2006 First International Symposium on Pervasive Computing and Applications最新文献

筛选
英文 中文
The Routing Strategy of Pervasive Computing 普适计算的路由策略
2006 First International Symposium on Pervasive Computing and Applications Pub Date : 2006-08-01 DOI: 10.1109/SPCA.2006.297534
Jizhi Wang
{"title":"The Routing Strategy of Pervasive Computing","authors":"Jizhi Wang","doi":"10.1109/SPCA.2006.297534","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297534","url":null,"abstract":"In the near future, a pervasive computing environment can be expected based on the recent progresses and advances in computing and communication technologies. This paper describes the recent network model that can be applied in pervasive computing. The routing strategy among networks is presented in pervasive computing. Special attention is paid on key research issues include X-cast routing algorithms, security schemes, and QoS model","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127268022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Multi-agent Based Intelligent Intrusion Detection System 基于多智能体的智能入侵检测系统设计
2006 First International Symposium on Pervasive Computing and Applications Pub Date : 2006-08-01 DOI: 10.1109/SPCA.2006.297585
Xiaodong Zhu, Zhiqiu Huang, Hang Zhou
{"title":"Design of a Multi-agent Based Intelligent Intrusion Detection System","authors":"Xiaodong Zhu, Zhiqiu Huang, Hang Zhou","doi":"10.1109/SPCA.2006.297585","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297585","url":null,"abstract":"Considering some employees in the department abuse their privilege for personal gain through the local network and the host computer, in this paper, we present a multi-agent based intrusion detection system named MAIIDS (multi-agent based intelligent intrusion detection system). The learning agent module in this model can self-adjustingly learn network based audit data and host based audit data with more than one technique of data mining, such as the artificial neural network, the association rules and so on. The learning agent can produce rules, and the detection agent can detect audit data according to these rules and response to them. A lot of experiments indicate that this system has very high self-adapting ability, intelligence, and expansibility. Now MAIIDS has been applied to several security departments and has received good reputation","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126997747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
An M-Learning System Model for the Taxi Driver 出租车司机的移动学习系统模型
2006 First International Symposium on Pervasive Computing and Applications Pub Date : 2006-08-01 DOI: 10.1109/SPCA.2006.297608
Xinyou Zhao
{"title":"An M-Learning System Model for the Taxi Driver","authors":"Xinyou Zhao","doi":"10.1109/SPCA.2006.297608","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297608","url":null,"abstract":"With the development of 3G & distance learning technology, m-learning (mobile-learning) has been applied widely in distance education. This paper proposes one m-learning system model for the taxi driver based on the GPS (global positioning system) receiver/transmitter system installed in taxi. This system will offer a platform model through which drivers may easily retrieve much knowledge and realtime information of location available at any time and any place. It will not only make the everyday life of drivers more fun, but also improve urban traffic","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116811935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Algorithm of Computing Shortest Path on Wireless Networks 一种新的无线网络最短路径计算算法
2006 First International Symposium on Pervasive Computing and Applications Pub Date : 2006-08-01 DOI: 10.1109/SPCA.2006.297514
{"title":"A New Algorithm of Computing Shortest Path on Wireless Networks","authors":"","doi":"10.1109/SPCA.2006.297514","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297514","url":null,"abstract":"Computing routing information to support pervasive applications is different from that on the Internet. When the user moves freely from one place to another, the frequently method of computation and communication of routing information on Internet is often a waste of resources. In order to improve the computation of routing information on Internet to support pervasive applications, we put forward a new model of wireless networks and use neural networks as a fast tool to compute shortest paths on-demand on a time-dependent wireless network. The high-speed and stability of the method is proved. It also makes a new study on solving the optimization, but not NP-hard problems by neural networks","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131220203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Use of Distributed Authentication in Pervasive Computing 分布式认证在普适计算中的应用研究
2006 First International Symposium on Pervasive Computing and Applications Pub Date : 2006-08-01 DOI: 10.1109/SPCA.2006.297485
Hui Liu, Caiming Zhang
{"title":"Research on Use of Distributed Authentication in Pervasive Computing","authors":"Hui Liu, Caiming Zhang","doi":"10.1109/SPCA.2006.297485","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297485","url":null,"abstract":"This paper presents a new idea of applying distributed authentication mechanism to pervasive computing by analyzing the security hidden troubles, especially the problems such as mutual trust of entities and the secrecy of user's privacy information in pervasive computing. At last, the detail illustration about trust pervasive model that distributes the trust among a set of hosts supporting distributed applications is given","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122462245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Tower of Babel: interoperability of ontologies for pervasive computing 巴别塔:普及计算的本体互操作性
2006 First International Symposium on Pervasive Computing and Applications Pub Date : 2006-08-01 DOI: 10.1109/SPCA.2006.297511
Bo Hu, Bin Hu
{"title":"Tower of Babel: interoperability of ontologies for pervasive computing","authors":"Bo Hu, Bin Hu","doi":"10.1109/SPCA.2006.297511","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297511","url":null,"abstract":"Interoperability between disparate systems in open, distributed environments has become the quest of many practitioners in a variety of fields. In this perspective paper, we investigate the insufficiency of single global ontology approaches. We discuss our experience in interoperability tasks between ontologies for semantic Web systems and elaborate on the role of multiple, community-based ontologies in oiling pervasive computing applications","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128957343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Solving Reliable Coverage In Fault Tolerant Energy Efficient Wireless Sensor Network 解决容错节能无线传感器网络的可靠覆盖问题
2006 First International Symposium on Pervasive Computing and Applications Pub Date : 2006-08-01 DOI: 10.1109/SPCA.2006.297532
Qiang Xu, Yun Wang
{"title":"Solving Reliable Coverage In Fault Tolerant Energy Efficient Wireless Sensor Network","authors":"Qiang Xu, Yun Wang","doi":"10.1109/SPCA.2006.297532","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297532","url":null,"abstract":"With the strong push from applications, fault tolerant and energy efficient property of wireless sensor network has gradually become a hot point. Based on the heuristic method used to generate minimum covers, a novel scheme namely reliable coverage scheme is proposed to solve the reliable coverage problem within the cluster in a hierarchical structured network. Simulations show that this scheme is able to efficiently utilize energy to prolong network lifetime while at the same time keeping missed monitoring at a low level","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114165736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research on Personalized E-learning System by Using Mobile Agents 基于移动代理的个性化电子学习系统研究
2006 First International Symposium on Pervasive Computing and Applications Pub Date : 2006-08-01 DOI: 10.1109/SPCA.2006.297589
Zhao Ling, Yu Ying, Luo Qi, Yu Jia
{"title":"Research on Personalized E-learning System by Using Mobile Agents","authors":"Zhao Ling, Yu Ying, Luo Qi, Yu Jia","doi":"10.1109/SPCA.2006.297589","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297589","url":null,"abstract":"In order to meet the personalized e-learning, a personalized e-learning system based on mobile agents (PESMA) was proposed and realized in the paper. The structure of system, work process, key realization technologies of PESMA, the design of mobile agent, and the realization of mobile agent were introduced in the paper. After the test use of the system by certain network school, we found that the system could improve the learners' initiative participation, which can provide learners with personalized knowledge service. Thus, we thought it might be a practical solution to realize self-learning and self-promotion in the lifelong education age","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126532606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Coverage-Preserving Node Scheduling Scheme Based on Trust Selection Model in Wireless Sensor Networks 基于信任选择模型的无线传感器网络保覆盖节点调度方案
2006 First International Symposium on Pervasive Computing and Applications Pub Date : 2006-08-01 DOI: 10.1109/SPCA.2006.297512
Zhenyu Yin, Hai Zhao, Kai Lin, Pei-Gang Sun, Dingding Luo, Xiyuan Zhang, Xiaoying Wang
{"title":"A Coverage-Preserving Node Scheduling Scheme Based on Trust Selection Model in Wireless Sensor Networks","authors":"Zhenyu Yin, Hai Zhao, Kai Lin, Pei-Gang Sun, Dingding Luo, Xiyuan Zhang, Xiaoying Wang","doi":"10.1109/SPCA.2006.297512","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297512","url":null,"abstract":"Wireless sensor networks consist of a large number of low power shot-lived, unreliable sensors, one of the main design challenges is to obtain long system lifetime, as well as maintain sufficient sensing coverage and reliability. In this paper, a trust selection model is proposed by virtue of behavior experience in human society. In this trust model, multiple evaluation preference adjustment strategy and trust update mechanism is used to improve the reliability and accuracy. And in this paper, by establishing the trust relation and estimating the trust degree of the wireless sensor nodes, a node-scheduling scheme for wireless sensor network is achieved based on the trust selection model","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115011324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Provisioning of Personalized Pervasive Services: Daidalos Personalization Functions 个性化普适服务的供应:Daidalos的个性化功能
2006 First International Symposium on Pervasive Computing and Applications Pub Date : 2006-08-01 DOI: 10.1109/SPCA.2006.297552
Yuping Yang
{"title":"Provisioning of Personalized Pervasive Services: Daidalos Personalization Functions","authors":"Yuping Yang","doi":"10.1109/SPCA.2006.297552","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297552","url":null,"abstract":"Personalization is regarded as an important aspect in pervasive computing. In the European project Daidalos the objectives of personalization lie in service selection, service parameterization, adaptation of composition process, communication redirection and elicitation of user preferences. This paper focuses on the functions of Daidalos personalization component and its implementation and demonstration","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133301885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信