IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second最新文献

筛选
英文 中文
Trustworthy pervasive computing: the hard security problems 可信普适计算:硬安全问题
Kumar Ranganathan
{"title":"Trustworthy pervasive computing: the hard security problems","authors":"Kumar Ranganathan","doi":"10.1109/PERCOMW.2004.1276916","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276916","url":null,"abstract":"We examine five security problems that are barriers to mainstream pervasive computing. These are: device authentication, privacy, trust management, device assurance, recourse, and availability. We argue that the trust, security, and privacy issues inherent in pervasive computing environments present unique challenges that require a fundamental reexamination of how to build large-scale, trustworthy, distributed systems.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133954702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Anatomy of a graduate ubiquitous/pervasive computing course 研究生普适/普适计算课程剖析
S. Gupta
{"title":"Anatomy of a graduate ubiquitous/pervasive computing course","authors":"S. Gupta","doi":"10.1109/PERCOMW.2004.1276940","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276940","url":null,"abstract":"We present the experience in designing and teaching a graduate level ubiquitous computing (Ubicomp) course at Arizona State University. It identifies some of the challenges in teaching an Ubicomp course and presents some solutions. This course was designed for students with no prior exposure to Ubicomp or experience in human computer interaction; and to have minimal overlap with a mobile computing course. Both anonymous end-of-semester and openly solicited feedback indicate that the class was successful in conveying the vision, challenges, and techniques of Ubicomp to a majority of students.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123006260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Super spaces: a middleware for large-scale pervasive computing environments 超级空间:用于大规模普适计算环境的中间件
J. Al-Muhtadi, S. Chetan, A. Ranganathan, R. Campbell
{"title":"Super spaces: a middleware for large-scale pervasive computing environments","authors":"J. Al-Muhtadi, S. Chetan, A. Ranganathan, R. Campbell","doi":"10.1109/PERCOMW.2004.1276931","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276931","url":null,"abstract":"In previous work [M. Roman et al., (2002)], we introduced a distributed middleware infrastructure for managing physically-bounded, standalone pervasive computing environments, which we refer to as Active Spaces. We extend this middleware to support the organization, management and interactions of large-scale pervasive computing systems built from multiple Active Spaces or other pervasive computing components.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123028146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Peer-to-peer determination of proximity using wireless network data 使用无线网络数据的点对点接近测定
J. Meunier
{"title":"Peer-to-peer determination of proximity using wireless network data","authors":"J. Meunier","doi":"10.1109/PERCOMW.2004.1276908","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276908","url":null,"abstract":"Observing that some applications require device location information only for calculating relative distances to each other, we propose a proximity measurement algorithm based on wireless network signal strength that requires no calibration and operates in a peer-to-peer way with low overhead. We describe this method and report its precision and recall.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115469703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A hands-on course on wireless and mobile systems design 无线和移动系统设计的实践课程
L. Dasilva, S. Midkiff, I. Chen
{"title":"A hands-on course on wireless and mobile systems design","authors":"L. Dasilva, S. Midkiff, I. Chen","doi":"10.1109/PERCOMW.2004.1276939","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276939","url":null,"abstract":"While we cannot make every student an expert on all topics from the wireless channel to mobile application design, we can provide students with a critical understanding of the context for their work in different aspects of wireless systems. We describe the design and development of a hands-on course on wireless and mobile systems design offered at Virginia Tech, integrating topics in wireless networking and mobile computing. Students conduct laboratory experiments and design projects that cover a broad spectrum of issues (from cochannel interference and medium access to routing and addressing, middleware support and mobile application design) that directly affect mobile computing. We describe the structure of the course, outline lecture topics and hands-on exercises, and summarize student feedback to the first offering of the course.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127445532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An adaptive approach to content-based subscription in mobile ad hoc networks 移动自组织网络中基于内容的订阅自适应方法
Eiko Yoneki, J. Bacon
{"title":"An adaptive approach to content-based subscription in mobile ad hoc networks","authors":"Eiko Yoneki, J. Bacon","doi":"10.1109/PERCOMW.2004.1276912","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276912","url":null,"abstract":"We describe a novel approach for content-based publish/subscribe system in mobile ad-hoc networks and show preliminary experiment results. We extended ODMRP (on-demand multicast routing protocol) using aggregated summaries of content-based subscriptions in Bloom filters expression for the dynamic construction of an event dissemination structure. ODMRP's mesh topology gives extra reliability. We describe experiment results including comparison with regular ODMRP and mobility simulation.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121132930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
A synchronization framework for personal mobile servers 用于个人移动服务器的同步框架
A. Sinitsyn
{"title":"A synchronization framework for personal mobile servers","authors":"A. Sinitsyn","doi":"10.1109/PERCOMW.2004.1276933","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276933","url":null,"abstract":"The recent growth in the mobile device market has proven the feasibility of mobile storage based consumer electronics products. One of the key features of personal mobile storage devices is the ability to synchronize content and metadata with other mobile and stationary devices. The main problem addressed is automatic data exchange and synchronization in the domain of personal mobile storage devices or personal servers. We present a synchronization framework for personal servers delivered in the form of user scenarios, derived system requirements, design decisions and a software components structure. The synchronization framework was validated through a working prototype which shows added functionality, such as: connectivity with various types of devices from different vendors, synchronization based on user preferences, content-aware synchronization filtering. In order to abstract from implementation specifics of different network protocols, a high-level object-based storage API has been defined.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133909505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Context-based secure resource access in pervasive computing environments 普适计算环境中基于上下文的安全资源访问
A. Tripathi, Tanvir Ahmed, D. Kulkarni, Richa Kumar, Komal Kashiramka
{"title":"Context-based secure resource access in pervasive computing environments","authors":"A. Tripathi, Tanvir Ahmed, D. Kulkarni, Richa Kumar, Komal Kashiramka","doi":"10.1109/PERCOMW.2004.1276924","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276924","url":null,"abstract":"We present a system architecture for supporting ubiquitous computing for mobile users across different environments by transparently performing context-based discovery and binding of resources. A ubiquitous computing environment is viewed as a collaboration space among mobile users, system services, and sensors/resources embedded in the physical environment. We present here different policies for binding resources to names in this space. We also present a role based specification model for defining activities.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133988920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Models, protocols, and architectures for secure pervasive computing: challenges and research directions 安全普适计算的模型、协议和体系结构:挑战和研究方向
Roshan K. Thomas, R. Sandhu
{"title":"Models, protocols, and architectures for secure pervasive computing: challenges and research directions","authors":"Roshan K. Thomas, R. Sandhu","doi":"10.1109/PERCOMW.2004.1276925","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276925","url":null,"abstract":"We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be successful, efforts to build these would have to recognize from the onset that pervasive computing settings are complex socio-technical system and would thus have to go beyond traditional system-centric approaches to analyzing and designing security.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126156726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
A toolkit to design adaptable user interfaces in ubiquitous computing environments 一个工具箱,用于在无处不在的计算环境中设计适应性强的用户界面
Philippe Debaty
{"title":"A toolkit to design adaptable user interfaces in ubiquitous computing environments","authors":"Philippe Debaty","doi":"10.1109/PERCOMW.2004.1276926","DOIUrl":"https://doi.org/10.1109/PERCOMW.2004.1276926","url":null,"abstract":"We describe an architecture to support the rapid development of software applications for mobile devices that can discover and adapt to resources in the environment of the user. To narrow the scope of our research, we focus on media-oriented applications involving the rendering, capture and control of pictures, audio or video. Inspired by the success of software component models, we introduce the concept of adaptive components. An adaptive component is a reusable building block that can discover and adapt to a dynamically changing context to deliver a generic interface functionality. Examples of such functionalities include the capture or playback of various types of media and the control of media services via physical user interfaces or graphical ones. We detail an early implementation of our architecture using Visual C#, UPnP and the Web presence manager distributed platform. We present how we used this implementation to create a simple media rendering service.","PeriodicalId":262138,"journal":{"name":"IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129938071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信