{"title":"The Routing Strategy of Pervasive Computing","authors":"Jizhi Wang","doi":"10.1109/SPCA.2006.297534","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297534","url":null,"abstract":"In the near future, a pervasive computing environment can be expected based on the recent progresses and advances in computing and communication technologies. This paper describes the recent network model that can be applied in pervasive computing. The routing strategy among networks is presented in pervasive computing. Special attention is paid on key research issues include X-cast routing algorithms, security schemes, and QoS model","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127268022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a Multi-agent Based Intelligent Intrusion Detection System","authors":"Xiaodong Zhu, Zhiqiu Huang, Hang Zhou","doi":"10.1109/SPCA.2006.297585","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297585","url":null,"abstract":"Considering some employees in the department abuse their privilege for personal gain through the local network and the host computer, in this paper, we present a multi-agent based intrusion detection system named MAIIDS (multi-agent based intelligent intrusion detection system). The learning agent module in this model can self-adjustingly learn network based audit data and host based audit data with more than one technique of data mining, such as the artificial neural network, the association rules and so on. The learning agent can produce rules, and the detection agent can detect audit data according to these rules and response to them. A lot of experiments indicate that this system has very high self-adapting ability, intelligence, and expansibility. Now MAIIDS has been applied to several security departments and has received good reputation","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126997747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An M-Learning System Model for the Taxi Driver","authors":"Xinyou Zhao","doi":"10.1109/SPCA.2006.297608","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297608","url":null,"abstract":"With the development of 3G & distance learning technology, m-learning (mobile-learning) has been applied widely in distance education. This paper proposes one m-learning system model for the taxi driver based on the GPS (global positioning system) receiver/transmitter system installed in taxi. This system will offer a platform model through which drivers may easily retrieve much knowledge and realtime information of location available at any time and any place. It will not only make the everyday life of drivers more fun, but also improve urban traffic","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116811935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Algorithm of Computing Shortest Path on Wireless Networks","authors":"","doi":"10.1109/SPCA.2006.297514","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297514","url":null,"abstract":"Computing routing information to support pervasive applications is different from that on the Internet. When the user moves freely from one place to another, the frequently method of computation and communication of routing information on Internet is often a waste of resources. In order to improve the computation of routing information on Internet to support pervasive applications, we put forward a new model of wireless networks and use neural networks as a fast tool to compute shortest paths on-demand on a time-dependent wireless network. The high-speed and stability of the method is proved. It also makes a new study on solving the optimization, but not NP-hard problems by neural networks","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131220203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Use of Distributed Authentication in Pervasive Computing","authors":"Hui Liu, Caiming Zhang","doi":"10.1109/SPCA.2006.297485","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297485","url":null,"abstract":"This paper presents a new idea of applying distributed authentication mechanism to pervasive computing by analyzing the security hidden troubles, especially the problems such as mutual trust of entities and the secrecy of user's privacy information in pervasive computing. At last, the detail illustration about trust pervasive model that distributes the trust among a set of hosts supporting distributed applications is given","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122462245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tower of Babel: interoperability of ontologies for pervasive computing","authors":"Bo Hu, Bin Hu","doi":"10.1109/SPCA.2006.297511","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297511","url":null,"abstract":"Interoperability between disparate systems in open, distributed environments has become the quest of many practitioners in a variety of fields. In this perspective paper, we investigate the insufficiency of single global ontology approaches. We discuss our experience in interoperability tasks between ontologies for semantic Web systems and elaborate on the role of multiple, community-based ontologies in oiling pervasive computing applications","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128957343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solving Reliable Coverage In Fault Tolerant Energy Efficient Wireless Sensor Network","authors":"Qiang Xu, Yun Wang","doi":"10.1109/SPCA.2006.297532","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297532","url":null,"abstract":"With the strong push from applications, fault tolerant and energy efficient property of wireless sensor network has gradually become a hot point. Based on the heuristic method used to generate minimum covers, a novel scheme namely reliable coverage scheme is proposed to solve the reliable coverage problem within the cluster in a hierarchical structured network. Simulations show that this scheme is able to efficiently utilize energy to prolong network lifetime while at the same time keeping missed monitoring at a low level","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114165736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Personalized E-learning System by Using Mobile Agents","authors":"Zhao Ling, Yu Ying, Luo Qi, Yu Jia","doi":"10.1109/SPCA.2006.297589","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297589","url":null,"abstract":"In order to meet the personalized e-learning, a personalized e-learning system based on mobile agents (PESMA) was proposed and realized in the paper. The structure of system, work process, key realization technologies of PESMA, the design of mobile agent, and the realization of mobile agent were introduced in the paper. After the test use of the system by certain network school, we found that the system could improve the learners' initiative participation, which can provide learners with personalized knowledge service. Thus, we thought it might be a practical solution to realize self-learning and self-promotion in the lifelong education age","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126532606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhenyu Yin, Hai Zhao, Kai Lin, Pei-Gang Sun, Dingding Luo, Xiyuan Zhang, Xiaoying Wang
{"title":"A Coverage-Preserving Node Scheduling Scheme Based on Trust Selection Model in Wireless Sensor Networks","authors":"Zhenyu Yin, Hai Zhao, Kai Lin, Pei-Gang Sun, Dingding Luo, Xiyuan Zhang, Xiaoying Wang","doi":"10.1109/SPCA.2006.297512","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297512","url":null,"abstract":"Wireless sensor networks consist of a large number of low power shot-lived, unreliable sensors, one of the main design challenges is to obtain long system lifetime, as well as maintain sufficient sensing coverage and reliability. In this paper, a trust selection model is proposed by virtue of behavior experience in human society. In this trust model, multiple evaluation preference adjustment strategy and trust update mechanism is used to improve the reliability and accuracy. And in this paper, by establishing the trust relation and estimating the trust degree of the wireless sensor nodes, a node-scheduling scheme for wireless sensor network is achieved based on the trust selection model","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115011324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Provisioning of Personalized Pervasive Services: Daidalos Personalization Functions","authors":"Yuping Yang","doi":"10.1109/SPCA.2006.297552","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297552","url":null,"abstract":"Personalization is regarded as an important aspect in pervasive computing. In the European project Daidalos the objectives of personalization lie in service selection, service parameterization, adaptation of composition process, communication redirection and elicitation of user preferences. This paper focuses on the functions of Daidalos personalization component and its implementation and demonstration","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133301885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}