{"title":"RFID Master-Slave Reader Architectures for Smart Spaces Applications","authors":"M. Darianian, M. P. Michael","doi":"10.1109/ICPCA.2008.4783707","DOIUrl":"https://doi.org/10.1109/ICPCA.2008.4783707","url":null,"abstract":"Item identification is one of the key enablers of smart space services. This paper introduces a novel read-out method for a master-slave RFID reader architecture, which improves the accuracy of RFID tag detection, localization, and reduces the cost and complexity of the system by using a full wireless technology. The master reader is generally fixed and the slave reader can be fixed or mobile. This architecture also dramatically improves reading distance and operation time of mobile RFID readers in smart spaces. Furthermore, workflows of few smart spaces shopping services are introduced using this architecture.","PeriodicalId":244239,"journal":{"name":"2008 Third International Conference on Pervasive Computing and Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116910644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haitao Qu, Meina Song, Xiaoxiang Luo, Jian Tang, J. Du
{"title":"A Resource Discovery Algorithm in Mobile Peer-to-Peer Based on Vector Location","authors":"Haitao Qu, Meina Song, Xiaoxiang Luo, Jian Tang, J. Du","doi":"10.1109/ICPCA.2008.4783755","DOIUrl":"https://doi.org/10.1109/ICPCA.2008.4783755","url":null,"abstract":"Low efficiency occurs just because physical topology isn't considered when Mobile Peer-to-Peer (MP2P) constructs overlay network; this paper will propose a novel vector location-based algorithm based on Distributed Hash Tables (DHT) algorithm. Using pole coordinates to divide physical network into different zones, constructing new routing protocol based on the location vector information; thus, nodes close in physical topology are also close in overlay network. This algorithm can quickly locate resource in large-scale mobile network and experiments demonstrate the efficiency of the algorithm.","PeriodicalId":244239,"journal":{"name":"2008 Third International Conference on Pervasive Computing and Applications","volume":"C-21 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114123587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hierarchical Service Discovery Framework for Ubiquitous Computing","authors":"Xiaoguang Gu, Hongzhou Shi, Jian Ye","doi":"10.1109/ICPCA.2008.4783599","DOIUrl":"https://doi.org/10.1109/ICPCA.2008.4783599","url":null,"abstract":"This paper presents a novel service discovery framework for ubiquitous computing called hierarchical ubiquitous computing service discovery framework (HUCSDF). HUCSDF offers a more flexible and scalable architecture which can combine the local services with remote services. Based on the novel architecture, HUCSDF possesses some useful characteristics such as supporting migration of user's personal computing environment, group collaboration, interoperation with other kind of services and integration of context-aware information. These characteristics make HUCSDF different from many other service discovery frameworks and more adaptive to ubiquitous computing environments.","PeriodicalId":244239,"journal":{"name":"2008 Third International Conference on Pervasive Computing and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125402715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kai Dong, Wentian Lu, Zhen Qin, Yu Huang, Xianping Tao, Jian Lu
{"title":"How and How Much Should We Disclose?","authors":"Kai Dong, Wentian Lu, Zhen Qin, Yu Huang, Xianping Tao, Jian Lu","doi":"10.1109/ICPCA.2008.4783571","DOIUrl":"https://doi.org/10.1109/ICPCA.2008.4783571","url":null,"abstract":"Privacy risks result in great barriers to the long-term success of pervasive computing. Unfortunately, related researches can still be considered in its infancy. Access control is widely used for privacy protection. However, traditional access control methods can only negating or approving accesses, greatly lacking flexibility. In this paper, we introduce the disclosing degree for end-users to precisely and flexibly specify their privacy requirements. We implement a disclosing degree based scheme in the middleware Shadow for privacy protection. We also demonstrate the effectiveness of our scheme by comprehensive case-studies.","PeriodicalId":244239,"journal":{"name":"2008 Third International Conference on Pervasive Computing and Applications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125433756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Majoe, Michel Estermann, Nicola Ranieri, J. Gutknecht
{"title":"Ergonomic Low Cost Motion Capture for every day health exercise","authors":"D. Majoe, Michel Estermann, Nicola Ranieri, J. Gutknecht","doi":"10.1109/ICPCA.2008.4783687","DOIUrl":"https://doi.org/10.1109/ICPCA.2008.4783687","url":null,"abstract":"Pervasive applications often require context information about the posture, ambulatory and work activity of the user. This paper reports ongoing work on the development of a low cost ergonomic approach to motion capture that provides the opportunity to examine diverse body movement in home and office environments. In this research case it is applied to the automatic training of Tai Ji Quan at different levels of complexity. Results of the sensor design, communications architecture and human body computer motion modeling are presented.","PeriodicalId":244239,"journal":{"name":"2008 Third International Conference on Pervasive Computing and Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127506512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Honglei Ren, Renjie Pi, Jing Chi, Xiaolin Wang, Liming Lin
{"title":"Collaborative Web Page Browse with AJAX and Comet Proxy","authors":"Honglei Ren, Renjie Pi, Jing Chi, Xiaolin Wang, Liming Lin","doi":"10.1109/ICPCA.2008.4783702","DOIUrl":"https://doi.org/10.1109/ICPCA.2008.4783702","url":null,"abstract":"Collaboration is becoming more and more important than before. Many fields including education and business can benefit from the visual collaboration. We already have many picture media sharing applications on the web, but the most natural media format organizing the information is the web page, but till now, there is no a very well-known application offering pure web page sharing without installing any plug-in or client software. In the paper we proposed an collaborative web page browse application based on AJAX and Comet technology, human action is transported to a collaborative server by additional AJAX process, audience browser's reaction is done by Comet data receiving. By filtering the URL and JavaScript code in the original web page, the collaborative server can convert the ordinary single-user oriented web page into multi-user collaborative web page without changing the media type of content like pictures. We use browser event hooking to make the change of display or user action available for the collaborative server, overriding of the mouse right button behavior make the operation more feasible than dull screen grabbing. Now time we are implementing the prototype of the application on several open-source projects.","PeriodicalId":244239,"journal":{"name":"2008 Third International Conference on Pervasive Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116865814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discovering Semantic Relationships for Knowledgebase","authors":"Junpeng Chen, Juan Liu, Wei Yu","doi":"10.1109/ICPCA.2008.4783585","DOIUrl":"https://doi.org/10.1109/ICPCA.2008.4783585","url":null,"abstract":"Discovering the semantic relationships in knowledgebase is critical in information processing and knowledge management. Previous studies of discovering semantic relationships are mainly based on the information extraction using manually annotated training set and predefined semantic relationship patterns. In this paper, we propose a new method to automatically discover the semantic relationships between two concepts in knowledgebase through text classifying and information filtering. The documents related to the two concepts in knowledgebase are at first classified into different taxonomies and the connecting terms capturing the semantic relationships between the two concepts are extracted. The experimental results show that our method has provided an efficient and effective way for the automatic discovering of semantic relationships for information management.","PeriodicalId":244239,"journal":{"name":"2008 Third International Conference on Pervasive Computing and Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122390283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Target Localization Based on Mean Shift in Wireless Sensor Networks","authors":"Haiyong Luo, Jintao Li, Fang Zhao, Yiming Lin, Zhenmin Zhu","doi":"10.1109/ICPCA.2008.4783586","DOIUrl":"https://doi.org/10.1109/ICPCA.2008.4783586","url":null,"abstract":"In order to localize the mobile targets in real time and with high accuracy, by employing mean shift algorithm to generate the proposal distribution for the joint particle filter, this paper proposes a novel mobile target localization algorithm, which we called mean shift particle filter. The mean shift particle filter algorithm significantly improves the accuracy of the particle state estimation and reduces the necessary number of samples by using the current observations in sampling procedure to obtain a sample distribution. It also reduces the interference among multiple targets in close proximity by weighting samples according to the virtual hamming distances and interaction potentials. By arranging the state distributions of mobile targets, the proposed scheme can handle the multiple peaks in state estimation of mobile targets and improves the localization accuracy.","PeriodicalId":244239,"journal":{"name":"2008 Third International Conference on Pervasive Computing and Applications","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115788352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workflow Meta-Model Extension for Pervasive Computing Environment","authors":"Lei Yu, Qingbao Li, Mingjing Lan, Zongkai Lin","doi":"10.1109/ICPCA.2008.4783697","DOIUrl":"https://doi.org/10.1109/ICPCA.2008.4783697","url":null,"abstract":"Along with the rapid development of the pervasive computing and the SOA technology, the limitation of the traditional workflow modeling mechanisms is increasingly obvious in the aspects of supporting rules defining, resource using on demand and transparent accessing, goal-driven automatic composition of services etc. To adapt the request of the pervasion computing, for example environment perception, resource transparent accessing, application integration seamless, this paper extends the WFMC workflow process meta-model based on ontology and Web service techniques. By adding goal definition of working task, using rules for Web services, uniform abstract and definition mechanisms for application resource and physical resource, skill and knowledge demand for executive role, it provides modeling support for intellectualized and larger-granularity workflow activity definition. Sequentially, adapting various practical situations that possibility presences in the pervasive environment, this paper provides model support for resource automatic identification and dynamic binding, goal-driven dynamic composition of various computing services and intellectualized execution of workflow model defined.","PeriodicalId":244239,"journal":{"name":"2008 Third International Conference on Pervasive Computing and Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128052831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Usability and Implementation Experiences with COTS Products used as a Distributed Client Platform","authors":"S. Wagner, C.C. Nielsen","doi":"10.1109/ICPCA.2008.4783619","DOIUrl":"https://doi.org/10.1109/ICPCA.2008.4783619","url":null,"abstract":"This paper conveys some of the experiences with using commercial off-the-shel (COTS) products as clients to Bluetooth enabled devices, which have no user interface of their own, but relies on the COTS products for user interaction. The COTS devices used include several different vendors' models of the microsoft Pocket PC platform (also known as windows mobile professional or classic) running .NET compact framework, as well as a number of different models of Java enabled cell phones from nokia, siemens and sony-ericsson. The specific case study is with the Taxmaster4 Windows mobile product used with BMW automobiles as a driving log application. The paper concludes that many usability problems exist when using COTS products. These may to some extend be overcome by pragmatic design decisions, but it is necessary that the COTS products hardware platform and application programming interfaces should become better suited to support distributed user interfaces than is the case today. This includes better support for basic user interface elements as well as supporting Bluetooth and other wireless technologies more reliably. These issues should be addressed by the vendors and manufactures of these platforms, not the application programmers.","PeriodicalId":244239,"journal":{"name":"2008 Third International Conference on Pervasive Computing and Applications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128440357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}