IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second最新文献

筛选
英文 中文
Efficient end system multicast for mobile ad hoc networks 移动自组织网络中高效的端系统组播
S. Blodt
{"title":"Efficient end system multicast for mobile ad hoc networks","authors":"S. Blodt","doi":"10.1109/PERCOMW.2004.1276909","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276909","url":null,"abstract":"End system multicast protocols have the advantage that nonmember nodes are not burdened with multicast routing and storing state information. Unfortunately, most existing end system multicast protocols are developed for the traditional Internet. We show how these protocols can also be utilized in mobile ad-hoc networks (MANET). To achieve this the protocols have to be adapted to fit the highly dynamic network topology, link failures and other particularities of MANETs. We show how the existing NICE protocol can be improved to operate more efficient in such an environment. This is achieved by exploiting the broadcast capabilities of the medium, permanent adaptation to the dynamic network topology and a distance metric that is based on hop count instead of latency measurements. Simulations show that the proposed improvements greatly increase the efficiency of the protocol in MANETs. Moreover, the proposed protocol introduces the local broadcast cluster concept that exploits the broadcast medium better than any other existing overlay approach.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114187056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Towards context-aware security: an authorization architecture for intranet environments 面向上下文感知的安全性:内部网环境的授权体系结构
C. Wullems, M. Looi, A. Clark
{"title":"Towards context-aware security: an authorization architecture for intranet environments","authors":"C. Wullems, M. Looi, A. Clark","doi":"10.1109/PERCOMW.2004.1276919","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276919","url":null,"abstract":"We introduce a context-aware authorization architecture that is designed to augment existing network security protocols in an intranet environment. It describes the architecture components, the proposed extensions to RBAC that facilitate context-aware access control policy, details of the prototyped implementation, and a number of performance results.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114573152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Escape from the computer lab: education in mobile wireless networks 逃离计算机实验室:移动无线网络教育
E. Belding-Royer
{"title":"Escape from the computer lab: education in mobile wireless networks","authors":"E. Belding-Royer","doi":"10.1109/PERCOMW.2004.1276937","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276937","url":null,"abstract":"As mobile wireless network technology becomes widespread, the importance of education about this new form of communication is becoming critical. One of the benefits of mobile computing education is that courses focusing on this topic can leverage advances in wireless technology to support novel education and learning paradigms. In particular, the development of wireless communication, together with portable devices, allows the freedom of both mobility and creativity in curriculum and assignments. We describe two recently designed mobile computing courses at the University of California, Santa Barbara, focusing on the methodologies for incorporating handheld computing devices into the course assignments. Course evaluations have shown that the use of mobile computing devices has been well-received by the students in both of these courses, and we encourage their incorporation into similar courses.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116616325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A middleware for supporting disconnections and multi-network access in mobile environments 一种中间件,用于在移动环境中支持断开连接和多网络访问
Mejdi Kaddour, L. Pautet
{"title":"A middleware for supporting disconnections and multi-network access in mobile environments","authors":"Mejdi Kaddour, L. Pautet","doi":"10.1109/PERCOMW.2004.1276929","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276929","url":null,"abstract":"The middleware infrastructure to support applications is becoming critically important to the new horizons of mobile and pervasive computing. In this context, the goal of our work is to propose architecture and a prototype of a middleware which is adapted to the usage and the requirements of the future mobile systems. While message oriented middleware (MOM) is an established concept for a long time on the fixed environments, we work to put forward the idea that it proposes an effective solution of many issues in the mobile environments. Our contribution is to bring current MOMs closer to the specificities of these environments, through providing more adaptability and context-awareness, and also through supporting more specific problems like intermittent connection and multinetwork access.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132241029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A transport layer load sharing mechanism for mobile wireless hosts 一种移动无线主机的传输层负载共享机制
A. A. E. Al, T. Saadawi, Myung J. Lee
{"title":"A transport layer load sharing mechanism for mobile wireless hosts","authors":"A. A. E. Al, T. Saadawi, Myung J. Lee","doi":"10.1109/PERCOMW.2004.1276911","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276911","url":null,"abstract":"We introduce a transport layer solution for bandwidth aggregation, based on extending stream control transmission protocol (SCTP). The extended SCTP, which we refer to as load-sharing SCTP (LS-SCTP), is able to aggregate the bandwidth of the transmission paths between the communicating endpoints. In addition, LS-SCTP can dynamically add new paths to the bundle, as they become available. To insure that the transport connection does not stall due to the high loss rate or due to continuous failure of individual paths, LS-SCTP includes path monitoring and packet assignment mechanisms. These mechanisms monitor the paths and stripe the packets according to their condition. Simulation results demonstrated the effectiveness of our proposed mechanism in providing throughput and reliability to mobile applications.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117132401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Peer-to-peer file-sharing over mobile ad hoc networks 移动自组织网络上的点对点文件共享
G. Ding, B. Bhargava
{"title":"Peer-to-peer file-sharing over mobile ad hoc networks","authors":"G. Ding, B. Bhargava","doi":"10.1109/PERCOMW.2004.1276914","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276914","url":null,"abstract":"Current peer-to-peer file-sharing systems mostly work on wired networks. Mobile ad hoc network is characterized as multihop wireless communications between mobile devices. Five routing approaches with different complexity are proposed to enable peer-to-peer file-sharing over mobile ad hoc networks. The complexity of the proposed approaches is evaluated and compared. It is concluded that the cross-layer protocols perform better than simply overlaying peer-to-peer searching protocol on mobile ad hoc networks.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126317503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 221
Untraceable secret credentials: trust establishment with privacy 无法追踪的秘密凭证:信任机构与隐私
Laurent Bussard, Y. Roudier, R. Molva
{"title":"Untraceable secret credentials: trust establishment with privacy","authors":"Laurent Bussard, Y. Roudier, R. Molva","doi":"10.1109/PERCOMW.2004.1276917","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276917","url":null,"abstract":"There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This task becomes extremely challenging when it is simultaneously necessary to protect the privacy of the actors involved. We show how trust can be based on previous interactions yet remain unlinkable to any previous event or any specific entity. A solution based on group blind signatures is proposed that relies on credentials both secret, meaning that they contain an encrypted description of previous interactions, and untraceable, meaning that they cannot be recognized when presented to their issuer.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125851713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
AmbientDB: P2P data management middleware for ambient intelligence 用于环境智能的P2P数据管理中间件
Willem Fontijn, P. Boncz
{"title":"AmbientDB: P2P data management middleware for ambient intelligence","authors":"Willem Fontijn, P. Boncz","doi":"10.1109/PERCOMW.2004.1276932","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276932","url":null,"abstract":"The future generation of consumer electronics devices is envisioned to provide automatic cooperation between devices and run applications that are sensitive to people's likings, personalized to their requirements, anticipatory of their behavior and responsive to their presence. We see this 'ambient intelligence' as a key feature of future pervasive computing. We focus here on one of the challenges in realizing this vision: information management. This entails integrating, querying, synchronizing and evolving structured data, on a heterogeneous and ad-hoc collection of (mobile) devices. Rather than hard-coding data management functionality in each individual application, we argue for adding high-level data management functionalities to the distributed middleware layer. Our ambientDB P2P database management system addresses this by providing a global database abstraction over an ad-hoc network of heterogeneous peers.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127369495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Ubicomp education:current status and future directions Ubicomp教育:现状与未来方向
G. Abowd, G. Borriello, Gerd Kortuem
{"title":"Ubicomp education:current status and future directions","authors":"G. Abowd, G. Borriello, Gerd Kortuem","doi":"10.1109/PERCOMW.2004.1276936","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276936","url":null,"abstract":"The authors organized a workshop on education atthe Ubicomp 2003 conference in Seattle, Washingtonin October12, 2003. This paper reports on the resultsof that workshop. The intention is to provide a moreconcrete basis for discussion of ubicomp education atsubsequent forums, such as PerEd 2004.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133734926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling and using imperfect context information 建模和使用不完全的上下文信息
K. Henricksen, J. Indulska
{"title":"Modelling and using imperfect context information","authors":"K. Henricksen, J. Indulska","doi":"10.1109/PERCOMW.2004.1276901","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276901","url":null,"abstract":"Most recently developed context-aware software applications make unrealistic assumptions about the quality of the available context information, which can lead to inappropriate actions by the application and frustration on the part of the user. Here, we explore the problem of imperfect context information and some of its causes, and propose a novel approach for modelling incomplete and inaccurate information. Additionally, we present a discussion of our experiences in developing a context-aware communication application, highlighting design issues that are pertinent when developing applications that rely on imperfect context information.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133230277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 290
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信