a sensor network with a very limited wired infrastructure to improve its overall energy-efficiency. Energy-efficiency is obtained by reduction in average path length. We have developed an analytical model to analyze the gain in path length reduction by using short cuts. We have also conducted extensive simulations to validate our analysis. Our results show that there is an optimal wire length for which the path length reduction is at its maximum, beyond which it decreases. The optimal length is only a small fraction (37.8-50%) of the network diameter. In a network with 1000 nodes uniformly distributed on a disk the path length reduction saturates at 60-70% with 5-24 wires, depending on the location of the sink. Also, we find that restricting the knowledge about the wires to 2 hops does not degrade the performance from the case when we have global knowledge of all wires. These results show promise of the new paradigm.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125148592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Interface for the Dynamic Negotiation of QoS in ARCADE 街机中QoS动态协商的智能接口
The IEEE/ACS International Conference on Pervasive Services Pub Date : 1900-01-01 DOI: 10.1109/perser.2004.9
Zeina Jrad Lipn, Francine Krief Lipn
{"title":"An Intelligent Interface for the Dynamic Negotiation of QoS in ARCADE","authors":"Zeina Jrad Lipn, Francine Krief Lipn","doi":"10.1109/perser.2004.9","DOIUrl":"https://doi.org/10.1109/perser.2004.9","url":null,"abstract":"Since several years, the network area is in continual progress and one of the important functions that should be introduced in Internet Next Generation consists of the policy-based servers. These servers of control will realize an equivalence between the demands of the clients and the network resources. The objective of the project Arcade is to define an intelligent interface capable of accomplishing the best choice possible on the allocation of the policies that concern the QoS, the mobility and the security. In this paper, we develop a part of Arcade called NIA (Negotiation Intelligent Agent) that plays the role of intermediary between the user and the rest of the system and is designated to help him access to the Internet New Generation. We use agent technology to dynamically negotiate the SLS on the user's behalf, follow the user's behavior to be able to anticipate the negotiations and manage the renegotiations.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133434438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Acoustic Identification Scheme for Location Systems 定位系统的声学识别方案
The IEEE/ACS International Conference on Pervasive Services Pub Date : 1900-01-01 DOI: 10.1109/perser.2004.1356767
R. Jurdak, C. Lopes, P. Baldi
{"title":"An Acoustic Identification Scheme for Location Systems","authors":"R. Jurdak, C. Lopes, P. Baldi","doi":"10.1109/perser.2004.1356767","DOIUrl":"https://doi.org/10.1109/perser.2004.1356767","url":null,"abstract":"Many pervasive computing applications require location awareness in order to successfully integrate technology into our daily lives. A location system consists of a group of sensors that determine the position of a mobile user and provide the user with useful context-specific information. Locating the user requires signal exchanges between the user's mobile device and the sensors. This paper considers an acoustic-based location system for pervasive computing applications. The system is comprised of a set of microphones connected to a central server. Mobile users produce acoustic signals through standard speakers, which are already available in most mobile devices, to perform location operations through the system. We focus on the design of robust acoustic signals using multi-frequency symbols that serve both in locating and uniquely identifying the user. We conduct experiments at distances between 1 and 17 ft to explore the ability of the server to recognize and decode signals originated by different users in the same general area.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126126328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Dynamic Honeypot Design for Intrusion Detection 一种入侵检测的动态蜜罐设计
The IEEE/ACS International Conference on Pervasive Services Pub Date : 1900-01-01 DOI: 10.1109/perser.2004.1356776
I. Kuwatly, M. Sraj, Z. Al Masri, H. Artail
{"title":"A Dynamic Honeypot Design for Intrusion Detection","authors":"I. Kuwatly, M. Sraj, Z. Al Masri, H. Artail","doi":"10.1109/perser.2004.1356776","DOIUrl":"https://doi.org/10.1109/perser.2004.1356776","url":null,"abstract":"A modern technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the attacker with all the necessary resources needed for a successful attack. Honeypots provide a platform for studying the methods and tools used by the intruders (blackhat community), thus deriving their value from the unauthorized use of their resources. This paper discusses the design of a dynamic honeypot, which is an autonomous honeypot capable of adapting in a dynamic and constantly changing network environment. The dynamic honeypot approach integrates passive or active probing and virtual honeypots. This approach addresses the challenge of deploying and configuring virtual honeypots.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126554370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信