{"title":"Ant-based Energy Aware Disjoint Multipath Routing Algorithm in MANETs","authors":"Zhengyu Wu, Hantao Song, Shaofeng Jiang, Xiaomei Xu","doi":"10.1109/MUE.2007.86","DOIUrl":"https://doi.org/10.1109/MUE.2007.86","url":null,"abstract":"A mobile ad hoc network (MANET) is one consisting of a set of mobile hosts capable of communicating with each other without the assistance of base stations. Earlier research has proposed several unipath routing protocols specifically on MANET. However, the single path is easily broken and needs to perform a route discovery process again due to the dynamic topology of ad hoc networks. This leads to increase in both delay and control overhead as well as decrease in packet delivery ratio. To alleviate these problems, a new routing algorithm called ant-based energy aware disjoint multipath routing algorithm (AEADMRA) is proposed. AEADMRA is based on swarm intelligence and especially on the ant colony based meta heuristic. AEADMRA extends GRID to enable path accumulation in route request/reply packets and discover multiple energy aware routing paths with a low routing overhead. Simulation results indicate that performance of AEADMRA is much better than that of GRID","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128213282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Pixel Expansion of (2,n) Visual Threshold Scheme","authors":"Liguo Fang, Bin Yu","doi":"10.1109/SPCA.2006.297546","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297546","url":null,"abstract":"Two parameters, pixel expansion and contrast, are very important in visual cryptography. It's very difficult to optimize both of them in theory. Based on combination, A (2, n) scheme, which existence has been proved theoretically, has been proposed in this paper. Meantime, the method of construct has been carried out. Simulation results demonstrate that this scheme can balance performance between pixel expansion and contrast, i.e. the contrast is close to optimality, meanwhile the pixel expansion is the minimal","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127115635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuezhu Huang, Chenglei Yang, Xiangxu Meng, Xiaoting Wang, Lu Wang
{"title":"Remote Non-photorealistic Rendering of 3D Models on Mobile Devices","authors":"Yuezhu Huang, Chenglei Yang, Xiangxu Meng, Xiaoting Wang, Lu Wang","doi":"10.1109/SPCA.2006.297599","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297599","url":null,"abstract":"Nowadays, the pervasiveness of mobile devices has increased steadily in our daily life. We utilize them for the chief purposes of communication, learning and entertainment. And there is a growing interest in providing more applications for these small devices. In the realms like digital entertainment, product concept design and architecture draft, we strongly desire to mobile access to the 3D models conveniently although the limited resources like network bandwidth, graphical resources and computing power in such small devices. To overcome the disadvantages of the devices and balance the workload and performance between the client and server, in this paper we present a real time remote rendering method by transferring only the line primitives to client devices from server side, which will be rendered in the client side locally with various non-photorealistic rendering (NPR) techniques. We propose a general framework that enables the user to interactively go through the 3D models with his personal mobile device anytime and anywhere. Moreover, we can enrich the users' experience since NPR based images are usually eyes-attracting","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116166889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-commerce to U-business: A Model for Ubiquitous Shopping Mall","authors":"Cain Evans, Bin Hu","doi":"10.1109/SPCA.2006.297612","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297612","url":null,"abstract":"The U-business model is the next stage in the evolution of business to take it beyond that of the e-commerce model. The opportunities offered by transforming business to utilise ubiquitous computing applications is fraught with difficulties not at least with the sensor networks, latency, noisy channels, context-middleware and the ever changing needs of business. The ubiquitous shopping mall model supports the change to a U-business by providing an approach that looks to make the process of change more manageable. This work is in its early stages and further research is required to understand and harness the opportunities that ubiquitous computing can offer retail shopping-malls","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128730387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Trust Model based on Autonomous Domain","authors":"Yanqun Zhang, Qianping Wang, Chen Zhang","doi":"10.1109/SPCA.2006.297484","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297484","url":null,"abstract":"In order to resolve the security problems due to the dynamics and uncertainty of grid environment, a trust model based on autonomous domain is developed in this paper, it discriminates the trust relationships between entities in the same autonomous domain and in different domains and handles the two different trust relationships in different approaches. By doing this, the trust relationships between entities can be evaluated more precisely, thus can resolve security problems exist in grid environment more effectively, which can be verified by simulated experiments","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121670017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Seamless Application Integration and Deployment for Ubiquitous Middleware","authors":"Yuegong Zhang, Xiaodong Liu, Daxing Li","doi":"10.1109/SPCA.2006.297553","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297553","url":null,"abstract":"Middleware is very important in present-day ubiquitous or pervasive systems. This paper has two contributions on the function extensions of ubiquitous middleware. The first one is the framework of seamless integration of GUI, which can enable the servers to provide GUI services and the clients to integrate various GUI into one. The second contribution is the feature of deploying applications, especially media applications, on both servers and clients. The deployment takes advantages of clients' computing resources to assist ubiquitous applications and can dramatically reduce the network bandwidth or servers' CPU usage. The two extensions are very useful to the ubiquitous environments for handhold devices and systems with limited resources. A prototype system is also implemented and some results are given","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114815154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wilfred W. K. Lin, Richard S. L. Wu, Allan K. Y. Wong, T. Dillon
{"title":"A Novel Internet Real-Time Traffic Pattern Detection Technique for Better Pervasive Computing","authors":"Wilfred W. K. Lin, Richard S. L. Wu, Allan K. Y. Wong, T. Dillon","doi":"10.1109/SPCA.2006.297517","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297517","url":null,"abstract":"The Internet follows the power law. For this reason its traffic pattern takes many forms, which change without warning. For example it may change suddenly from LRD (long-range dependence) such as heavy-tailed or self-similar to SRD (short-range dependence) such as Poisson or multifractal. This makes it difficult to run time-critical pervasive applications over the Internet successfully because it is hard to control the response timeliness of the logical TCP (transmission control protocol) channels. The proposed real-time traffic pattern detector (RTPD) technique is generic and detects and identifies LRD and SRD traffic pattern online. If it is implemented as a logical object, then realtime and pervasive applications can use its detected results to self-reconfigure at runtime for better performance that includes shorter service roundtrip time (RTT) and fault tolerance. The RTPD is conceptually the \"M3RT + R/S + filtration\" combination. The M 3RT (micro mean message response time) tool is the micro implementation of the convergence algorithm (CA), which is an IEPM (Internet end-to-end performance measurement) model with feedback. Alternatively known as the micro CA (MCA), this tool predicts the mean of any waveform quickly and accurately, either on-line or in a postmortem manner with pre-collected traces. A micro IEPM tool operates as an independent object, to be invoked for service anytime and anywhere by message passing. If M3RT is inhibited, then RTPD works with the traditional R/S (rescaled adjusted statistics) estimator, but still detects the LRD and SRD patterns on-line. If M3RT support is activated, then RTPD works with the enhanced R/S or E-R/S. The proposed RTPD technique differs from other post-mortem approaches (e.g. Hill estimator) because it detects and identifies traffic patterns on the fly. Its contribution to Internet-based pervasive applications is significant because its output enables these applications to reconfigure on the fly and adapt quickly to new operational criteria. The result is better system performance in light of a shorter service roundtrip time (RTT) that makes the client happy","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127730707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Multi-agent Cooperative Study of Transmitting Routing Information","authors":"Hong He, Shengzhong Yuan, Baowen Xu","doi":"10.1109/SPCA.2006.297604","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297604","url":null,"abstract":"Computing routing information (RI) on-demand is very practical to improve QoS because Internet is dynamic and the pre-computation of RI is often a waste of resources. But on-demand computation means only a small amount of RI are new and need to be updated in RI table (RIT) in each computation. In order to save the bandwidth of transmitting RITs, we design a multi-agent cooperative system, in which one monitoring agent initiatively checks up the RIT in succession and acquires the new updated information, delivers to other routers. The dispose agent receives the new RI and updates local RIT. The simulation experiment proves that the method is highly effective and practical","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126375606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Robotics to Pervasive Computing Environments","authors":"V. Callaghan","doi":"10.1109/SPCA.2006.297452","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297452","url":null,"abstract":"This talk proposes that the digital home is virtually identical to the software and hardware architecture used to construct mobile robots leading to the proposition that \"pervasive computing environments can be regarded as robots that we live inside\". The author argue that it is possible and rational to apply robotic techniques to pervasive computing problems in the digital home","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131672321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Entity Profiling: Context with Ontology","authors":"Philip Moore, Bin Hu","doi":"10.1109/SPCA.2006.297563","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297563","url":null,"abstract":"An entities profile, termed context, is fundamental in context-aware computing. Context definitions can provide the basis upon which ontologies can be achieved, an ontology being the conceptualisation of a domain. This paper proposes an approach to the definition of context and presents a discussion on ontology. The issues that impact the implementation of ontologies are discussed and intelligent multi-agent systems are introduced. There is consideration of potential implementation options with identified open research questions. The paper concludes that RDF with OWL and Jena provides a basis for ontology realisation and proposes decision trees to enable the implementation of ontologies","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115478838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}