{"title":"An Intelligent Car Park Management System based on Wireless Sensor Networks","authors":"Valerie Tang, Yuan Zheng, Jiannong Cao","doi":"10.1109/SPCA.2006.297498","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297498","url":null,"abstract":"Wireless sensor networks (WSNs) have attracted increasing attentions from both academic and industrial communities. It can be deployed in various kinds of environments to monitor and collect information. In this paper, we describe a WSN-based intelligent car parking system. In the system, low-cost wireless sensors are deployed into a car park field, with each parking lot equipped with one sensor node, which detects and monitors the occupation of the parking lot. The status of the parking field detected by sensor nodes is reported periodically to a database via the deployed wireless sensor network and its gateway. The database can be accessed by the upper layer management system to perform various management functions, such as finding vacant parking lots, auto-toll, security management, and statistic report. We have implemented a prototype of the system using crossbow motes. The system evaluation demonstrates the effectiveness of our design and implementation of the car parking system","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"29 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123875078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Epidemic Model of Mobile Phone Virus","authors":"Hui Zheng, Dong Li, Zhuo Gao","doi":"10.1109/SPCA.2006.297477","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297477","url":null,"abstract":"Considering the characteristics of mobile network, we import three important parameters: distribution density of mobile phone, coverage radius of Bluetooth signal and moving velocity of mobile phone to build an epidemic model of mobile phone virus which is different from the epidemic model of computer worm. Then analyzing different properties of this model with the change of parameters; discussing the epidemic threshold of mobile phone virus; presenting suggestions of quarantining the spreading of mobile phone virus","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124253224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preventing Outgoing Spam by Monitoring User Interactions","authors":"F. C. Lin, Hang Shi, Xiangrong Wang","doi":"10.1109/SPCA.2006.297544","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297544","url":null,"abstract":"Filtering unsolicited messages in recipients' inboxes and restricting them at the mail server or transit agent level are two practical ways to confine spam. However, none of them prevents spam messages from leaving the source machines and flooding the Internet. In this paper, we present a method of preventing outgoing spam from entering the network by correlating user activities with the outbound network traffic. The message intentability scoring algorithm (MISA) is proposed to assess the intentability of the outgoing messages and an outgoing spam prevention system is designed based on this algorithm. This idea can be used to build standalone outgoing spam prevention or an extension of host-based intrusion prevention system","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116172205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Developing Method of ActiveX Component for e-Commerce","authors":"Zhongyi Hu, Lei Xiao, Huanchun Yang, Ye Lin","doi":"10.1109/SPCA.2006.297574","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297574","url":null,"abstract":"In order to integrate environments of computer's desktop and e-Commerce (electronic commerce) for programmers, and protect existing development-investment of Windows, this paper creates Internet-based component of ActiveX for e-Commerce after making use of the development environment of Delphi.net, by discussing the features of it. Combining the package of ActiveX component with authorization, the paper also introduces the application of ActiveX component on the Web, therefore, the same component can be used in the different development environment","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124766498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Mobile Lecture Slide Organization Tool for Students","authors":"K. Chow, C. Ngo, H.H.S. Ip, K. Cheung","doi":"10.1109/SPCA.2006.297597","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297597","url":null,"abstract":"This paper presents a software system that helps students to organize their lecture slides as well as provide a Web platform for students to effectively share their understanding of the learning materials with peers. The approach is based on the Web 2.0 technology and has been extended to handheld devices","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124838832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhenxiang Chen, L. Ge, Haiyang Wang, Xianzhi Huang, Jinjiao Lin
{"title":"A Trust-Based Service Evaluation and Selection Model in Pervasive Computing Environment","authors":"Zhenxiang Chen, L. Ge, Haiyang Wang, Xianzhi Huang, Jinjiao Lin","doi":"10.1109/SPCA.2006.297501","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297501","url":null,"abstract":"In pervasive computing, service evaluation and selection play an important role due to its high dynamics, complex context and catholicity characters. An effective model helps evaluating and thus selecting service efficiently. Using trust behavior experience in human society and the law of gravity in real word, this paper introduced a new concept of trust gravitation to analyze the trust relationship between pervasive interaction entities. We then built a sound system in terms of a service evaluation and selection model based on trust gravitation. The system was tested to improve the efficiency and veracity of service evaluation and selection. Experiment results show that pervasive entities can select optimum network services in time with the help of this model","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124677307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Ptolemy II Based Modeling Approach for Context-Aware Computing","authors":"Rui Li, Renfa Li, Jigang Wen","doi":"10.1109/SPCA.2006.297467","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297467","url":null,"abstract":"Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information. In general, context-aware is a distributed, large scale, sophisticated and hybrid system. In this paper, we first propose a conceptual model for it, and then we present a Ptolemy II based modeling approach. In this approach, we combine a hierarchical modeling methodology with the finite state machine (FSM), and limit the state number of the FSM, then extend state to be capable to execute predefined scripts and modeled by other components. This approach is very useful and has many benefits in context-aware computing development. One of them is capable of reducing the complexity of context-aware system modeling and support rapid prototype development","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132446323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A User-centric Service Framework for Pervasive Computing","authors":"Zhenmin Zhu, X. Su, Jintao Li, Junbo Guo, Jian Ye","doi":"10.1109/SPCA.2006.297473","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297473","url":null,"abstract":"In pervasive computing environments, users can interact with a wide range of services, but which do not include legacy application services such as interactive desktop applications. How to use legacy service as a kind of transparent service mechanism in a pervasive computing environment is an important problem to solve during the transition from personal computing to pervasive computing. This paper presents a user-centric service framework that coordinates application services over network and heterogeneous networked devices nearby users to form a user's virtual computing environment. It also provides legacy support without modification to existing softwares based on virtual desktop and virtual device","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128000540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Implementing Approach to Dynamic Context-Aware Pervasive Computing Application System","authors":"Jinjiao Lin, Chengxiang Song, Haiyang Wang","doi":"10.1109/SPCA.2006.297560","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297560","url":null,"abstract":"Context-aware pervasive computing application system should be flexibly adaptable to dynamic changes of context and application requirements and proactively provide the information satisfied with current context for users. The concept model and developing approach based on preference model presented by (K. Henricksen and J. Indulska, 2004) can satisfy the adaptation of context-aware pervasive computing application in a certain extent. However, this model can't easily describe fuzzy fact. Moreover, codes need be modified when constraints on system behavior have changed. Based on their production, this paper presents one type of rule, expresses fuzzy fact using operator predicate logic and presents a developing approach based on this type of rule. Therefore, the context-aware pervasive computing system developed using this approach need not modify codes when constraints on system behavior have changed. Such system can be more adaptive to dynamic changes and proactively provide information. In addition, requirements of context-aware pervasive computing application system can be expressed more accurately. Finally, experiments and examples prove that the model and approach proposed are feasible","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Management in Personal Network","authors":"Dajiang Zhang","doi":"10.1109/SPCA.2006.297486","DOIUrl":"https://doi.org/10.1109/SPCA.2006.297486","url":null,"abstract":"As happened in other communications systems security is an aspect which should treated seriously in pervasive computing networks. In this paper the security of a special subset of pervasive computing network, personal network, is studied","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129868487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}